Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5LEXIucyEP.exe

Overview

General Information

Sample name:5LEXIucyEP.exe
renamed because original name is a hash value
Original sample name:42a5c60fadb3b94505babe3561507a50.exe
Analysis ID:1558094
MD5:42a5c60fadb3b94505babe3561507a50
SHA1:ade46a914ffefa4b1d8b791fbfdf07531c362e44
SHA256:a39cb2c31b6724eaa78f60fe29ced83e50ffad7e39efd604a7debdac63a2a80e
Tags:exeMeduzaStealeruser-abuse_ch
Infos:

Detection

CredGrabber, Meduza Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Suricata IDS alerts for network traffic
Yara detected CredGrabber
Yara detected Meduza Stealer
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Modifies the context of a thread in another process (thread injection)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Queries time zone information
Suricata IDS alerts with low severity for network traffic
Terminates after testing mutex exists (may check infected machine status)
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 5LEXIucyEP.exe (PID: 3344 cmdline: "C:\Users\user\Desktop\5LEXIucyEP.exe" MD5: 42A5C60FADB3B94505BABE3561507A50)
    • 5LEXIucyEP.exe (PID: 4040 cmdline: C:\Users\user\Desktop\5LEXIucyEP.exe MD5: 42A5C60FADB3B94505BABE3561507A50)
  • cleanup
{"C2 url": "193.3.19.151", "grabber_max_size": 4194304, "anti_vm": true, "anti_dbg": true, "self_destruct": false, "extensions": ".txt", "build_name": "enew", "links": "", "port": 15666}
SourceRuleDescriptionAuthorStrings
00000002.00000002.1540891848.000002762F467000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
    00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
      Process Memory Space: 5LEXIucyEP.exe PID: 4040JoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
        Process Memory Space: 5LEXIucyEP.exe PID: 4040JoeSecurity_CredGrabberYara detected CredGrabberJoe Security
          SourceRuleDescriptionAuthorStrings
          2.2.5LEXIucyEP.exe.140000000.0.unpackJoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
            2.2.5LEXIucyEP.exe.140000000.0.raw.unpackJoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-18T23:47:14.323644+010020494411A Network Trojan was detected192.168.2.849705193.3.19.15115666TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-18T23:47:14.323644+010020508061A Network Trojan was detected192.168.2.849705193.3.19.15115666TCP
              2024-11-18T23:47:14.328691+010020508061A Network Trojan was detected192.168.2.849705193.3.19.15115666TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-18T23:47:14.323644+010020508071A Network Trojan was detected192.168.2.849705193.3.19.15115666TCP
              2024-11-18T23:47:14.328691+010020508071A Network Trojan was detected192.168.2.849705193.3.19.15115666TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 2.2.5LEXIucyEP.exe.140000000.0.unpackMalware Configuration Extractor: Meduza Stealer {"C2 url": "193.3.19.151", "grabber_max_size": 4194304, "anti_vm": true, "anti_dbg": true, "self_destruct": false, "extensions": ".txt", "build_name": "enew", "links": "", "port": 15666}
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
              Source: 5LEXIucyEP.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140077BA0 CryptUnprotectData,LocalFree,2_2_0000000140077BA0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140078020 BCryptDecrypt,BCryptDecrypt,2_2_0000000140078020
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400783C0 BCryptCloseAlgorithmProvider,2_2_00000001400783C0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140078440 BCryptOpenAlgorithmProvider,BCryptSetProperty,BCryptGenerateSymmetricKey,Concurrency::cancel_current_task,2_2_0000000140078440
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5688 BCryptSetProperty,2_2_00000001400D5688
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140033A30 BCryptDestroyKey,2_2_0000000140033A30
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140037C20 CryptUnprotectData,LocalFree,2_2_0000000140037C20
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140077EC0 CryptProtectData,LocalFree,2_2_0000000140077EC0
              Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.8:49706 version: TLS 1.2
              Source: 5LEXIucyEP.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400BB500 FindClose,FindFirstFileExW,GetLastError,2_2_00000001400BB500
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400BB5B0 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,2_2_00000001400BB5B0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5100 FindFirstFileW,2_2_00000001400D5100
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D54A0 FindFirstFileExW,2_2_00000001400D54A0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400873F0 GetLogicalDriveStringsW,2_2_00000001400873F0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: D:\sources\migration\Jump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: D:\sources\replacementmanifests\Jump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: D:\sources\migration\wtr\Jump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: D:\sources\replacementmanifests\microsoft-activedirectory-webservices\Jump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: D:\sources\replacementmanifests\microsoft-client-license-platform-service-migration\Jump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: D:\sources\replacementmanifests\hwvid-migration-2\Jump to behavior

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2049441 - Severity 1 - ET MALWARE Win32/Unknown Grabber Base64 Data Exfiltration Attempt : 192.168.2.8:49705 -> 193.3.19.151:15666
              Source: Network trafficSuricata IDS: 2050806 - Severity 1 - ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M2 : 192.168.2.8:49705 -> 193.3.19.151:15666
              Source: global trafficTCP traffic: 192.168.2.8:49705 -> 193.3.19.151:15666
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: text/html; text/plain; */*Host: api.ipify.orgCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
              Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
              Source: Joe Sandbox ViewASN Name: ARNES-NETAcademicandResearchNetworkofSloveniaSI ARNES-NETAcademicandResearchNetworkofSloveniaSI
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: unknownDNS query: name: api.ipify.org
              Source: unknownDNS query: name: api.ipify.org
              Source: Network trafficSuricata IDS: 2050807 - Severity 1 - ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP) : 192.168.2.8:49705 -> 193.3.19.151:15666
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: unknownTCP traffic detected without corresponding DNS query: 193.3.19.151
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140085240 InternetOpenA,InternetOpenUrlA,HttpQueryInfoW,HttpQueryInfoW,InternetQueryDataAvailable,InternetReadFile,InternetQueryDataAvailable,InternetCloseHandle,Concurrency::cancel_current_task,2_2_0000000140085240
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: text/html; text/plain; */*Host: api.ipify.orgCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: api.ipify.org
              Source: 5LEXIucyEP.exe, 00000002.00000003.1450618694.00000276317E1000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1540209214.00000276317F0000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1540179135.00000276317F0000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1540293246.00000276317F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.microsoft.t/Regi
              Source: 5LEXIucyEP.exe, 00000002.00000002.1540891848.000002762F467000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
              Source: 5LEXIucyEP.exe, 00000002.00000003.1465139750.0000027632175000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1467258643.00000276327AE000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464214839.0000027632120000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464016665.000002763137D000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464214839.0000027632118000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464016665.0000027631358000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464476407.0000027632088000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464016665.0000027631375000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1465335650.0000027631515000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464707186.0000027632048000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464214839.000002763216D000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1465335650.000002763151D000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464016665.0000027631350000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464476407.0000027632090000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org
              Source: 5LEXIucyEP.exe, 00000002.00000003.1464016665.0000027631385000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
              Source: 5LEXIucyEP.exe, 00000002.00000003.1464016665.0000027631385000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.elMx_wJzrE6l
              Source: 5LEXIucyEP.exe, 00000002.00000003.1465139750.0000027632175000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1467258643.00000276327AE000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464214839.0000027632120000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464016665.000002763137D000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464214839.0000027632118000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464016665.0000027631358000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464476407.0000027632088000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464016665.0000027631375000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1465335650.0000027631515000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464707186.0000027632048000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464214839.000002763216D000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1465335650.000002763151D000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464016665.0000027631350000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464476407.0000027632090000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
              Source: 5LEXIucyEP.exe, 00000002.00000003.1464016665.0000027631385000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.0JoCxlq8ibGr
              Source: 5LEXIucyEP.exe, 00000002.00000003.1464016665.0000027631385000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.Tgc_vjLFc3HK
              Source: 5LEXIucyEP.exe, 00000002.00000003.1464016665.0000027631385000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
              Source: 5LEXIucyEP.exe, 00000002.00000003.1464214839.000002763217C000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1468125473.0000027632B87000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1465335650.0000027631525000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464016665.000002763135F000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464214839.0000027632128000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464016665.0000027631385000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
              Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
              Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.8:49706 version: TLS 1.2
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140085B70 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetDC,GetDeviceCaps,GetDeviceCaps,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SHCreateMemStream,SelectObject,DeleteDC,ReleaseDC,DeleteObject,EnterCriticalSection,LeaveCriticalSection,IStream_Size,IStream_Reset,IStream_Read,SelectObject,DeleteDC,ReleaseDC,DeleteObject,2_2_0000000140085B70
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014008A430 RtlAcquirePebLock,NtAllocateVirtualMemory,lstrcpyW,lstrcatW,NtAllocateVirtualMemory,lstrcpyW,RtlInitUnicodeString,RtlInitUnicodeString,LdrEnumerateLoadedModules,RtlReleasePebLock,CoInitializeEx,lstrcpyW,lstrcatW,CoGetObject,lstrcpyW,lstrcatW,CoGetObject,CoUninitialize,2_2_000000014008A430
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D56F8 NtQuerySystemInformation,2_2_00000001400D56F8
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140089D30 GetModuleHandleA,GetProcAddress,OpenProcess,NtQuerySystemInformation,NtQuerySystemInformation,GetCurrentProcess,NtQueryObject,GetFinalPathNameByHandleA,CloseHandle,CloseHandle,2_2_0000000140089D30
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014007F0202_2_000000014007F020
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400880302_2_0000000140088030
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014008D0502_2_000000014008D050
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014006D0802_2_000000014006D080
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400320B02_2_00000001400320B0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400520F62_2_00000001400520F6
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014009918C2_2_000000014009918C
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400852402_2_0000000140085240
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400453102_2_0000000140045310
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400663502_2_0000000140066350
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400304502_2_0000000140030450
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014003D5702_2_000000014003D570
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400BB5B02_2_00000001400BB5B0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014008C5CB2_2_000000014008C5CB
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014003E6102_2_000000014003E610
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400C06582_2_00000001400C0658
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400876A02_2_00000001400876A0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014002F7302_2_000000014002F730
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400868602_2_0000000140086860
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400659702_2_0000000140065970
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014003CA102_2_000000014003CA10
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140085B702_2_0000000140085B70
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140034B702_2_0000000140034B70
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140031B902_2_0000000140031B90
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140032CA02_2_0000000140032CA0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014003ECB02_2_000000014003ECB0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014002FE202_2_000000014002FE20
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400A2E3C2_2_00000001400A2E3C
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140049F802_2_0000000140049F80
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400A30B82_2_00000001400A30B8
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014009F0D82_2_000000014009F0D8
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400070E02_2_00000001400070E0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014005C0F02_2_000000014005C0F0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400AC1282_2_00000001400AC128
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400931502_2_0000000140093150
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400961642_2_0000000140096164
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400061802_2_0000000140006180
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400A71D82_2_00000001400A71D8
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400912202_2_0000000140091220
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400702C02_2_00000001400702C0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014007E2F02_2_000000014007E2F0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400953942_2_0000000140095394
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400763A62_2_00000001400763A6
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400283D02_2_00000001400283D0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400AA3C82_2_00000001400AA3C8
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014007B4202_2_000000014007B420
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014005C4202_2_000000014005C420
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014008A4302_2_000000014008A430
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400AA44F2_2_00000001400AA44F
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014005B4802_2_000000014005B480
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400A14E42_2_00000001400A14E4
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400265102_2_0000000140026510
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400255202_2_0000000140025520
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400865402_2_0000000140086540
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400955982_2_0000000140095598
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400066102_2_0000000140006610
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014009666C2_2_000000014009666C
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400A86742_2_00000001400A8674
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400A36A82_2_00000001400A36A8
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400A46E42_2_00000001400A46E4
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400547202_2_0000000140054720
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400627502_2_0000000140062750
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014008A7802_2_000000014008A780
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014005B7802_2_000000014005B780
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014009579C2_2_000000014009579C
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014009F7E62_2_000000014009F7E6
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400398CD2_2_00000001400398CD
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014007C8E02_2_000000014007C8E0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014009A9242_2_000000014009A924
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140033A302_2_0000000140033A30
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400A6A682_2_00000001400A6A68
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140030A802_2_0000000140030A80
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140075AB02_2_0000000140075AB0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014005BAB02_2_000000014005BAB0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140060AC02_2_0000000140060AC0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140051AF02_2_0000000140051AF0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140078B002_2_0000000140078B00
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400ABB902_2_00000001400ABB90
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140057CEB2_2_0000000140057CEB
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140090D142_2_0000000140090D14
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140074D402_2_0000000140074D40
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140098D502_2_0000000140098D50
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140005DB02_2_0000000140005DB0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014005BDD02_2_000000014005BDD0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014003ADD02_2_000000014003ADD0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140037E702_2_0000000140037E70
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140030E802_2_0000000140030E80
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140080E902_2_0000000140080E90
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140075EF02_2_0000000140075EF0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014003BF402_2_000000014003BF40
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400BFFBC2_2_00000001400BFFBC
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: String function: 000000014002E1D0 appears 33 times
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: String function: 0000000140036940 appears 41 times
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: String function: 00000001400486B0 appears 57 times
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: String function: 000000014002BA80 appears 32 times
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: String function: 0000000140098254 appears 34 times
              Source: 5LEXIucyEP.exeStatic PE information: Number of sections : 11 > 10
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/0@1/2
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014008B9B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,2_2_000000014008B9B0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014003E610 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,2_2_000000014003E610
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140074D40 CoInitializeEx,CoInitializeSecurity,CoCreateInstance,CoSetProxyBlanket,SysAllocStringByteLen,SysFreeString,SysAllocStringByteLen,SysFreeString,SysStringByteLen,SysStringByteLen,SysFreeString,SysFreeString,2_2_0000000140074D40
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeMutant created: \Sessions\1\BaseNamedObjects\Mmm-A33C734061CA11EE8C18806E6F6E696370FEBEA2
              Source: 5LEXIucyEP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\5LEXIucyEP.exe "C:\Users\user\Desktop\5LEXIucyEP.exe"
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeProcess created: C:\Users\user\Desktop\5LEXIucyEP.exe C:\Users\user\Desktop\5LEXIucyEP.exe
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeProcess created: C:\Users\user\Desktop\5LEXIucyEP.exe C:\Users\user\Desktop\5LEXIucyEP.exeJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: drprov.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: winsta.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: ntlanman.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: davclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: davhlpr.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: 5LEXIucyEP.exeStatic PE information: Image base 0x140000000 > 0x60000000
              Source: 5LEXIucyEP.exeStatic file information: File size 4270080 > 1048576
              Source: 5LEXIucyEP.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x38c000
              Source: 5LEXIucyEP.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: 5LEXIucyEP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: 5LEXIucyEP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: 5LEXIucyEP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: 5LEXIucyEP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: 5LEXIucyEP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014003D570 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,2_2_000000014003D570
              Source: 5LEXIucyEP.exeStatic PE information: section name: .00cfg
              Source: 5LEXIucyEP.exeStatic PE information: section name: .gxfg
              Source: 5LEXIucyEP.exeStatic PE information: section name: .retplne
              Source: 5LEXIucyEP.exeStatic PE information: section name: _RDATA
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D50F0 push rsi; retf 2_2_00000001400D5103
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5100 push rsi; retf 2_2_00000001400D5103
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D50F8 push rsi; retf 2_2_00000001400D5103
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5110 push rbp; retf 2_2_00000001400D511B
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5108 push rsi; retf 2_2_00000001400D510B
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5120 push rsi; retf 2_2_00000001400D5123
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5118 push rbp; retf 2_2_00000001400D511B
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5140 push rsi; retf 2_2_00000001400D5143
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5140 push rbp; retf 2_2_00000001400D518B
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5138 push rsi; retf 2_2_00000001400D513B
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5150 push rbp; retf 2_2_00000001400D515B
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5160 push rbp; retf 2_2_00000001400D5163
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5170 push rbp; retf 2_2_00000001400D517B
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5168 push rbp; retf 2_2_00000001400D516B
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5190 push rsi; retf 2_2_00000001400D5193
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D51B0 push rsi; retf 2_2_00000001400D51CB
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D51A8 push rsi; retf 2_2_00000001400D51CB
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D51D0 push rsi; retf 2_2_00000001400D51D3
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D51E0 push rbp; retf 2_2_00000001400D51E3
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D51D8 push rsi; retf 2_2_00000001400D51DB
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D51F0 push rsi; retf 2_2_00000001400D51F3
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D51F0 push rbp; retf 2_2_00000001400D5243
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D51E8 push rsi; retf 2_2_00000001400D51F3
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D51F8 push rbp; retf 2_2_00000001400D5203
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D51F8 push r14; retf 2_2_00000001400D525B
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5210 push rbp; retf 2_2_00000001400D5213
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5220 push rsi; retf 2_2_00000001400D51F3
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5220 push rsi; retf 2_2_00000001400D522B
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5218 push rbp; retf 2_2_00000001400D521B
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5230 push r14; retf 2_2_00000001400D5233
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5228 push rsi; retf 2_2_00000001400D522B
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014007C600 ExitProcess,OpenMutexA,ExitProcess,CreateMutexA,CreateMutexExA,ExitProcess,ReleaseMutex,CloseHandle,2_2_000000014007C600
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_2-68365
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_2-68007
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400BB500 FindClose,FindFirstFileExW,GetLastError,2_2_00000001400BB500
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400BB5B0 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,2_2_00000001400BB5B0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D5100 FindFirstFileW,2_2_00000001400D5100
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D54A0 FindFirstFileExW,2_2_00000001400D54A0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400873F0 GetLogicalDriveStringsW,2_2_00000001400873F0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140099038 VirtualQuery,GetSystemInfo,VirtualAlloc,VirtualProtect,2_2_0000000140099038
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: D:\sources\migration\Jump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: D:\sources\replacementmanifests\Jump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: D:\sources\migration\wtr\Jump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: D:\sources\replacementmanifests\microsoft-activedirectory-webservices\Jump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: D:\sources\replacementmanifests\microsoft-client-license-platform-service-migration\Jump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: D:\sources\replacementmanifests\hwvid-migration-2\Jump to behavior
              Source: 5LEXIucyEP.exeBinary or memory string: VBoxGuest
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
              Source: 5LEXIucyEP.exeBinary or memory string: VBoxMouse
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
              Source: 5LEXIucyEP.exeBinary or memory string: VBoxTray
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
              Source: 5LEXIucyEP.exe, 00000002.00000002.1540891848.000002762F467000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
              Source: 5LEXIucyEP.exe, 00000002.00000002.1540891848.000002762F4CC000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1451202145.000002762F4E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
              Source: 5LEXIucyEP.exeBinary or memory string: VBoxMRXNP
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
              Source: 5LEXIucyEP.exeBinary or memory string: VBoxHook
              Source: 5LEXIucyEP.exeBinary or memory string: VBoxSF
              Source: 5LEXIucyEP.exe, 00000002.00000003.1457163680.0000027632093000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeAPI call chain: ExitProcess graph end nodegraph_2-67944
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeAPI call chain: ExitProcess graph end nodegraph_2-67949
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeSystem information queried: ModuleInformationJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014008A430 RtlAcquirePebLock,NtAllocateVirtualMemory,lstrcpyW,lstrcatW,NtAllocateVirtualMemory,lstrcpyW,RtlInitUnicodeString,RtlInitUnicodeString,LdrEnumerateLoadedModules,RtlReleasePebLock,CoInitializeEx,lstrcpyW,lstrcatW,CoGetObject,lstrcpyW,lstrcatW,CoGetObject,CoUninitialize,2_2_000000014008A430
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400AF2B8 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00000001400AF2B8
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400BD804 GetLastError,IsDebuggerPresent,OutputDebugStringW,2_2_00000001400BD804
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014003D570 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,2_2_000000014003D570
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400A9EEC GetProcessHeap,2_2_00000001400A9EEC
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D52C0 RtlLookupFunctionEntry,SetUnhandledExceptionFilter,2_2_00000001400D52C0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400AF2B8 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00000001400AF2B8
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400D52E0 SetUnhandledExceptionFilter,2_2_00000001400D52E0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400AF498 SetUnhandledExceptionFilter,2_2_00000001400AF498
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140097F68 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0000000140097F68

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeMemory written: C:\Users\user\Desktop\5LEXIucyEP.exe base: 140000000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeThread register set: target process: 4040Jump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_000000014007B420 ShellExecuteW,2_2_000000014007B420
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeProcess created: C:\Users\user\Desktop\5LEXIucyEP.exe C:\Users\user\Desktop\5LEXIucyEP.exeJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400ADF10 cpuid 2_2_00000001400ADF10
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: GetLocaleInfoW,2_2_000000014009E020
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: EnumSystemLocalesW,2_2_00000001400A9030
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_00000001400A90C8
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: GetLocaleInfoEx,FormatMessageA,2_2_00000001400BB170
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: GetLocaleInfoW,2_2_00000001400A9310
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: GetLocaleInfoW,2_2_00000001400D53A0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: EnumSystemLocalesW,2_2_00000001400D53B8
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_00000001400A9468
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: GetLocaleInfoW,2_2_00000001400A9518
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_00000001400A964C
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: EnumSystemLocalesW,2_2_000000014009DAE0
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,2_2_00000001400A8C04
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: EnumSystemLocalesW,2_2_00000001400A8F60
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeKey value queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\TimeZoneInformation TimeZoneKeyNameJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 0_2_00007FF607DC0214 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF607DC0214
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_0000000140086150 GetUserNameW,2_2_0000000140086150
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeCode function: 2_2_00000001400876A0 GetTimeZoneInformation,2_2_00000001400876A0

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: Process Memory Space: 5LEXIucyEP.exe PID: 4040, type: MEMORYSTR
              Source: Yara matchFile source: 2.2.5LEXIucyEP.exe.140000000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5LEXIucyEP.exe.140000000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.1540891848.000002762F467000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 5LEXIucyEP.exe PID: 4040, type: MEMORYSTR
              Source: 5LEXIucyEP.exe, 00000002.00000002.1540891848.000002762F467000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Electrum-LTC\wallets
              Source: 5LEXIucyEP.exe, 00000002.00000002.1540891848.000002762F467000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ElectronCash\config
              Source: 5LEXIucyEP.exe, 00000002.00000002.1540891848.000002762F467000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb
              Source: 5LEXIucyEP.exe, 00000002.00000002.1540891848.000002762F467000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: CExodus
              Source: 5LEXIucyEP.exe, 00000002.00000002.1540891848.000002762F467000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Ethereum\keystore
              Source: 5LEXIucyEP.exe, 00000002.00000002.1540891848.000002762F467000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Ethereum\keystore
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\monero-project\monero-coreJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cookies.sqliteJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\MANIFEST-000001Jump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENTJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\key4.dbJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\prefs.jsJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqliteJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOCKJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOGJump to behavior
              Source: C:\Users\user\Desktop\5LEXIucyEP.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: Process Memory Space: 5LEXIucyEP.exe PID: 4040, type: MEMORYSTR
              Source: Yara matchFile source: 2.2.5LEXIucyEP.exe.140000000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5LEXIucyEP.exe.140000000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.1540891848.000002762F467000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 5LEXIucyEP.exe PID: 4040, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
              Native API
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              1
              Access Token Manipulation
              1
              OS Credential Dumping
              12
              System Time Discovery
              Remote Services1
              Screen Capture
              21
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              Access Token Manipulation
              211
              Process Injection
              LSASS Memory31
              Security Software Discovery
              Remote Desktop Protocol1
              Email Collection
              1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)211
              Process Injection
              1
              Deobfuscate/Decode Files or Information
              Security Account Manager2
              Process Discovery
              SMB/Windows Admin Shares1
              Archive Collected Data
              2
              Ingress Tool Transfer
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              DLL Side-Loading
              2
              Obfuscated Files or Information
              NTDS1
              Account Discovery
              Distributed Component Object Model2
              Data from Local System
              2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets1
              System Owner/User Discovery
              SSHKeylogging3
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
              System Network Configuration Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync3
              File and Directory Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem35
              System Information Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              5LEXIucyEP.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              api.ipify.org
              172.67.74.152
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                https://api.ipify.org/false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://support.mozilla.org5LEXIucyEP.exe, 00000002.00000003.1465139750.0000027632175000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1467258643.00000276327AE000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464214839.0000027632120000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464016665.000002763137D000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464214839.0000027632118000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464016665.0000027631358000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464476407.0000027632088000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464016665.0000027631375000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1465335650.0000027631515000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464707186.0000027632048000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464214839.000002763216D000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1465335650.000002763151D000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464016665.0000027631350000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1464476407.0000027632090000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://ns.microsoft.t/Regi5LEXIucyEP.exe, 00000002.00000003.1450618694.00000276317E1000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1540209214.00000276317F0000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1540179135.00000276317F0000.00000004.00000020.00020000.00000000.sdmp, 5LEXIucyEP.exe, 00000002.00000003.1540293246.00000276317F4000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br5LEXIucyEP.exe, 00000002.00000003.1464016665.0000027631385000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://support.mozilla.org/products/firefoxgro.allizom.troppus.elMx_wJzrE6l5LEXIucyEP.exe, 00000002.00000003.1464016665.0000027631385000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          193.3.19.151
                          unknownDenmark
                          2107ARNES-NETAcademicandResearchNetworkofSloveniaSItrue
                          172.67.74.152
                          api.ipify.orgUnited States
                          13335CLOUDFLARENETUSfalse
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1558094
                          Start date and time:2024-11-18 23:46:07 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 4m 42s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:7
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:5LEXIucyEP.exe
                          renamed because original name is a hash value
                          Original Sample Name:42a5c60fadb3b94505babe3561507a50.exe
                          Detection:MAL
                          Classification:mal100.troj.spyw.evad.winEXE@3/0@1/2
                          EGA Information:
                          • Successful, ratio: 50%
                          HCA Information:
                          • Successful, ratio: 65%
                          • Number of executed functions: 82
                          • Number of non-executed functions: 116
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Stop behavior analysis, all processes terminated
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Execution Graph export aborted for target 5LEXIucyEP.exe, PID 3344 because there are no executed function
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Report size exceeded maximum capacity and may have missing network information.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • VT rate limit hit for: 5LEXIucyEP.exe
                          No simulations
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          193.3.19.15144qLDKzsfO.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                            gP5rh6fa0S.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              urkOkB0BdX.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                8F0oMWUhg7.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  172.67.74.1522b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
                                  • api.ipify.org/
                                  Zc9eO57fgF.elfGet hashmaliciousUnknownBrowse
                                  • api.ipify.org/
                                  67065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
                                  • api.ipify.org/
                                  Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                                  • api.ipify.org/
                                  4F08j2Rmd9.binGet hashmaliciousXmrigBrowse
                                  • api.ipify.org/
                                  y8tCHz7CwC.binGet hashmaliciousXmrigBrowse
                                  • api.ipify.org/
                                  file.exeGet hashmaliciousUnknownBrowse
                                  • api.ipify.org/
                                  file.exeGet hashmaliciousUnknownBrowse
                                  • api.ipify.org/
                                  file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                  • api.ipify.org/
                                  file.exeGet hashmaliciousRDPWrap ToolBrowse
                                  • api.ipify.org/
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  api.ipify.org44qLDKzsfO.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 104.26.12.205
                                  gP5rh6fa0S.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 104.26.12.205
                                  spacers.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.12.205
                                  https://drive.google.com/uc?export=download&id=1YBKJhy1GWwuEta_1b7KX-jKtXfpHDuuYGet hashmaliciousHTMLPhisherBrowse
                                  • 104.26.12.205
                                  urkOkB0BdX.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 172.67.74.152
                                  8F0oMWUhg7.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 104.26.12.205
                                  [Inquiry] mv Palmela - CE replacement at your port, oa Nov. 22nd.scr.exeGet hashmaliciousAgentTeslaBrowse
                                  • 172.67.74.152
                                  Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                  • 104.26.13.205
                                  Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                  • 104.26.13.205
                                  SOA.exeGet hashmaliciousAgentTeslaBrowse
                                  • 104.26.13.205
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  ARNES-NETAcademicandResearchNetworkofSloveniaSI44qLDKzsfO.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 193.3.19.151
                                  gP5rh6fa0S.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 193.3.19.151
                                  urkOkB0BdX.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 193.3.19.151
                                  8F0oMWUhg7.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 193.3.19.151
                                  botx.mpsl.elfGet hashmaliciousMiraiBrowse
                                  • 95.87.151.60
                                  yakuza.mips.elfGet hashmaliciousUnknownBrowse
                                  • 194.249.92.194
                                  HRU6b08mmd.exeGet hashmaliciousAmadey, Healer AV Disabler, PureLog Stealer, RedLineBrowse
                                  • 193.3.19.154
                                  Josho.x86.elfGet hashmaliciousUnknownBrowse
                                  • 95.87.138.87
                                  h0r0zx00x.x86.elfGet hashmaliciousMiraiBrowse
                                  • 141.255.194.230
                                  belks.ppc.elfGet hashmaliciousMiraiBrowse
                                  • 95.87.151.62
                                  CLOUDFLARENETUSfile.exeGet hashmaliciousLummaCBrowse
                                  • 188.114.97.3
                                  file.exeGet hashmaliciousLummaC, Ailurophile Stealer, Amadey, LummaC Stealer, StealcBrowse
                                  • 188.114.96.3
                                  https://viewstripo.email/680864d7-5609-4e6a-8914-c4d257d4c5ee1731949744848Get hashmaliciousUnknownBrowse
                                  • 188.114.97.3
                                  Play audio message wav from Ann & Cory Ellis (Work).pdfGet hashmaliciousUnknownBrowse
                                  • 1.1.1.1
                                  file.exeGet hashmaliciousAilurophile StealerBrowse
                                  • 104.26.8.59
                                  file.exeGet hashmaliciousLummaCBrowse
                                  • 188.114.97.3
                                  44qLDKzsfO.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 104.26.12.205
                                  file.exeGet hashmaliciousLummaCBrowse
                                  • 188.114.97.3
                                  https://experteau.lawgovexperts.com/Fp0c8/Get hashmaliciousUnknownBrowse
                                  • 104.17.25.14
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  37f463bf4616ecd445d4a1937da06e1944qLDKzsfO.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 172.67.74.152
                                  Fluor RFQ1475#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                  • 172.67.74.152
                                  Statement_of_account.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                  • 172.67.74.152
                                  gP5rh6fa0S.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 172.67.74.152
                                  Fac.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                  • 172.67.74.152
                                  urkOkB0BdX.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 172.67.74.152
                                  8F0oMWUhg7.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 172.67.74.152
                                  P6uSqL3TTL.exeGet hashmaliciousGhostRat, Mimikatz, NitolBrowse
                                  • 172.67.74.152
                                  Factura Honorarios 2024-11-17.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                  • 172.67.74.152
                                  JOSHHHHHH.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                  • 172.67.74.152
                                  No context
                                  No created / dropped files found
                                  File type:PE32+ executable (GUI) x86-64, for MS Windows
                                  Entropy (8bit):5.077605010295228
                                  TrID:
                                  • Win64 Executable GUI (202006/5) 92.65%
                                  • Win64 Executable (generic) (12005/4) 5.51%
                                  • Generic Win/DOS Executable (2004/3) 0.92%
                                  • DOS Executable Generic (2002/1) 0.92%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:5LEXIucyEP.exe
                                  File size:4'270'080 bytes
                                  MD5:42a5c60fadb3b94505babe3561507a50
                                  SHA1:ade46a914ffefa4b1d8b791fbfdf07531c362e44
                                  SHA256:a39cb2c31b6724eaa78f60fe29ced83e50ffad7e39efd604a7debdac63a2a80e
                                  SHA512:d98f41807a0fa8edb5a2f2b054985d753e18deaa06e768045dcab7a108e15ae95dabb0c35506e652dd61d039da43d71d9576638d3ec85ffe46d21e4d18285611
                                  SSDEEP:49152:/xGK0l3e3ubXWCC5JJhZs0wFF2d1vJ2Z:/xGK09yuZZ
                                  TLSH:F916E067FD4065FED874903488970777A67BB480873287DB1698262A2E5BBD42F3BF40
                                  File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...z.9g.........."...........9................@..............................A...........`........................................
                                  Icon Hash:00928e8e8686b000
                                  Entrypoint:0x140050200
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x140000000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x6739EB7A [Sun Nov 17 13:11:22 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:6
                                  OS Version Minor:0
                                  File Version Major:6
                                  File Version Minor:0
                                  Subsystem Version Major:6
                                  Subsystem Version Minor:0
                                  Import Hash:78c9da53bf2d072d61b49d02beb24690
                                  Instruction
                                  dec eax
                                  sub esp, 28h
                                  call 00007F198C6DA4E0h
                                  dec eax
                                  add esp, 28h
                                  jmp 00007F198C6DA34Fh
                                  int3
                                  int3
                                  dec eax
                                  mov dword ptr [esp+18h], ebx
                                  push ebp
                                  dec eax
                                  mov ebp, esp
                                  dec eax
                                  sub esp, 30h
                                  dec eax
                                  mov eax, dword ptr [003B6E18h]
                                  dec eax
                                  mov ebx, 2DDFA232h
                                  cdq
                                  sub eax, dword ptr [eax]
                                  add byte ptr [eax+3Bh], cl
                                  ret
                                  jne 00007F198C6DA546h
                                  dec eax
                                  and dword ptr [ebp+10h], 00000000h
                                  dec eax
                                  lea ecx, dword ptr [ebp+10h]
                                  call dword ptr [003AC17Ah]
                                  dec eax
                                  mov eax, dword ptr [ebp+10h]
                                  dec eax
                                  mov dword ptr [ebp-10h], eax
                                  call dword ptr [003AC0CCh]
                                  mov eax, eax
                                  dec eax
                                  xor dword ptr [ebp-10h], eax
                                  call dword ptr [003AC0B8h]
                                  mov eax, eax
                                  dec eax
                                  lea ecx, dword ptr [ebp+18h]
                                  dec eax
                                  xor dword ptr [ebp-10h], eax
                                  call dword ptr [003AC228h]
                                  mov eax, dword ptr [ebp+18h]
                                  dec eax
                                  lea ecx, dword ptr [ebp-10h]
                                  dec eax
                                  shl eax, 20h
                                  dec eax
                                  xor eax, dword ptr [ebp+18h]
                                  dec eax
                                  xor eax, dword ptr [ebp-10h]
                                  dec eax
                                  xor eax, ecx
                                  dec eax
                                  mov ecx, FFFFFFFFh
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x3fbdd80x50.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x4190000x1a8.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x40b0000x65e8.pdata
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x41a0000x1e18.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x3efd800x28.rdata
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xe60a00x140.rdata
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x3fc2080x3e0.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x795460x79600186e011cfbf8022fa84d5f0ef4ee3df7False0.4946133174562307data6.440568316909284IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x7b0000x38bf440x38c000fb086edab81677abac65333d32e442ecunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0x4070000x36f80x1c007568d2f08f4ac81dae4d5e33ab60923aFalse0.17047991071428573zlib compressed data3.5531018656709605IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .pdata0x40b0000x65e80x66004edc9593f97b9b4e42d309e7db70aca7False0.48330269607843135data5.764133465668278IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .00cfg0x4120000x380x200c8b156cca6c1f20e90ecbf8f3612fd39False0.072265625data0.4716713977505448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .gxfg0x4130000x22000x2200a3fb3e1da377202334d413fbe0e439a4False0.4314108455882353data5.230691552229934IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .retplne0x4160000x8c0x2008c950f651287cbc1296bcb4e8cd7e990False0.126953125data1.050583247971927
                                  .tls0x4170000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  _RDATA0x4180000x1f40x200b9c7c28bbb6fccd97a8b522b747b58b7False0.541015625data4.238899079513315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .rsrc0x4190000x1a80x200d38b4cd68eb239a7aa6a06b6f8091e1dFalse0.484375data4.179663701400347IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x41a0000x1e180x200013f065f7aeef4dbbab821942b99113abFalse0.6956787109375data6.3753774469932685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_MANIFEST0x4190600x143XML 1.0 document, ASCII textEnglishUnited States0.628482972136223
                                  DLLImport
                                  USER32.dllGetRawInputDeviceInfoW, GetRawInputDeviceList
                                  KERNEL32.dllAcquireSRWLockExclusive, AreFileApisANSI, CloseHandle, CreateFileMappingW, CreateFileW, CreateProcessW, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindFirstFileW, FindNextFileW, FlsAlloc, FlsFree, FlsGetValue, FlsSetValue, FlushFileBuffers, FormatMessageA, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeProcess, GetFileAttributesExW, GetFileInformationByHandleEx, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoEx, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemInfo, GetSystemTimeAsFileTime, GetThreadContext, GetUserDefaultLCID, GlobalAlloc, GlobalFree, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSection, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, K32EnumDeviceDrivers, K32GetDeviceDriverBaseNameW, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryA, LoadLibraryExW, LocalFree, MapViewOfFile, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReadProcessMemory, ReleaseSRWLockExclusive, ResumeThread, RtlCaptureContext, RtlLookupFunctionEntry, RtlPcToFileHeader, RtlUnwind, RtlUnwindEx, RtlVirtualUnwind, SetFilePointerEx, SetLastError, SetStdHandle, SetThreadContext, SetUnhandledExceptionFilter, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryAcquireSRWLockExclusive, UnhandledExceptionFilter, UnmapViewOfFile, VirtualAlloc, VirtualAllocEx, VirtualFree, VirtualProtect, VirtualQuery, VirtualQueryEx, WaitForSingleObject, WideCharToMultiByte, WriteConsoleW, WriteFile, WriteProcessMemory
                                  MPR.dllWNetCloseEnum, WNetEnumResourceA, WNetOpenEnumA
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2024-11-18T23:47:14.323644+01002049441ET MALWARE Win32/Unknown Grabber Base64 Data Exfiltration Attempt1192.168.2.849705193.3.19.15115666TCP
                                  2024-11-18T23:47:14.323644+01002050806ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M21192.168.2.849705193.3.19.15115666TCP
                                  2024-11-18T23:47:14.323644+01002050807ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP)1192.168.2.849705193.3.19.15115666TCP
                                  2024-11-18T23:47:14.328691+01002050806ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M21192.168.2.849705193.3.19.15115666TCP
                                  2024-11-18T23:47:14.328691+01002050807ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP)1192.168.2.849705193.3.19.15115666TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 18, 2024 23:47:07.221446991 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:07.226459980 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:07.226538897 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:08.251432896 CET49706443192.168.2.8172.67.74.152
                                  Nov 18, 2024 23:47:08.251461029 CET44349706172.67.74.152192.168.2.8
                                  Nov 18, 2024 23:47:08.251688957 CET49706443192.168.2.8172.67.74.152
                                  Nov 18, 2024 23:47:08.396130085 CET49706443192.168.2.8172.67.74.152
                                  Nov 18, 2024 23:47:08.396162987 CET44349706172.67.74.152192.168.2.8
                                  Nov 18, 2024 23:47:09.639226913 CET44349706172.67.74.152192.168.2.8
                                  Nov 18, 2024 23:47:09.639338017 CET49706443192.168.2.8172.67.74.152
                                  Nov 18, 2024 23:47:09.691795111 CET49706443192.168.2.8172.67.74.152
                                  Nov 18, 2024 23:47:09.691809893 CET44349706172.67.74.152192.168.2.8
                                  Nov 18, 2024 23:47:09.692781925 CET44349706172.67.74.152192.168.2.8
                                  Nov 18, 2024 23:47:09.692866087 CET49706443192.168.2.8172.67.74.152
                                  Nov 18, 2024 23:47:09.693902016 CET49706443192.168.2.8172.67.74.152
                                  Nov 18, 2024 23:47:09.735321999 CET44349706172.67.74.152192.168.2.8
                                  Nov 18, 2024 23:47:09.895489931 CET44349706172.67.74.152192.168.2.8
                                  Nov 18, 2024 23:47:09.895561934 CET49706443192.168.2.8172.67.74.152
                                  Nov 18, 2024 23:47:09.895575047 CET44349706172.67.74.152192.168.2.8
                                  Nov 18, 2024 23:47:09.895620108 CET49706443192.168.2.8172.67.74.152
                                  Nov 18, 2024 23:47:09.895664930 CET44349706172.67.74.152192.168.2.8
                                  Nov 18, 2024 23:47:09.895715952 CET49706443192.168.2.8172.67.74.152
                                  Nov 18, 2024 23:47:09.895838976 CET49706443192.168.2.8172.67.74.152
                                  Nov 18, 2024 23:47:09.895852089 CET44349706172.67.74.152192.168.2.8
                                  Nov 18, 2024 23:47:14.323643923 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.328613043 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.328638077 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.328664064 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.328676939 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.328691006 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.328720093 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.328744888 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.328757048 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.328783035 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.328799009 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.328814030 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.328814983 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.328830957 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.328849077 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.328860044 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.328882933 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.328979015 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.329029083 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.335585117 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.335601091 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.335695982 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.335700989 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.335709095 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.335716009 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.335721016 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.335799932 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.335829973 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.335874081 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.336241961 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.336322069 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.336357117 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.336414099 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.336874008 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.336930037 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.340677023 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.340769053 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.341017008 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.341090918 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.341099024 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.341156960 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.341186047 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.341227055 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.341233969 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.341289997 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.341864109 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.342026949 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.342480898 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.342494011 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.342509031 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.342531919 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.342551947 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.342566013 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.342580080 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.342590094 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.342592955 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.342624903 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.342637062 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.342643023 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.342648029 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.342693090 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.343365908 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.343379021 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.343416929 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.343426943 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.343429089 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.343441963 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.343480110 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.346012115 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346076965 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.346288919 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346302986 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346327066 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346339941 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346348047 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.346365929 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.346385002 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346402884 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346412897 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.346415043 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346466064 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.346499920 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.346506119 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346556902 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.346628904 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346678019 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.346714020 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346726894 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346745014 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346757889 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346769094 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.346782923 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.346807003 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.346853018 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346867085 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346878052 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346892118 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346904993 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346910000 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.346920967 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.346930981 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.346959114 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.346985102 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.347110033 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.347161055 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.347563028 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.347620010 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.347656012 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.347703934 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.347784042 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.347796917 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.347820044 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.347831964 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.347832918 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.347841978 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.347866058 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.347878933 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.347889900 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.347908020 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.347915888 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.347920895 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.347949028 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.347966909 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.347978115 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.348032951 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.348032951 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.348081112 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349330902 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349356890 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349380016 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349389076 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349402905 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349432945 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349451065 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349456072 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349469900 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349499941 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349503994 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349515915 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349522114 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349549055 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349565983 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349566936 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349580050 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349616051 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349627018 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349628925 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349642038 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349657059 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349675894 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349689007 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349699020 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349709034 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349723101 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349735022 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349739075 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349767923 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349792957 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349802971 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349817038 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349848032 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349858999 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349880934 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349893093 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349926949 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349936962 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.349953890 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349966049 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.349981070 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.350009918 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.350023985 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.351625919 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.351639032 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.351664066 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.351675987 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.351681948 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.351701975 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.351716995 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.351728916 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.351730108 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.351773024 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.351798058 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.351810932 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.351824999 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.351847887 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.351861000 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.351874113 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.351878881 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.351918936 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.352272034 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.352287054 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.352334976 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.352335930 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.352349043 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.352360964 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.352380991 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.352385044 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.352391005 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.352397919 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.352426052 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.352427959 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.352451086 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.352458000 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.352472067 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.352473974 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.352503061 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.352525949 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.352997065 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353022099 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353049994 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353065968 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353086948 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353099108 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353136063 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353147984 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353182077 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353195906 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353207111 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353230953 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353236914 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353244066 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353255987 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353264093 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353269100 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353281021 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353285074 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353302002 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353307009 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353318930 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353336096 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353342056 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353348970 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353354931 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353389025 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353442907 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353456020 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353487968 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353491068 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353501081 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353504896 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353538036 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353539944 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353553057 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353553057 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353586912 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353590965 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353596926 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353604078 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353615999 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353638887 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353641033 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353652000 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353656054 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353663921 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353684902 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353722095 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353723049 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353734970 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353770971 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353796959 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353807926 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353833914 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353882074 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353897095 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353910923 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353923082 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353945017 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.353952885 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.353967905 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.354023933 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.355046988 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355058908 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355071068 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355093002 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355104923 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355130911 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355139017 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.355143070 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355158091 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355170965 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355196953 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355220079 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355221987 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.355232954 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355247974 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355253935 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.355281115 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.355321884 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.355326891 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355340958 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355375051 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.355396986 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.355494976 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355509043 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355531931 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355539083 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.355559111 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.355575085 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355582952 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.355587959 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355624914 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.355624914 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355638981 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355638981 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.355650902 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355667114 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355669975 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.355696917 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.355714083 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.355931044 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355942965 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.355988979 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.355994940 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356020927 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356048107 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356065989 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356110096 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356170893 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356199980 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356213093 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356225014 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356245995 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356267929 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356278896 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356281042 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356304884 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356317043 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356317997 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356348038 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356360912 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356373072 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356383085 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356389999 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356396914 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356414080 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356419086 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356426954 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356451035 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356488943 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356494904 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356512070 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356522083 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356554985 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356565952 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356579065 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356580973 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356590033 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356616020 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356616974 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356628895 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356657982 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356673956 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356682062 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356686115 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356694937 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356707096 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356719017 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356729031 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356746912 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356760025 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356764078 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356772900 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356786013 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356802940 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356811047 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356823921 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356832981 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356836081 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356848001 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356848955 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356873989 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356888056 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356890917 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356899023 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356915951 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356915951 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356928110 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.356950045 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.356971979 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.357089996 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.357127905 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.357139111 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.357177019 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.357177973 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.357223034 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.357302904 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.357316017 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.357327938 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.357340097 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.357350111 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.357352018 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.357372999 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.357378006 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.357388973 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.357391119 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.357403994 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.357405901 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.357418060 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.357439995 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.357445955 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.357451916 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.357465029 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.357476950 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.357489109 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.357490063 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.357501030 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.357505083 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.357517004 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.357527018 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.357553005 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.357578993 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.358865023 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.358877897 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.358890057 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.358905077 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.358935118 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.358952045 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.358957052 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.358969927 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.359005928 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.359009981 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.359019995 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.359023094 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.359057903 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.359061956 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.359071016 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.359075069 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.359095097 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.359110117 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.359111071 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.359124899 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.359141111 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.359152079 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.359188080 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.359200954 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.359213114 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.359226942 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.359241009 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.359251976 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.359261036 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.359266043 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.359278917 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.359292984 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.359323978 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.359325886 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.359339952 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.359344006 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.359352112 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.359365940 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.359395027 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360109091 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360124111 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360147953 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360160112 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360172033 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360188007 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360193014 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360205889 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360217094 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360230923 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360240936 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360253096 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360260010 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360275984 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360287905 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360291004 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360318899 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360335112 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360384941 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360398054 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360411882 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360424995 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360433102 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360450983 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360450983 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360464096 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360476971 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360482931 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360488892 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360502005 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360513926 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360526085 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360538006 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360538960 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360551119 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360568047 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360575914 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360589027 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360601902 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360605001 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360619068 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360625982 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360644102 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360656977 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360667944 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360685110 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360696077 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360697985 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360709906 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360723972 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360738993 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360750914 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360758066 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360764980 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360775948 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360807896 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360814095 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360826015 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360829115 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360837936 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360850096 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360861063 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360883951 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360892057 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360897064 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360955954 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360951900 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.360970020 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360982895 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.360996008 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361000061 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361008883 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361021996 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361022949 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361038923 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361056089 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361066103 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361079931 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361093998 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361107111 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361133099 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361150026 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361155033 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361171007 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361212015 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361212015 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361223936 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361248970 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361255884 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361263037 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361268997 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361285925 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361295938 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361299038 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361311913 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361325026 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361335039 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361346960 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361347914 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361358881 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361393929 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361524105 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361536980 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361574888 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361579895 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361588955 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361593008 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361625910 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361639977 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361653090 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361675978 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361699104 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361707926 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361715078 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361738920 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361759901 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361783981 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361900091 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361912966 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361924887 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361938000 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361959934 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.361967087 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361989021 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.361999989 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.362011909 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.362021923 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.362025023 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.362049103 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.362063885 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.362075090 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.362076044 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.362113953 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.362127066 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.362128973 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.362174034 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.406480074 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.406766891 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.406861067 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.406919956 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.406984091 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.407042027 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.407103062 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.407156944 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.407239914 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.407322884 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.407407045 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.407461882 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.407525063 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.446429014 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.446726084 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.446808100 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.446856022 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.446913958 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.446929932 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.452085018 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.452327967 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.452408075 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.452447891 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.494368076 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.494509935 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.546369076 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.546478033 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.562870979 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.563143015 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.563218117 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.563270092 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.563328981 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.563388109 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.563456059 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.563507080 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.563565969 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.563617945 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.563677073 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.563731909 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.563800097 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.563831091 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.571644068 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.571712971 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.614365101 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.614715099 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.614842892 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.614914894 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.614993095 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.615057945 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.615151882 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.615222931 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.615305901 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.615389109 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.615473032 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.621877909 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.622109890 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.622222900 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.622271061 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.662507057 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.662713051 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.662810087 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.705455065 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.705543041 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.705590010 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.705703020 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.705755949 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.705852032 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.705926895 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.706006050 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.706082106 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.706154108 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.706226110 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.706307888 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.706356049 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.710773945 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.710962057 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.754302025 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.754463911 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.802449942 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.802524090 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.803462982 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.803642988 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.804059982 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.804116011 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.804116011 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.804171085 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.804230928 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.804279089 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.804337025 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.804387093 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.804441929 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.804492950 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.804555893 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.804615021 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.804678917 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.804692984 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.807533979 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.807594061 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.808604956 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.808651924 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.808701038 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.808723927 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.808725119 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.808756113 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.808790922 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.808809042 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.808837891 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.808856010 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.808871984 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.808875084 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.808897018 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.808928967 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.808990955 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.809040070 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.809047937 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.809068918 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.809094906 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.809103966 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.809120893 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.809123039 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.809149027 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.809149981 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.809176922 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.809178114 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.809201956 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.809205055 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.809231997 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.809233904 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.809264898 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.809266090 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.809292078 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.809313059 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.809319019 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.809339046 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.809362888 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.850372076 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.850640059 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.851063967 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.851114988 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.851159096 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.851216078 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.851258039 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.851330042 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.851382017 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.851438999 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.851490021 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.851552963 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.851592064 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.872093916 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.872168064 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.872286081 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.872500896 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.872581005 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.872638941 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.872684956 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.872710943 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.872766972 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.872838020 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.872895002 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.872956991 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.873017073 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.873086929 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.873147011 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.877548933 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.877791882 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.877876043 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.877919912 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.918332100 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.918442011 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.949224949 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.949346066 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.949482918 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.949572086 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.949626923 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.949646950 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.949704885 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.949752092 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.949806929 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.949856997 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.949912071 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.949968100 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.950045109 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.950114012 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.950180054 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.950237036 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.950303078 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.950345039 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.954477072 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.954540968 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.998425007 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:14.998785973 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.998872995 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.998933077 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.998986959 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.999030113 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.999089003 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.999133110 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.999182940 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.999231100 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:14.999291897 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:15.017532110 CET1566649705193.3.19.151192.168.2.8
                                  Nov 18, 2024 23:47:15.017848969 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:15.017918110 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:15.017968893 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:15.018018007 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:15.018065929 CET4970515666192.168.2.8193.3.19.151
                                  Nov 18, 2024 23:47:15.018110037 CET4970515666192.168.2.8193.3.19.151
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Nov 18, 2024 23:47:08.235263109 CET192.168.2.81.1.1.10xbd21Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Nov 18, 2024 23:47:08.242255926 CET1.1.1.1192.168.2.80xbd21No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                  Nov 18, 2024 23:47:08.242255926 CET1.1.1.1192.168.2.80xbd21No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                  Nov 18, 2024 23:47:08.242255926 CET1.1.1.1192.168.2.80xbd21No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.849706172.67.74.1524434040C:\Users\user\Desktop\5LEXIucyEP.exe
                                  TimestampBytes transferredDirectionData
                                  2024-11-18 22:47:09 UTC100OUTGET / HTTP/1.1
                                  Accept: text/html; text/plain; */*
                                  Host: api.ipify.org
                                  Cache-Control: no-cache
                                  2024-11-18 22:47:09 UTC398INHTTP/1.1 200 OK
                                  Date: Mon, 18 Nov 2024 22:47:09 GMT
                                  Content-Type: text/plain
                                  Content-Length: 14
                                  Connection: close
                                  Vary: Origin
                                  CF-Cache-Status: DYNAMIC
                                  Server: cloudflare
                                  CF-RAY: 8e4b802e19785390-DEN
                                  server-timing: cfL4;desc="?proto=TCP&rtt=22546&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2821&recv_bytes=738&delivery_rate=128591&cwnd=32&unsent_bytes=0&cid=394970f4fa6f53d4&ts=818&x=0"
                                  2024-11-18 22:47:09 UTC14INData Raw: 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37
                                  Data Ascii: 155.94.241.187


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:17:47:05
                                  Start date:18/11/2024
                                  Path:C:\Users\user\Desktop\5LEXIucyEP.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\5LEXIucyEP.exe"
                                  Imagebase:0x7ff607d70000
                                  File size:4'270'080 bytes
                                  MD5 hash:42A5C60FADB3B94505BABE3561507A50
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:2
                                  Start time:17:47:05
                                  Start date:18/11/2024
                                  Path:C:\Users\user\Desktop\5LEXIucyEP.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Users\user\Desktop\5LEXIucyEP.exe
                                  Imagebase:0x7ff607d70000
                                  File size:4'270'080 bytes
                                  MD5 hash:42A5C60FADB3B94505BABE3561507A50
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_MeduzaStealer, Description: Yara detected Meduza Stealer, Source: 00000002.00000002.1540891848.000002762F467000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_MeduzaStealer, Description: Yara detected Meduza Stealer, Source: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Reset < >
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1423341625.00007FF607D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF607D70000, based on PE: true
                                    • Associated: 00000000.00000002.1423321450.00007FF607D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1423389477.00007FF607DEB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1423389477.00007FF607E04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1423389477.00007FF60815F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1423606697.00007FF608177000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1423627912.00007FF60817B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1423627912.00007FF608183000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1423666914.00007FF608188000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff607d70000_5LEXIucyEP.jbxd
                                    Similarity
                                    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                    • String ID:
                                    • API String ID: 2933794660-0
                                    • Opcode ID: b7ee5f73d21c22f4c3e3b841111f855bb87ab456a378e60018242c68feb33e76
                                    • Instruction ID: 5e52f6137d7a06b7a951f38158256eaf7ca8628a2c666363cbd48b6253fe6d6f
                                    • Opcode Fuzzy Hash: b7ee5f73d21c22f4c3e3b841111f855bb87ab456a378e60018242c68feb33e76
                                    • Instruction Fuzzy Hash: AE111832B14B028AEB00CB70E8542B833B4FB59758F541E35EAAD867A4DF7CD1A4C380

                                    Execution Graph

                                    Execution Coverage:7.1%
                                    Dynamic/Decrypted Code Coverage:0.1%
                                    Signature Coverage:26.3%
                                    Total number of Nodes:1779
                                    Total number of Limit Nodes:58
                                    execution_graph 67784 14008c8c9 67785 14008c8f4 67784->67785 67786 14008c8df _Strcoll __scrt_get_show_window_mode 67784->67786 67785->67786 67788 140048e80 67785->67788 67789 14004900f 67788->67789 67793 140048eaf 67788->67793 67807 14002b8e0 24 API calls 67789->67807 67791 140048f19 67800 1400ae888 67791->67800 67792 140049014 67808 14002b820 24 API calls 2 library calls 67792->67808 67793->67791 67796 140048f48 67793->67796 67797 140048f0c 67793->67797 67799 140048eff ISource __scrt_get_show_window_mode BuildCatchObjectHelperInternal 67793->67799 67798 1400ae888 std::_Facet_Register 24 API calls 67796->67798 67797->67791 67797->67792 67798->67799 67799->67786 67802 1400ae893 67800->67802 67801 1400ae8ac 67801->67799 67802->67801 67804 1400ae8b2 Concurrency::cancel_current_task 67802->67804 67809 1400a9f1c 67802->67809 67812 14002b820 24 API calls 2 library calls 67804->67812 67806 1400ae8c3 67808->67799 67813 1400a9f5c 67809->67813 67812->67806 67818 14009c3bc EnterCriticalSection 67813->67818 67819 14004d9e6 67820 14004da02 67819->67820 67822 14004d5b0 67820->67822 67823 14004e200 67820->67823 67824 14004e21d 67823->67824 67825 14004e223 67823->67825 67826 14004e2a7 67824->67826 67853 140059fb0 67824->67853 67827 14004e23a 67825->67827 67838 140040ca0 67825->67838 67826->67822 67827->67824 67829 14004e2d4 67827->67829 67865 14002cdc0 24 API calls 67829->67865 67831 14004e316 Concurrency::cancel_current_task 67836 14004e355 67831->67836 67866 140048d10 67831->67866 67833 14004e400 67833->67822 67834 14004e200 24 API calls 67834->67836 67835 140048d10 24 API calls 67835->67836 67836->67833 67836->67834 67836->67835 67840 140040cdd 67838->67840 67839 140040ced ISource _Strcoll 67839->67827 67840->67839 67841 140040d51 67840->67841 67842 140040d73 67840->67842 67878 140094648 67841->67878 67844 140094648 23 API calls 67842->67844 67847 140040da1 BuildCatchObjectHelperInternal 67844->67847 67845 140048d10 24 API calls 67845->67847 67846 140040ec1 67846->67839 67852 140040ca0 24 API calls 67846->67852 67847->67845 67847->67846 67849 140094648 23 API calls 67847->67849 67851 140040f57 67847->67851 67848 140040feb 67848->67827 67849->67847 67851->67846 67897 140097754 23 API calls 3 library calls 67851->67897 67852->67848 67854 140059ffa 67853->67854 67863 14005a02a BuildCatchObjectHelperInternal 67853->67863 67855 14005a016 67854->67855 67859 14005a07a 67854->67859 67854->67863 67857 14005a156 67855->67857 67858 1400ae888 std::_Facet_Register 24 API calls 67855->67858 67902 14002b820 24 API calls 2 library calls 67857->67902 67858->67863 67860 1400ae888 std::_Facet_Register 24 API calls 67859->67860 67860->67863 67862 14005a15c 67864 14005a113 ISource 67863->67864 67901 140040640 24 API calls 67863->67901 67864->67826 67865->67831 67867 140048e65 67866->67867 67871 140048d3f 67866->67871 67903 14002b8e0 24 API calls 67867->67903 67868 140048da4 67872 1400ae888 std::_Facet_Register 24 API calls 67868->67872 67870 140048e6a 67904 14002b820 24 API calls 2 library calls 67870->67904 67871->67868 67874 140048d97 67871->67874 67875 140048dd3 67871->67875 67877 140048d8a ISource BuildCatchObjectHelperInternal 67871->67877 67872->67877 67874->67868 67874->67870 67876 1400ae888 std::_Facet_Register 24 API calls 67875->67876 67876->67877 67877->67836 67879 140094682 67878->67879 67880 140094664 67878->67880 67898 140094934 EnterCriticalSection 67879->67898 67899 140094e68 7 API calls _set_fmode 67880->67899 67883 140094669 67900 140098234 23 API calls _invalid_parameter_noinfo 67883->67900 67896 140094674 ProcessCodePage 67896->67839 67897->67851 67899->67883 67900->67896 67902->67862 67904->67877 67905 1400af0ac 67919 1400ae9d0 67905->67919 67907 1400af10b BuildCatchObjectHelperInternal 67908 1400af191 __scrt_get_show_window_mode 67925 1400bde08 67908->67925 67909 1400af0c0 __scrt_acquire_startup_lock __scrt_release_startup_lock 67909->67907 67909->67908 67993 1400a505c 23 API calls 67909->67993 67914 1400af1b2 67994 1400af444 GetModuleHandleW 67914->67994 67916 1400af1b9 67916->67907 67995 1400aeb54 DeleteCriticalSection 67916->67995 67918 1400af1d0 67918->67907 67920 1400ae9d8 67919->67920 67921 1400ae9e4 __scrt_dllmain_crt_thread_attach 67920->67921 67922 1400ae9ed 67921->67922 67923 1400ae9f1 67921->67923 67922->67909 67923->67922 67996 1400b0e6c DeleteCriticalSection __vcrt_uninitialize_ptd __vcrt_uninitialize_locks 67923->67996 67997 1400a64e4 67925->67997 67927 1400af19e 67930 14007c600 67927->67930 67928 1400bde17 67928->67927 68003 1400bec70 23 API calls TranslateName 67928->68003 68006 14007f820 GetCurrentProcess OpenProcessToken 67930->68006 67932 14007c620 67933 14007c624 67932->67933 67934 14007c64e 67932->67934 68205 14007fb60 25 API calls 2 library calls 67933->68205 68011 14008b9b0 GetCurrentProcess OpenProcessToken 67934->68011 67937 14007c65a 67939 14008b9b0 5 API calls 67937->67939 67938 14007c62e 68206 14008a780 52 API calls _Strcoll 67938->68206 67941 14007c666 67939->67941 68017 140088030 67941->68017 67942 14007c637 67944 14007c642 ExitProcess 67942->67944 67944->67934 67945 14007c670 68185 14007d030 67945->68185 67947 14007c6f6 ISource 67948 14007c734 OpenMutexA 67947->67948 67992 14007c859 ISource _Strcoll 67947->67992 67949 14007c76d ExitProcess 67948->67949 67950 14007c779 CreateMutexA 67948->67950 67949->67950 68189 1400766f0 67950->68189 67992->67914 67993->67908 67994->67916 67995->67918 67996->67922 67998 1400a64f1 67997->67998 68002 1400a6536 67997->68002 68004 140099fc0 28 API calls 3 library calls 67998->68004 68000 1400a6520 68005 1400a61bc 28 API calls 3 library calls 68000->68005 68002->67928 68003->67928 68004->68000 68005->68002 68007 14007f878 GetTokenInformation 68006->68007 68008 14007f8b4 68006->68008 68007->68008 68009 14007f8c1 CloseHandle 68008->68009 68010 14007f8cd _Strcoll 68008->68010 68009->68010 68010->67932 68012 14008ba1b LookupPrivilegeValueW 68011->68012 68014 14008ba86 68011->68014 68013 14008ba3c AdjustTokenPrivileges 68012->68013 68012->68014 68013->68014 68015 14008ba9a _Strcoll 68014->68015 68016 14008ba8e CloseHandle 68014->68016 68015->67937 68016->68015 68207 140086c70 GetCurrentHwProfileW 68017->68207 68019 140088073 68213 140086290 68019->68213 68021 140088139 68022 140088183 68021->68022 68376 14008fb34 24 API calls 68021->68376 68224 14008d4f0 68022->68224 68025 140088193 68028 1400881dc 68025->68028 68030 14008820c ISource BuildCatchObjectHelperInternal 68025->68030 68377 1400989b0 68025->68377 68027 1400882da ISource _Strcoll 68027->67945 68029 1400989b0 23 API calls 68028->68029 68028->68030 68029->68028 68030->68027 68236 140086540 68030->68236 68032 14008837f 68250 140086460 RegGetValueA 68032->68250 68034 14008838c 68252 140086860 68034->68252 68036 140088399 68266 140086150 68036->68266 68038 1400883a6 68272 1400861f0 68038->68272 68040 1400883b3 68041 140088030 105 API calls 68040->68041 68042 1400883bd 68041->68042 68278 140085fc0 68042->68278 68044 1400883c7 68282 14005d590 68044->68282 68046 1400883f1 68289 140041900 68046->68289 68048 14008844b 68049 140041900 24 API calls 68048->68049 68050 14008848e 68049->68050 68300 140043ff0 68050->68300 68052 1400884be 68053 14005d590 24 API calls 68052->68053 68054 1400884e7 68053->68054 68055 140041900 24 API calls 68054->68055 68056 140088536 68055->68056 68057 140041900 24 API calls 68056->68057 68058 140088585 68057->68058 68059 140043ff0 24 API calls 68058->68059 68060 1400885b5 68059->68060 68061 14005d590 24 API calls 68060->68061 68062 1400885de 68061->68062 68063 140041900 24 API calls 68062->68063 68064 14008862c 68063->68064 68065 140041900 24 API calls 68064->68065 68066 14008867b 68065->68066 68067 140043ff0 24 API calls 68066->68067 68068 1400886ab 68067->68068 68069 14005d590 24 API calls 68068->68069 68070 1400886d4 68069->68070 68071 140041900 24 API calls 68070->68071 68072 140088726 68071->68072 68073 140041900 24 API calls 68072->68073 68074 140088775 68073->68074 68075 140043ff0 24 API calls 68074->68075 68076 1400887a5 GlobalMemoryStatusEx 68075->68076 68077 1400887ce 68076->68077 68078 140043ff0 24 API calls 68077->68078 68079 140088810 68078->68079 68080 140041900 24 API calls 68079->68080 68081 14008886e 68080->68081 68082 140041900 24 API calls 68081->68082 68083 1400888be 68082->68083 68084 140043ff0 24 API calls 68083->68084 68085 1400888ee 68084->68085 68086 14005d590 24 API calls 68085->68086 68087 14008891a 68086->68087 68088 140041900 24 API calls 68087->68088 68089 140088968 68088->68089 68090 140041900 24 API calls 68089->68090 68091 1400889b7 68090->68091 68092 140043ff0 24 API calls 68091->68092 68093 1400889e7 68092->68093 68094 14005d590 24 API calls 68093->68094 68095 140088a0d 68094->68095 68096 140041900 24 API calls 68095->68096 68097 140088a5b 68096->68097 68098 140041900 24 API calls 68097->68098 68099 140088b1e 68098->68099 68100 140043ff0 24 API calls 68099->68100 68101 140088b4e 68100->68101 68327 140085b70 12 API calls 68101->68327 68103 140088b62 68349 140045310 68103->68349 68107 140088b94 68108 140041900 24 API calls 68107->68108 68109 140088be2 68108->68109 68110 140041900 24 API calls 68109->68110 68111 140088c9b 68110->68111 68112 140043ff0 24 API calls 68111->68112 68113 140088cc2 ISource 68112->68113 68120 1400898b2 ISource _Strcoll 68113->68120 68359 1400859a0 GetDesktopWindow GetWindowRect 68113->68359 68115 140088d77 68116 1400455e0 24 API calls 68115->68116 68117 140088d85 68116->68117 68118 140041900 24 API calls 68117->68118 68119 140088dd3 68118->68119 68121 140041900 24 API calls 68119->68121 68120->67945 68122 140088f0d 68121->68122 68123 140043ff0 24 API calls 68122->68123 68124 140088f34 ISource 68123->68124 68124->68120 68365 14009840c GetSystemTimeAsFileTime 68124->68365 68126 140088f8e 68367 140099898 68126->68367 68128 140088fb7 68129 1400455e0 24 API calls 68128->68129 68130 140089006 68129->68130 68131 140041900 24 API calls 68130->68131 68132 140089054 68131->68132 68133 140041900 24 API calls 68132->68133 68134 1400890a4 68133->68134 68135 140043ff0 24 API calls 68134->68135 68136 1400890cb ISource __scrt_get_show_window_mode 68135->68136 68136->68120 68137 140089137 GetModuleFileNameA 68136->68137 68138 140089170 68137->68138 68139 140045310 24 API calls 68138->68139 68140 1400891b3 68139->68140 68141 1400455e0 24 API calls 68140->68141 68142 1400891c9 68141->68142 68143 140041900 24 API calls 68142->68143 68144 140089217 68143->68144 68145 140041900 24 API calls 68144->68145 68146 1400892d0 68145->68146 68147 140043ff0 24 API calls 68146->68147 68148 1400892f7 ISource 68147->68148 68148->68120 68370 1400876a0 68148->68370 68186 14007d052 68185->68186 68186->68186 68187 140070920 24 API calls 68186->68187 68188 14007d066 68187->68188 68188->67947 68190 140076721 68189->68190 68875 1400775e0 24 API calls ISource 68190->68875 68192 140076e3c 68193 140044600 24 API calls 68192->68193 68194 140076e7f 68193->68194 68876 140070040 68194->68876 68196 140076eb7 68197 140041900 24 API calls 68196->68197 68198 140076f2b 68197->68198 68883 1400457c0 24 API calls Concurrency::cancel_current_task 68198->68883 68200 140076f3b 68884 140045ad0 24 API calls 2 library calls 68200->68884 68202 140076f51 ISource 68203 140041900 24 API calls 68202->68203 68204 140077089 68203->68204 68205->67938 68206->67942 68208 140086cba 68207->68208 68210 140086d19 _Strcoll 68207->68210 68386 1400778f0 68208->68386 68210->68019 68211 140086cc9 68211->68210 68390 14008fb34 24 API calls 68211->68390 68405 14007f9e0 68213->68405 68215 1400862d8 GetVolumeInformationW 68217 140086333 ISource __scrt_get_show_window_mode 68215->68217 68218 140086381 _Strcoll 68217->68218 68413 1400786d0 32 API calls 68217->68413 68218->68021 68220 1400863bd 68414 140078830 31 API calls 2 library calls 68220->68414 68222 1400863e4 68415 14003fe50 68222->68415 68227 14008d539 68224->68227 68235 14008d638 68224->68235 68228 14008d578 68227->68228 68229 14008d59a BuildCatchObjectHelperInternal 68227->68229 68231 14008d5d6 68227->68231 68230 1400ae888 std::_Facet_Register 24 API calls 68228->68230 68232 14008d591 68228->68232 68229->68025 68230->68232 68233 1400ae888 std::_Facet_Register 24 API calls 68231->68233 68232->68229 68443 14002b820 24 API calls 2 library calls 68232->68443 68233->68229 68444 14002b8e0 24 API calls 68235->68444 68237 140086599 __scrt_get_show_window_mode 68236->68237 68238 1400ae888 std::_Facet_Register 24 API calls 68237->68238 68239 140086603 68238->68239 68445 14004cad0 68239->68445 68241 140086648 EnumDisplayDevicesW 68245 140086709 68241->68245 68246 140086665 ISource 68241->68246 68242 1400778f0 24 API calls 68242->68246 68243 140086711 _Strcoll 68243->68032 68245->68243 68248 140043d70 24 API calls 68245->68248 68246->68242 68247 1400866d1 EnumDisplayDevicesW 68246->68247 68249 14008684f 68246->68249 68455 14008dbf0 24 API calls 2 library calls 68246->68455 68247->68245 68247->68246 68248->68245 68251 1400864dd _Strcoll 68250->68251 68251->68034 68253 1400868ef 68252->68253 68254 140086900 ISource 68252->68254 68468 140048560 68253->68468 68257 1400869de 68254->68257 68265 140086b28 ISource _Strcoll 68254->68265 68457 140043d70 68254->68457 68462 1400bd0b4 GetNativeSystemInfo 68257->68462 68259 1400869e3 68463 140070920 68259->68463 68261 140086a84 68262 140043d70 24 API calls 68261->68262 68263 140086ace 68262->68263 68264 140043d70 24 API calls 68263->68264 68264->68265 68265->68036 68506 1400af520 68266->68506 68269 14008619f 68270 1400778f0 24 API calls 68269->68270 68271 1400861ac _Strcoll 68270->68271 68271->68038 68273 1400af520 _Strcoll 68272->68273 68274 140086200 GetComputerNameW 68273->68274 68275 14008623f 68274->68275 68277 14008624c _Strcoll 68274->68277 68276 1400778f0 24 API calls 68275->68276 68276->68277 68277->68040 68279 1400860c0 68278->68279 68508 140085240 68279->68508 68281 1400860e4 ISource 68281->68044 68283 140043ff0 24 API calls 68282->68283 68284 14005d5c3 68283->68284 68285 1400ae888 std::_Facet_Register 24 API calls 68284->68285 68286 14005d5d8 68285->68286 68537 1400429b0 68286->68537 68288 14005d5f5 _Strcoll 68288->68046 68290 140041937 68289->68290 68291 14004193f 68289->68291 68561 140047e80 24 API calls 2 library calls 68290->68561 68293 14004195d 68291->68293 68551 140047d40 68291->68551 68298 140041990 ISource _Strcoll 68293->68298 68562 140047f10 24 API calls 68293->68562 68296 1400419f6 68563 140047ac0 68296->68563 68298->68048 68299 140041a09 Concurrency::cancel_current_task 68301 14004402d 68300->68301 68302 140044066 68301->68302 68303 140044107 68301->68303 68319 140044350 68301->68319 68322 1400443c2 ISource _Strcoll 68301->68322 68304 14004437c 68302->68304 68314 1400440a6 68302->68314 68620 1400492c0 24 API calls 2 library calls 68302->68620 68303->68304 68313 140044134 68303->68313 68622 1400492c0 24 API calls 2 library calls 68303->68622 68304->68322 68629 140040640 24 API calls 68304->68629 68305 140044373 68305->68304 68311 14004442b 68305->68311 68306 14004443a 68628 1400400f0 24 API calls ISource 68306->68628 68309 140044347 68626 140044ca0 24 API calls ISource 68309->68626 68627 140044ca0 24 API calls ISource 68311->68627 68325 140044102 ISource 68313->68325 68623 140050610 24 API calls 2 library calls 68313->68623 68314->68325 68621 140050610 24 API calls 2 library calls 68314->68621 68319->68305 68319->68306 68319->68322 68321 140041a20 24 API calls 68321->68325 68322->68052 68324 140050610 24 API calls 68324->68325 68325->68309 68325->68321 68325->68324 68624 140049380 24 API calls ISource 68325->68624 68625 140059810 24 API calls ISource 68325->68625 68328 140085cc0 SelectObject DeleteDC ReleaseDC DeleteObject 68327->68328 68329 140085d28 68327->68329 68333 140085d20 _Strcoll 68328->68333 68630 14007e970 68329->68630 68333->68103 68334 140085e0a 68642 14007ebf0 68334->68642 68336 140085e1a IStream_Size IStream_Reset 68337 140085e68 68336->68337 68341 140085e5a __scrt_get_show_window_mode 68336->68341 68338 140085eb5 IStream_Read 68337->68338 68337->68341 68689 14008ef10 24 API calls 5 library calls 68337->68689 68340 140085eca __scrt_get_show_window_mode 68338->68340 68661 14003ff20 68340->68661 68341->68338 68345 140085f0d SelectObject DeleteDC ReleaseDC DeleteObject 68346 14003fe50 24 API calls 68345->68346 68347 140085f4a 68346->68347 68680 14007ea50 68347->68680 68767 1400427e0 68349->68767 68351 14004537a 68352 1400427e0 24 API calls 68351->68352 68353 14004548d 68352->68353 68354 1400455e0 68353->68354 68355 140043ff0 24 API calls 68354->68355 68356 140045624 68355->68356 68357 1400ae888 std::_Facet_Register 24 API calls 68356->68357 68358 140045639 _Strcoll 68357->68358 68358->68107 68360 1400859fa 68359->68360 68773 140044f60 68360->68773 68364 140085a32 ISource _Strcoll 68364->68115 68366 140098465 68365->68366 68366->68126 68791 14009972c 68367->68791 68371 1400878e1 __scrt_get_show_window_mode wcsftime 68370->68371 68372 140043d70 24 API calls 68371->68372 68373 140087a20 68372->68373 68873 140042770 24 API calls 68373->68873 68375 140087a6f 68376->68021 68378 1400989ea 68377->68378 68383 1400989c9 68377->68383 68379 140099eec _Getcoll 23 API calls 68378->68379 68380 1400989ef 68379->68380 68381 14009c178 _Getcoll 23 API calls 68380->68381 68382 140098a08 68381->68382 68382->68383 68874 14009d2ac 23 API calls 3 library calls 68382->68874 68383->68025 68385 140098a3e 68385->68025 68387 14007793e 68386->68387 68388 14007791f ISource _Strcoll 68386->68388 68391 140036940 68387->68391 68388->68211 68390->68211 68392 140036a64 68391->68392 68394 140036966 68391->68394 68404 14002b8e0 24 API calls 68392->68404 68395 140036a5f 68394->68395 68397 140036a22 68394->68397 68398 1400369ca 68394->68398 68402 140036971 BuildCatchObjectHelperInternal 68394->68402 68403 14002b820 24 API calls 2 library calls 68395->68403 68400 1400ae888 std::_Facet_Register 24 API calls 68397->68400 68398->68395 68399 1400369d7 68398->68399 68401 1400ae888 std::_Facet_Register 24 API calls 68399->68401 68400->68402 68401->68402 68402->68388 68403->68392 68419 14007dec0 68405->68419 68407 14007fa9e 68412 14007fb07 ISource _Strcoll 68407->68412 68425 14007dcd0 24 API calls Concurrency::cancel_current_task 68407->68425 68410 14007fa2d 68410->68407 68411 140036940 24 API calls 68410->68411 68411->68407 68412->68215 68413->68220 68414->68222 68416 14003fe98 68415->68416 68417 14003fefc 68416->68417 68428 140044600 68416->68428 68417->68218 68420 14007df3f 68419->68420 68421 14007df20 __std_fs_get_current_path 68419->68421 68420->68421 68426 140048b50 24 API calls 4 library calls 68420->68426 68424 14007e055 68421->68424 68427 140048b50 24 API calls 4 library calls 68421->68427 68424->68410 68426->68421 68427->68421 68430 140044647 68428->68430 68432 14004461d BuildCatchObjectHelperInternal 68428->68432 68435 1400446a1 68430->68435 68436 1400446d9 68430->68436 68439 140044693 BuildCatchObjectHelperInternal 68430->68439 68431 140044750 68442 14002b820 24 API calls 2 library calls 68431->68442 68432->68417 68433 1400ae888 std::_Facet_Register 24 API calls 68433->68439 68435->68431 68435->68433 68438 1400ae888 std::_Facet_Register 24 API calls 68436->68438 68437 140044756 68438->68439 68440 140044727 ISource 68439->68440 68441 14002b8e0 24 API calls 68439->68441 68440->68417 68442->68437 68443->68235 68446 14004cafc 68445->68446 68454 14004cb21 ISource 68445->68454 68447 14004cc02 68446->68447 68449 14004cb57 68446->68449 68450 14004cb2e 68446->68450 68446->68454 68456 14002b820 24 API calls 2 library calls 68447->68456 68452 1400ae888 std::_Facet_Register 24 API calls 68449->68452 68450->68447 68451 14004cb3b 68450->68451 68453 1400ae888 std::_Facet_Register 24 API calls 68451->68453 68452->68454 68453->68454 68454->68241 68455->68246 68456->68454 68458 140043dd2 68457->68458 68461 140043d93 BuildCatchObjectHelperInternal 68457->68461 68488 140049030 68458->68488 68460 140043deb 68460->68254 68461->68254 68462->68259 68464 1400709e5 68463->68464 68467 140070950 BuildCatchObjectHelperInternal 68463->68467 68502 1400745c0 24 API calls 4 library calls 68464->68502 68466 1400709fa 68466->68261 68467->68261 68469 14004869a 68468->68469 68473 140048589 68468->68473 68503 14002b8e0 24 API calls 68469->68503 68470 1400485ee 68474 1400ae888 std::_Facet_Register 24 API calls 68470->68474 68472 14004869f 68504 14002b820 24 API calls 2 library calls 68472->68504 68473->68470 68476 1400485e1 68473->68476 68477 14004861d 68473->68477 68479 1400485d4 BuildCatchObjectHelperInternal 68473->68479 68474->68479 68476->68470 68476->68472 68478 1400ae888 std::_Facet_Register 24 API calls 68477->68478 68478->68479 68480 14004870c 68479->68480 68481 140048765 68479->68481 68482 14004875a 68479->68482 68487 140048667 ISource BuildCatchObjectHelperInternal 68479->68487 68483 1400ae888 std::_Facet_Register 24 API calls 68480->68483 68485 1400ae888 std::_Facet_Register 24 API calls 68481->68485 68482->68480 68484 14004879f 68482->68484 68483->68487 68505 14002b820 24 API calls 2 library calls 68484->68505 68485->68487 68487->68254 68489 1400491a6 68488->68489 68494 140049068 68488->68494 68500 14002b8e0 24 API calls 68489->68500 68491 1400490cd 68493 1400ae888 std::_Facet_Register 24 API calls 68491->68493 68492 1400491ab 68501 14002b820 24 API calls 2 library calls 68492->68501 68499 1400490b3 ISource BuildCatchObjectHelperInternal 68493->68499 68494->68491 68496 1400490c0 68494->68496 68497 1400490fc 68494->68497 68494->68499 68496->68491 68496->68492 68498 1400ae888 std::_Facet_Register 24 API calls 68497->68498 68498->68499 68499->68460 68501->68499 68502->68466 68504->68479 68505->68487 68507 140086160 GetUserNameW 68506->68507 68507->68269 68507->68271 68509 1400853e0 68508->68509 68509->68509 68510 1400853f7 InternetOpenA 68509->68510 68511 1400854b5 InternetOpenUrlA 68510->68511 68522 140085422 68510->68522 68513 140085529 HttpQueryInfoW 68511->68513 68511->68522 68514 14008558f HttpQueryInfoW 68513->68514 68515 140085556 68513->68515 68517 1400855ec 68514->68517 68518 140085618 InternetQueryDataAvailable 68514->68518 68515->68514 68516 140085476 ISource _Strcoll 68516->68281 68535 140094550 23 API calls ProcessCodePage 68517->68535 68519 140085813 InternetCloseHandle 68518->68519 68520 140085634 68518->68520 68519->68522 68520->68519 68520->68522 68525 1400856d9 InternetReadFile 68520->68525 68530 1400ae888 std::_Facet_Register 24 API calls 68520->68530 68534 14008568e ISource __scrt_get_show_window_mode BuildCatchObjectHelperInternal 68520->68534 68522->68516 68536 14002b820 24 API calls 2 library calls 68522->68536 68523 1400855fd 68523->68518 68526 140048560 24 API calls 68523->68526 68531 1400857cd ISource 68525->68531 68525->68534 68528 14008560e 68526->68528 68527 1400858c0 68528->68518 68529 1400ae888 std::_Facet_Register 24 API calls 68529->68534 68530->68520 68531->68519 68531->68522 68532 140049030 24 API calls 68532->68534 68533 1400857a6 InternetQueryDataAvailable 68533->68519 68533->68534 68534->68520 68534->68522 68534->68525 68534->68529 68534->68531 68534->68532 68534->68533 68535->68523 68536->68527 68538 1400429de 68537->68538 68539 140042abd 68538->68539 68541 140042a2a 68538->68541 68543 1400429fa BuildCatchObjectHelperInternal 68538->68543 68545 140042a82 68538->68545 68550 14002b8e0 24 API calls 68539->68550 68544 1400ae888 std::_Facet_Register 24 API calls 68541->68544 68547 140042a40 68541->68547 68543->68288 68544->68547 68546 1400ae888 std::_Facet_Register 24 API calls 68545->68546 68546->68543 68547->68543 68549 14002b820 24 API calls 2 library calls 68547->68549 68549->68539 68552 140047d66 68551->68552 68553 140047e73 68552->68553 68554 140047dac 68552->68554 68560 140047e1f 68552->68560 68576 14002b9e0 24 API calls 68553->68576 68556 1400ae888 std::_Facet_Register 24 API calls 68554->68556 68558 140047dca 68556->68558 68571 1400437f0 68558->68571 68560->68293 68561->68291 68562->68296 68564 140047b17 68563->68564 68578 14002ebf0 68564->68578 68566 140047b55 68597 140050400 68566->68597 68568 140047b69 ISource 68569 140047ca4 ISource _Strcoll 68568->68569 68607 1400b0740 68568->68607 68569->68299 68572 140043823 _Strcoll 68571->68572 68573 140043946 68571->68573 68572->68560 68573->68572 68577 1400488c0 24 API calls 3 library calls 68573->68577 68575 140043974 Concurrency::cancel_current_task 68577->68575 68580 14002ec2b 68578->68580 68579 14002ed21 68582 140043d70 24 API calls 68579->68582 68580->68579 68581 140048560 24 API calls 68580->68581 68581->68579 68583 14002ed3a 68582->68583 68584 140043d70 24 API calls 68583->68584 68585 14002ed53 68584->68585 68586 14002ed60 68585->68586 68587 140048d10 24 API calls 68585->68587 68588 140043d70 24 API calls 68586->68588 68587->68586 68589 14002edaa 68588->68589 68590 140043d70 24 API calls 68589->68590 68592 14002edbf 68590->68592 68591 14002ee03 ISource _Strcoll 68591->68566 68592->68591 68613 1400b07d0 68592->68613 68595 1400b07d0 __std_exception_destroy 8 API calls 68596 14002ee92 ISource 68595->68596 68596->68566 68598 140050464 68597->68598 68599 140050458 68597->68599 68601 140043d70 24 API calls 68598->68601 68600 140048560 24 API calls 68599->68600 68600->68598 68602 140050481 68601->68602 68603 140043d70 24 API calls 68602->68603 68604 14005049a 68603->68604 68605 140043d70 24 API calls 68604->68605 68606 1400504b3 68605->68606 68606->68568 68608 1400b07ab 68607->68608 68610 1400b0761 68607->68610 68608->68569 68609 1400b0796 68619 140097620 8 API calls 3 library calls 68609->68619 68610->68608 68610->68609 68618 140098cb0 23 API calls 2 library calls 68610->68618 68614 1400b07df 68613->68614 68615 14002ee85 68613->68615 68617 140097620 8 API calls 3 library calls 68614->68617 68615->68595 68617->68615 68618->68609 68619->68608 68621->68314 68623->68313 68624->68325 68625->68325 68626->68319 68627->68322 68631 14007e990 68630->68631 68632 14007e9fc EnterCriticalSection LeaveCriticalSection 68630->68632 68690 1400aef50 AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 68631->68690 68640 14007eb00 GetObjectW 68632->68640 68641 14007eb44 _Strcoll 68640->68641 68641->68334 68643 14007e970 15 API calls 68642->68643 68644 14007ec24 68643->68644 68645 14007ec2d EnterCriticalSection 68644->68645 68651 14007ec6c _Strcoll 68644->68651 68646 14007ec90 LeaveCriticalSection GdipGetImageEncodersSize 68645->68646 68647 14007ec3e GdiplusStartup 68645->68647 68649 14007ecac _Strcoll 68646->68649 68646->68651 68647->68646 68648 14007ec62 LeaveCriticalSection 68647->68648 68648->68651 68650 14007ed30 GdipGetImageEncoders 68649->68650 68652 14007ed26 68649->68652 68650->68652 68653 14007ed44 68650->68653 68651->68336 68652->68651 68691 140097620 8 API calls 3 library calls 68652->68691 68653->68652 68655 14007ee38 GdipCreateBitmapFromHBITMAP GdipSaveImageToStream 68653->68655 68656 14007edcd GdipCreateBitmapFromScan0 GdipSaveImageToStream 68653->68656 68657 14007ee28 GdipDisposeImage 68655->68657 68659 14007ee90 GdipDisposeImage 68655->68659 68656->68657 68658 14007ee36 68656->68658 68657->68652 68658->68659 68659->68652 68692 140044ab0 68661->68692 68666 14007beb0 68667 14007beef 68666->68667 68670 14007bf04 68667->68670 68752 14004af10 24 API calls 2 library calls 68667->68752 68668 14007bf37 68671 14007bfe5 68668->68671 68673 14007bfa3 68668->68673 68670->68668 68748 1400421f0 68670->68748 68754 14002cdc0 24 API calls 68671->68754 68672 14007bfb4 68672->68345 68673->68672 68753 14004c530 24 API calls 2 library calls 68673->68753 68676 14007c027 Concurrency::cancel_current_task 68755 14007bc10 24 API calls 68676->68755 68678 14007c05b ISource 68678->68345 68681 14007ea74 DeleteObject 68680->68681 68682 14007ea99 68680->68682 68681->68682 68683 14007e970 15 API calls 68682->68683 68684 14007ea9e EnterCriticalSection 68683->68684 68685 14007ead6 LeaveCriticalSection 68684->68685 68686 14007eab1 EnterCriticalSection 68684->68686 68685->68333 68687 14007eac3 GdiplusShutdown 68686->68687 68688 14007eac9 LeaveCriticalSection 68686->68688 68687->68688 68688->68685 68689->68341 68691->68652 68693 1400ae888 std::_Facet_Register 24 API calls 68692->68693 68694 140044b11 68693->68694 68708 1400bc5ec 68694->68708 68696 140044b21 68717 140044e10 68696->68717 68698 140044b52 68699 140044bae 68698->68699 68702 140044bd6 68698->68702 68700 14003ffdf 68699->68700 68730 1400bc8b8 EnterCriticalSection std::_Lockit::_Lockit 68699->68730 68705 140043d00 68700->68705 68731 14002cdc0 24 API calls 68702->68731 68704 140044c16 Concurrency::cancel_current_task 68743 140044500 68705->68743 68732 1400bbf8c 68708->68732 68710 1400bc60e 68716 1400bc652 BuildCatchObjectHelperInternal 68710->68716 68736 1400bc7e4 24 API calls std::_Facet_Register 68710->68736 68712 1400bc626 68737 1400bc814 24 API calls std::locale::_Setgloballocale 68712->68737 68714 1400bc631 68714->68716 68738 140097620 8 API calls 3 library calls 68714->68738 68716->68696 68718 1400bbf8c std::_Lockit::_Lockit EnterCriticalSection 68717->68718 68719 140044e40 68718->68719 68720 1400bbf8c std::_Lockit::_Lockit EnterCriticalSection 68719->68720 68721 140044e65 68719->68721 68720->68721 68722 140044edd _Strcoll 68721->68722 68740 14002ca60 31 API calls 6 library calls 68721->68740 68722->68698 68724 140044eef 68725 140044ef5 68724->68725 68726 140044f56 68724->68726 68741 1400bc5ac 24 API calls std::_Facet_Register 68725->68741 68742 14002c5a0 24 API calls 2 library calls 68726->68742 68729 140044f5b 68730->68700 68731->68704 68733 1400bbf9b 68732->68733 68735 1400bbfa0 68732->68735 68739 14009c42c EnterCriticalSection std::_Lockit::_Lockit 68733->68739 68735->68710 68736->68712 68737->68714 68738->68716 68740->68724 68741->68722 68742->68729 68744 1400ae888 std::_Facet_Register 24 API calls 68743->68744 68745 140044577 68744->68745 68746 1400bc5ec 26 API calls 68745->68746 68747 140040056 68746->68747 68747->68666 68749 140042286 68748->68749 68750 140042213 BuildCatchObjectHelperInternal 68748->68750 68749->68668 68750->68749 68756 140041eb0 68750->68756 68752->68670 68753->68672 68754->68676 68755->68678 68757 140041edd ISource BuildCatchObjectHelperInternal 68756->68757 68759 140041ed8 68756->68759 68757->68750 68758 140041f97 68760 1400ae888 std::_Facet_Register 24 API calls 68758->68760 68759->68757 68759->68758 68761 140041f66 68759->68761 68762 140041f59 68759->68762 68760->68757 68761->68757 68763 1400ae888 std::_Facet_Register 24 API calls 68761->68763 68762->68761 68764 14004209c 68762->68764 68763->68757 68766 14002b820 24 API calls 2 library calls 68764->68766 68766->68757 68768 140042804 68767->68768 68769 1400427ed 68767->68769 68770 140048e80 24 API calls 68768->68770 68772 14004281e __scrt_get_show_window_mode 68768->68772 68769->68351 68771 14004286c 68770->68771 68771->68351 68772->68351 68774 140044f85 68773->68774 68775 140043d70 24 API calls 68774->68775 68776 140044f99 68775->68776 68777 14008e8f0 68776->68777 68778 14008e93d 68777->68778 68780 14008ea13 68778->68780 68782 14008e942 BuildCatchObjectHelperInternal 68778->68782 68784 14008ea6c 68778->68784 68787 14008ead5 68778->68787 68783 1400ae888 std::_Facet_Register 24 API calls 68780->68783 68788 14008ea29 68780->68788 68782->68364 68783->68788 68785 1400ae888 std::_Facet_Register 24 API calls 68784->68785 68785->68782 68790 14002b8e0 24 API calls 68787->68790 68788->68782 68789 14002b820 24 API calls 2 library calls 68788->68789 68789->68787 68811 14008f964 68791->68811 68794 14009978d 68819 140094e68 7 API calls _set_fmode 68794->68819 68796 140099792 68820 140098234 23 API calls _invalid_parameter_noinfo 68796->68820 68798 1400997a5 68821 140099494 7 API calls 4 library calls 68798->68821 68799 14009979d 68799->68128 68801 1400997d0 68802 1400997d4 68801->68802 68822 14009e8bc 68801->68822 68802->68799 68805 14009d3c8 __free_lconv_num 7 API calls 68802->68805 68805->68799 68806 14009983a 68830 14009d3c8 68806->68830 68809 14009980a 68809->68806 68829 140099610 7 API calls 3 library calls 68809->68829 68812 14008f983 68811->68812 68813 14008f988 68811->68813 68812->68794 68812->68798 68813->68812 68835 140099eec 68813->68835 68819->68796 68820->68799 68821->68801 68823 14009e907 68822->68823 68826 14009e8cb wcsftime 68822->68826 68871 140094e68 7 API calls _set_fmode 68823->68871 68825 1400997e2 68825->68806 68828 1400a4c08 25 API calls 4 library calls 68825->68828 68826->68823 68826->68825 68827 1400a9f1c std::_Facet_Register 2 API calls 68826->68827 68827->68826 68828->68809 68829->68806 68831 14009d3cd HeapFree 68830->68831 68832 14009d3fe 68830->68832 68831->68832 68833 14009d3e8 __std_fs_convert_narrow_to_wide __free_lconv_num 68831->68833 68832->68802 68872 140094e68 7 API calls _set_fmode 68833->68872 68836 140099f01 __std_fs_convert_narrow_to_wide 68835->68836 68837 140099f2d FlsSetValue 68836->68837 68838 140099f10 FlsGetValue 68836->68838 68840 140099f3f 68837->68840 68843 140099f1d __vcrt_getptd_noinit 68837->68843 68839 140099f27 68838->68839 68838->68843 68839->68837 68861 14009da30 68840->68861 68848 14008f9a3 68843->68848 68868 1400998b4 23 API calls BuildCatchObjectHelperInternal 68843->68868 68844 140099f6c FlsSetValue 68846 140099f8a 68844->68846 68847 140099f78 FlsSetValue 68844->68847 68845 140099f5c FlsSetValue 68849 140099f65 68845->68849 68867 140099c9c 7 API calls _set_fmode 68846->68867 68847->68849 68856 14009c178 68848->68856 68850 14009d3c8 __free_lconv_num 7 API calls 68849->68850 68850->68843 68853 140099f92 68855 14009d3c8 __free_lconv_num 7 API calls 68853->68855 68855->68843 68857 14009c18d 68856->68857 68858 14008f9c6 68856->68858 68857->68858 68870 1400a5c14 23 API calls 3 library calls 68857->68870 68860 14009c1e4 23 API calls TranslateName 68858->68860 68860->68812 68864 14009da41 wcsftime 68861->68864 68862 14009da92 68869 140094e68 7 API calls _set_fmode 68862->68869 68864->68862 68865 140099f4e 68864->68865 68866 1400a9f1c std::_Facet_Register 2 API calls 68864->68866 68865->68844 68865->68845 68866->68864 68867->68853 68869->68865 68870->68858 68871->68825 68872->68832 68873->68375 68874->68385 68875->68192 68877 1400437f0 24 API calls 68876->68877 68878 140070076 68877->68878 68885 1400724b0 68878->68885 68882 140070101 68882->68196 68883->68200 68884->68202 68888 1400724f4 68885->68888 68943 14009494c 68888->68943 68890 1400700f5 68891 1400702c0 68890->68891 68892 1400705d1 68891->68892 68895 14007030b __scrt_get_show_window_mode 68891->68895 69064 140073710 24 API calls 2 library calls 68892->69064 68894 140070604 68896 140070a10 24 API calls 68894->68896 68967 14004b5b0 24 API calls 68895->68967 68903 140070610 68896->68903 68898 14007035b 68968 140072840 24 API calls 2 library calls 68898->68968 68900 1400705cc ISource _Strcoll 68900->68882 68901 14007036b 68904 140070a10 24 API calls 68901->68904 68902 1400437f0 24 API calls 68905 1400707cc 68902->68905 68906 14004b780 24 API calls 68903->68906 68938 140070718 ISource 68903->68938 68917 140070377 68904->68917 68907 140043ff0 24 API calls 68905->68907 68908 14007065d 68906->68908 68913 140070806 68907->68913 68909 140051af0 24 API calls 68908->68909 68910 140070683 68909->68910 68914 14004bd00 24 API calls 68910->68914 68911 140070565 68916 1400705bf 68911->68916 68921 1400437f0 24 API calls 68911->68921 68912 14007051d 68915 1400437f0 24 API calls 68912->68915 68913->68900 69065 140043e90 24 API calls 68913->69065 68928 140070692 ISource 68914->68928 68920 140070538 68915->68920 69063 14004b3d0 24 API calls ISource 68916->69063 68941 140070504 ISource 68917->68941 68969 14004b780 68917->68969 68925 140043ff0 24 API calls 68920->68925 68921->68920 68923 1400703c3 69014 140051af0 68923->69014 68925->68916 68927 1400703e9 69057 14004bd00 68927->69057 68929 1400b07d0 __std_exception_destroy 8 API calls 68928->68929 68935 1400708f7 Concurrency::cancel_current_task 68928->68935 68936 1400708c8 Concurrency::cancel_current_task 68928->68936 68931 14007070a 68929->68931 68933 1400b07d0 __std_exception_destroy 8 API calls 68931->68933 68932 1400703f9 68932->68913 68934 14007040e ISource 68932->68934 68933->68938 68934->68936 68937 1400b07d0 __std_exception_destroy 8 API calls 68934->68937 69066 140043e90 24 API calls 68936->69066 68939 140070479 68937->68939 68938->68902 68938->68913 68938->68935 68940 1400b07d0 __std_exception_destroy 8 API calls 68939->68940 68942 140070487 ISource 68940->68942 68941->68911 68941->68912 68942->68936 68942->68941 68944 140099eec _Getcoll 23 API calls 68943->68944 68945 140094955 68944->68945 68946 14009c178 _Getcoll 23 API calls 68945->68946 68947 1400725cc 68946->68947 68948 140070a10 68947->68948 68949 140070a33 68948->68949 68958 140070a56 68948->68958 68962 140072180 24 API calls 68949->68962 68952 140070a38 68952->68958 68963 140072180 24 API calls 68952->68963 68954 140070a47 68955 140070a5d _Strcoll 68954->68955 68964 140072180 24 API calls 68954->68964 68955->68890 68957 140070bb7 _Strcoll 68957->68890 68958->68955 68965 140070d70 24 API calls 68958->68965 68960 140070ac1 68960->68957 68961 140072180 24 API calls 68960->68961 68966 140070d70 24 API calls 68960->68966 68961->68960 68962->68952 68963->68954 68964->68958 68965->68960 68966->68960 68967->68898 68968->68901 68970 14004b7ce 68969->68970 68971 14004b81e 68970->68971 68973 140048560 24 API calls 68970->68973 68992 14004b8ac ISource 68970->68992 68974 140043d70 24 API calls 68971->68974 68972 140043d70 24 API calls 68975 14004b912 68972->68975 68973->68971 68976 14004b838 68974->68976 68977 14004b91e 68975->68977 68980 14004bad1 68975->68980 68979 140043d70 24 API calls 68976->68979 68978 14004bd00 24 API calls 68977->68978 68985 14004b92b 68978->68985 68981 14004b852 68979->68981 68980->68980 68983 14004bb2d 68980->68983 68989 140048560 24 API calls 68980->68989 68982 14004b85f 68981->68982 68984 140048d10 24 API calls 68981->68984 68987 140043d70 24 API calls 68982->68987 68990 140043d70 24 API calls 68983->68990 68984->68982 68986 14004b987 68985->68986 68988 140048560 24 API calls 68985->68988 68993 140043d70 24 API calls 68986->68993 68987->68992 68988->68986 68989->68983 68991 14004bb47 68990->68991 68996 140043d70 24 API calls 68991->68996 68992->68972 69013 14004bc79 ISource 68992->69013 68994 14004b9a6 68993->68994 68995 140043d70 24 API calls 68994->68995 68998 14004b9bc 68995->68998 68997 14004bb66 68996->68997 68999 140043d70 24 API calls 68997->68999 69000 140043d70 24 API calls 68998->69000 69005 14004ba30 ISource 68999->69005 69001 14004b9d6 69000->69001 69002 14004b9e3 69001->69002 69003 140048d10 24 API calls 69001->69003 69004 140043d70 24 API calls 69002->69004 69003->69002 69004->69005 69005->69005 69006 14004bc2d 69005->69006 69007 140048560 24 API calls 69005->69007 69005->69013 69008 140043d70 24 API calls 69006->69008 69007->69006 69009 14004bc47 69008->69009 69009->69009 69010 140043d70 24 API calls 69009->69010 69011 14004bc5f 69010->69011 69012 140043d70 24 API calls 69011->69012 69012->69013 69013->68923 69015 140051b4f 69014->69015 69067 14002ef10 24 API calls 2 library calls 69015->69067 69017 140051b66 69018 14002ebf0 24 API calls 69017->69018 69019 140051ba2 69018->69019 69068 1400504d0 24 API calls 69019->69068 69021 140051bc1 ISource 69022 1400b0740 __std_exception_copy 24 API calls 69021->69022 69024 140051d53 69021->69024 69022->69024 69023 140051da7 ISource _Strcoll 69023->68927 69024->69023 69025 14004b780 24 API calls 69024->69025 69026 140052a9c 69025->69026 69027 140051af0 24 API calls 69026->69027 69028 140052ac2 69027->69028 69029 14004bd00 24 API calls 69028->69029 69030 140052ad2 69029->69030 69031 140052b3d 69030->69031 69032 140052add 69030->69032 69074 140043e90 24 API calls 69031->69074 69069 14002eec0 69032->69069 69034 140052b49 Concurrency::cancel_current_task 69075 140043e90 24 API calls 69034->69075 69037 140052b66 Concurrency::cancel_current_task 69076 140043e90 24 API calls 69037->69076 69039 140052b83 Concurrency::cancel_current_task 69077 140054430 24 API calls 69039->69077 69041 140052af1 _Strcoll 69041->68927 69042 140052ba0 Concurrency::cancel_current_task 69078 140043e90 24 API calls 69042->69078 69044 140052bbd Concurrency::cancel_current_task 69079 140043e90 24 API calls 69044->69079 69046 140052bda Concurrency::cancel_current_task 69080 140043e90 24 API calls 69046->69080 69048 140052bf7 Concurrency::cancel_current_task 69081 140043e90 24 API calls 69048->69081 69050 140052c14 Concurrency::cancel_current_task 69082 140043e90 24 API calls 69050->69082 69052 140052c31 Concurrency::cancel_current_task 69083 140043e90 24 API calls 69052->69083 69054 140052c4e Concurrency::cancel_current_task 69084 140043e90 24 API calls 69054->69084 69056 140052c6b Concurrency::cancel_current_task 69058 14004be02 _Strcoll 69057->69058 69060 14004bd56 69057->69060 69058->68932 69060->69058 69061 140048d10 24 API calls 69060->69061 69062 140043d70 24 API calls 69060->69062 69085 14002b5b0 23 API calls 69060->69085 69061->69060 69062->69060 69063->68900 69064->68894 69065->68936 69066->68935 69067->69017 69068->69021 69070 1400b07d0 __std_exception_destroy 8 API calls 69069->69070 69071 14002eeee 69070->69071 69072 1400b07d0 __std_exception_destroy 8 API calls 69071->69072 69073 14002eefb 69072->69073 69073->69041 69074->69034 69075->69037 69076->69039 69077->69042 69078->69044 69079->69046 69080->69048 69081->69050 69082->69052 69083->69054 69084->69056 69085->69060 69086 14009918c 69087 1400991bd 69086->69087 69088 1400991a2 69086->69088 69087->69088 69090 1400991d6 69087->69090 69117 140094e68 7 API calls _set_fmode 69088->69117 69092 1400991dc 69090->69092 69093 1400991f9 69090->69093 69091 1400991a7 69118 140098234 23 API calls _invalid_parameter_noinfo 69091->69118 69119 140094e68 7 API calls _set_fmode 69092->69119 69110 1400a33d0 69093->69110 69100 140099473 69105 140099256 69109 1400991b3 69105->69109 69138 1400a3414 23 API calls _isindst 69105->69138 69106 1400992b6 69106->69109 69139 1400a3414 23 API calls _isindst 69106->69139 69111 1400a33df 69110->69111 69112 1400991fe 69110->69112 69140 14009c3bc EnterCriticalSection 69111->69140 69120 1400a24e8 69112->69120 69117->69091 69118->69109 69119->69109 69121 1400a24f1 69120->69121 69122 140099213 69120->69122 69141 140094e68 7 API calls _set_fmode 69121->69141 69122->69100 69126 1400a2518 69122->69126 69124 1400a24f6 69142 140098234 23 API calls _invalid_parameter_noinfo 69124->69142 69127 1400a2521 69126->69127 69128 140099224 69126->69128 69143 140094e68 7 API calls _set_fmode 69127->69143 69128->69100 69132 1400a2548 69128->69132 69130 1400a2526 69144 140098234 23 API calls _invalid_parameter_noinfo 69130->69144 69133 1400a2551 69132->69133 69135 140099235 69132->69135 69145 140094e68 7 API calls _set_fmode 69133->69145 69135->69100 69135->69105 69135->69106 69136 1400a2556 69146 140098234 23 API calls _invalid_parameter_noinfo 69136->69146 69138->69109 69139->69109 69141->69124 69142->69122 69143->69130 69144->69128 69145->69136 69146->69135 69147 14008c5cb 69148 14008c5f1 69147->69148 69152 14008c5dc _Strcoll 69147->69152 69149 14008c5fa 69148->69149 69150 14008c7bf 69148->69150 69153 1400427e0 24 API calls 69149->69153 69159 14008c652 69149->69159 69151 14008c86f 69150->69151 69155 14008d050 24 API calls 69150->69155 69154 14008d050 24 API calls 69151->69154 69153->69159 69154->69152 69155->69150 69156 14008c722 69158 14008d050 24 API calls 69156->69158 69158->69152 69159->69156 69160 14008d050 69159->69160 69163 14008d08f 69160->69163 69165 14008d292 69160->69165 69162 14008d308 69175 14008e760 24 API calls 69162->69175 69163->69162 69168 14008d28d Concurrency::cancel_current_task 69163->69168 69173 140043d70 24 API calls 69163->69173 69174 14002b5b0 23 API calls 69163->69174 69165->69159 69166 14008d33f 69167 140047ac0 24 API calls 69166->69167 69167->69168 69168->69165 69176 14008e840 24 API calls 69168->69176 69170 14008d38a 69171 140047ac0 24 API calls 69170->69171 69172 14008d39d Concurrency::cancel_current_task 69171->69172 69173->69163 69174->69163 69175->69166 69176->69170 69177 14009bd30 69188 14009c3bc EnterCriticalSection 69177->69188 69189 14007fc10 69190 14007fc40 69189->69190 69193 1400bb5b0 69190->69193 69192 14007fc59 _Strcoll 69194 1400bb5f2 69193->69194 69195 1400bb70d 69194->69195 69196 1400bb653 GetFileAttributesExW 69194->69196 69208 1400bb5fb _Strcoll __std_fs_convert_narrow_to_wide 69194->69208 69218 1400bb984 CreateFileW __std_fs_convert_narrow_to_wide 69195->69218 69198 1400bb667 __std_fs_convert_narrow_to_wide 69196->69198 69209 1400bb695 __std_fs_directory_iterator_open 69196->69209 69203 1400bb676 FindFirstFileW 69198->69203 69198->69208 69199 1400bb730 69201 1400bb803 69199->69201 69202 1400bb765 GetFileInformationByHandleEx 69199->69202 69206 1400bb736 ProcessCodePage 69199->69206 69200 1400bb74f 69200->69208 69201->69206 69207 1400bb81e GetFileInformationByHandleEx 69201->69207 69204 1400bb77f __std_fs_convert_narrow_to_wide ProcessCodePage 69202->69204 69205 1400bb7a5 69202->69205 69203->69208 69203->69209 69204->69200 69222 1400998b4 23 API calls BuildCatchObjectHelperInternal 69204->69222 69205->69201 69210 1400bb7c6 GetFileInformationByHandleEx 69205->69210 69206->69200 69206->69208 69219 1400998b4 23 API calls BuildCatchObjectHelperInternal 69206->69219 69207->69206 69213 1400bb834 __std_fs_convert_narrow_to_wide ProcessCodePage 69207->69213 69208->69192 69209->69195 69209->69208 69210->69201 69214 1400bb7e2 __std_fs_convert_narrow_to_wide ProcessCodePage 69210->69214 69213->69200 69221 1400998b4 23 API calls BuildCatchObjectHelperInternal 69213->69221 69214->69200 69220 1400998b4 23 API calls BuildCatchObjectHelperInternal 69214->69220 69218->69199 69223 140040af0 69224 140040b08 69223->69224 69229 140040b14 BuildCatchObjectHelperInternal 69223->69229 69225 140040b25 BuildCatchObjectHelperInternal 69226 140040c5e 69226->69225 69228 140097a44 _fread_nolock 23 API calls 69226->69228 69228->69225 69229->69225 69229->69226 69230 140097a44 69229->69230 69233 140097a64 69230->69233 69234 140097a8e 69233->69234 69245 140097a5c 69233->69245 69235 140097ada 69234->69235 69236 140097a9d __scrt_get_show_window_mode 69234->69236 69234->69245 69246 140094934 EnterCriticalSection 69235->69246 69247 140094e68 7 API calls _set_fmode 69236->69247 69240 140097ab2 69248 140098234 23 API calls _invalid_parameter_noinfo 69240->69248 69245->69229 69247->69240 69248->69245 69249 140099aa8 69260 14009990c 69249->69260 69251 140099b08 69254 140099b49 69251->69254 69255 140099acf 69251->69255 69278 14009e768 23 API calls 2 library calls 69251->69278 69266 140099934 69254->69266 69258 140099b3d 69258->69254 69279 1400a0318 7 API calls 2 library calls 69258->69279 69261 140099925 69260->69261 69262 140099915 69260->69262 69261->69251 69261->69255 69277 140099a2c 23 API calls 2 library calls 69261->69277 69280 140094e68 7 API calls _set_fmode 69262->69280 69264 14009991a 69281 140098234 23 API calls _invalid_parameter_noinfo 69264->69281 69267 14009990c _fread_nolock 23 API calls 69266->69267 69268 140099959 69267->69268 69269 1400999fa 69268->69269 69270 140099969 69268->69270 69291 14009ce18 23 API calls 3 library calls 69269->69291 69271 1400999a5 69270->69271 69272 140099987 69270->69272 69275 140099995 69271->69275 69282 1400a0f48 69271->69282 69290 14009ce18 23 API calls 3 library calls 69272->69290 69275->69255 69277->69251 69278->69258 69279->69254 69280->69264 69281->69261 69283 1400a0f78 69282->69283 69292 1400a0d7c 69283->69292 69286 1400a0fb7 69288 1400a0fcc 69286->69288 69304 14008f864 23 API calls 4 library calls 69286->69304 69288->69275 69290->69275 69291->69275 69294 1400a0dd3 69292->69294 69302 1400a0da5 69292->69302 69293 1400a0dec 69310 140098168 23 API calls 2 library calls 69293->69310 69294->69293 69295 1400a0e43 69294->69295 69305 1400a555c EnterCriticalSection 69295->69305 69299 1400a0e61 69311 1400a5644 LeaveCriticalSection 69299->69311 69302->69286 69303 14008f864 23 API calls 4 library calls 69302->69303 69303->69286 69304->69288 69306 1400a0e4a 69305->69306 69306->69299 69307 1400a0e9c 69306->69307 69312 1400a5868 69307->69312 69309 1400a0ec3 __std_fs_convert_narrow_to_wide _fread_nolock 69309->69299 69310->69302 69311->69302 69313 1400a5871 69312->69313 69314 1400a5886 69312->69314 69324 140094e48 7 API calls _set_fmode 69313->69324 69321 1400a587e 69314->69321 69326 140094e48 7 API calls _set_fmode 69314->69326 69317 1400a5876 69325 140094e68 7 API calls _set_fmode 69317->69325 69318 1400a58c1 69327 140094e68 7 API calls _set_fmode 69318->69327 69321->69309 69322 1400a58c9 69328 140098234 23 API calls _invalid_parameter_noinfo 69322->69328 69324->69317 69325->69321 69326->69318 69327->69322 69328->69321 69329 14005214b 69416 14005a770 69329->69416 69331 140052648 _Strcoll 69332 140052388 69434 14004c600 69332->69434 69334 14004c600 24 API calls 69338 140051fae 69334->69338 69335 140052662 69342 14004b780 24 API calls 69335->69342 69336 1400523d4 69341 14004b780 24 API calls 69336->69341 69337 140052390 69339 1400527cc 69337->69339 69340 14005239c 69337->69340 69338->69331 69338->69332 69338->69334 69338->69335 69338->69336 69347 1400549c0 24 API calls 69338->69347 69398 14005a490 69338->69398 69459 14005ac10 24 API calls 69338->69459 69350 14004b780 24 API calls 69339->69350 69447 140054580 69340->69447 69344 1400525ed 69341->69344 69345 1400526a2 69342->69345 69348 140051af0 24 API calls 69344->69348 69349 140051af0 24 API calls 69345->69349 69346 1400523b4 69351 14004c600 24 API calls 69346->69351 69347->69338 69354 140052613 69348->69354 69355 1400526c8 69349->69355 69356 14005280c 69350->69356 69357 1400523c0 69351->69357 69358 14004bd00 24 API calls 69354->69358 69359 14004bd00 24 API calls 69355->69359 69360 140051af0 24 API calls 69356->69360 69361 140052717 69357->69361 69362 1400523cc 69357->69362 69363 140052623 69358->69363 69364 1400526d8 69359->69364 69365 140052832 69360->69365 69372 14004b780 24 API calls 69361->69372 69366 14004c600 24 API calls 69362->69366 69367 140052bb1 69363->69367 69376 140052632 69363->69376 69368 140052bbd Concurrency::cancel_current_task 69364->69368 69377 1400526e7 69364->69377 69369 14004bd00 24 API calls 69365->69369 69366->69336 69460 140043e90 24 API calls 69367->69460 69461 140043e90 24 API calls 69368->69461 69373 140052842 69369->69373 69375 140052757 69372->69375 69374 140052bf7 Concurrency::cancel_current_task 69373->69374 69378 140052851 69373->69378 69463 140043e90 24 API calls 69374->69463 69379 140051af0 24 API calls 69375->69379 69380 14002eec0 8 API calls 69376->69380 69382 14002eec0 8 API calls 69377->69382 69385 14002eec0 8 API calls 69378->69385 69384 14005277d 69379->69384 69380->69331 69382->69331 69383 140052c14 Concurrency::cancel_current_task 69464 140043e90 24 API calls 69383->69464 69387 14004bd00 24 API calls 69384->69387 69385->69331 69386 140052bda Concurrency::cancel_current_task 69462 140043e90 24 API calls 69386->69462 69389 14005278d 69387->69389 69389->69386 69391 14005279c 69389->69391 69393 14002eec0 8 API calls 69391->69393 69392 140052c31 Concurrency::cancel_current_task 69465 140043e90 24 API calls 69392->69465 69393->69331 69395 140052c4e Concurrency::cancel_current_task 69466 140043e90 24 API calls 69395->69466 69397 140052c6b Concurrency::cancel_current_task 69399 14005a515 69398->69399 69400 14005a4af 69398->69400 69402 14005a581 69399->69402 69403 14005a51e 69399->69403 69401 14005d590 24 API calls 69400->69401 69404 14005a4cd 69401->69404 69407 14005d590 24 API calls 69402->69407 69405 14005a54f 69403->69405 69406 14005a52c 69403->69406 69409 140043ff0 24 API calls 69404->69409 69467 140061d30 24 API calls 2 library calls 69405->69467 69410 14005d590 24 API calls 69406->69410 69408 14005a59f 69407->69408 69412 140043ff0 24 API calls 69408->69412 69413 14005a502 69409->69413 69414 14005a547 69410->69414 69415 14005a5d5 69412->69415 69413->69338 69414->69338 69415->69338 69417 14005a805 69416->69417 69418 14005a790 69416->69418 69420 14005a877 69417->69420 69421 14005a80f 69417->69421 69419 140043ff0 24 API calls 69418->69419 69422 14005a7b5 69419->69422 69425 140043ff0 24 API calls 69420->69425 69423 14005a844 69421->69423 69424 14005a81d 69421->69424 69426 140043ff0 24 API calls 69422->69426 69468 140062090 24 API calls 2 library calls 69423->69468 69427 140043ff0 24 API calls 69424->69427 69429 14005a89c 69425->69429 69430 14005a7f1 69426->69430 69431 14005a836 69427->69431 69432 140043ff0 24 API calls 69429->69432 69430->69338 69431->69338 69433 14005a8d9 69432->69433 69433->69338 69435 14004c623 69434->69435 69439 14004c646 69434->69439 69436 14004e200 24 API calls 69435->69436 69438 14004c628 69436->69438 69437 14004e200 24 API calls 69437->69439 69438->69439 69440 14004e200 24 API calls 69438->69440 69439->69437 69442 14004c64d _Strcoll 69439->69442 69446 14004c6c3 69439->69446 69441 14004c637 69440->69441 69441->69442 69443 14004e200 24 API calls 69441->69443 69442->69337 69443->69439 69444 14004e200 24 API calls 69444->69446 69445 14004c7c8 _Strcoll 69445->69337 69446->69444 69446->69445 69448 1400545a5 69447->69448 69449 1400545d8 69448->69449 69450 140054681 69448->69450 69458 140054630 69448->69458 69451 1400ae888 std::_Facet_Register 24 API calls 69449->69451 69469 14002b9e0 24 API calls 69450->69469 69453 1400545fc 69451->69453 69455 1400429b0 24 API calls 69453->69455 69456 140054618 69455->69456 69457 1400437f0 24 API calls 69456->69457 69457->69458 69458->69346 69459->69338 69460->69368 69461->69386 69462->69374 69463->69383 69464->69392 69465->69395 69466->69397 69467->69414 69468->69431 69470 140037633 69474 14002da40 69470->69474 69472 140037666 FindNextFileW 69473 140037684 _Strcoll 69472->69473 69475 14002da58 ISource 69474->69475 69475->69472 69476 140086e1b RegOpenKeyExA 69478 140086e45 RegQueryValueExA 69476->69478 69481 140086e84 ISource 69476->69481 69477 140086f14 RegCloseKey 69480 140086f1a _Strcoll 69477->69480 69478->69481 69481->69477 69481->69480 69482 14004d8d4 69483 14004d625 69482->69483 69485 14004d639 69482->69485 69484 140048d10 24 API calls 69483->69484 69484->69485 69486 14004e200 24 API calls 69485->69486 69487 14004d5b0 69486->69487 69488 14006d080 69537 14002eaf0 69488->69537 69490 14006d0df 69491 14002eaf0 29 API calls 69490->69491 69492 14006d954 69491->69492 69500 14006dd76 ISource _Strcoll 69492->69500 69541 14002d4e0 69492->69541 69501 14006da5d 69501->69500 69567 1400479f0 69501->69567 69504 140047ac0 24 API calls 69505 14006ddfa Concurrency::cancel_current_task 69504->69505 69575 14002e1d0 69505->69575 69538 14002eb21 69537->69538 69539 1400bb5b0 29 API calls 69538->69539 69540 14002eb3d _Strcoll 69539->69540 69540->69490 69544 14002d509 69541->69544 69542 140036940 24 API calls 69543 14002d59a 69542->69543 69545 14002d370 69543->69545 69544->69542 69546 14002d3a0 69545->69546 69579 1400bb260 69546->69579 69548 14002d43a 69558 14006fdd0 69548->69558 69549 14002d489 69583 14002c160 24 API calls 2 library calls 69549->69583 69551 14002d3ac __std_fs_convert_wide_to_narrow 69551->69548 69551->69549 69552 14002d48f 69551->69552 69554 1400427e0 24 API calls 69551->69554 69584 14002c530 24 API calls Concurrency::cancel_current_task 69552->69584 69556 14002d410 __std_fs_convert_wide_to_narrow 69554->69556 69556->69548 69582 14002c530 24 API calls Concurrency::cancel_current_task 69556->69582 69559 14006fdf6 69558->69559 69560 140070920 24 API calls 69559->69560 69561 14006d9ab 69560->69561 69562 14007f8f0 69561->69562 69590 14007f020 69562->69590 69564 14007f922 69565 14007f94a _Strcoll 69564->69565 69566 140045310 24 API calls 69564->69566 69565->69501 69566->69565 69568 140047a40 69567->69568 69568->69568 69569 140047a6e 69568->69569 69570 140048560 24 API calls 69568->69570 69571 140043d70 24 API calls 69569->69571 69570->69569 69572 140047a8a 69571->69572 69573 140043d70 24 API calls 69572->69573 69574 140047aa4 69573->69574 69574->69504 69576 14002e1e9 69575->69576 70018 14002db70 24 API calls ISource 69576->70018 69578 14002e220 Concurrency::cancel_current_task 69585 1400a69a4 69579->69585 69581 1400bb269 __std_fs_code_page 69581->69551 69583->69552 69586 140099eec _Getcoll 23 API calls 69585->69586 69587 1400a69ad 69586->69587 69588 14009c178 _Getcoll 23 API calls 69587->69588 69589 1400a69c6 69588->69589 69589->69581 69591 14002eaf0 29 API calls 69590->69591 69594 14007f06f __scrt_get_show_window_mode 69591->69594 69592 14007f0a7 Concurrency::cancel_current_task 69595 14007f0af _Strcoll 69592->69595 69691 14002e240 24 API calls Concurrency::cancel_current_task 69592->69691 69594->69592 69594->69595 69640 14004a910 69594->69640 69595->69564 69597 14007f0ee 69598 14007f545 69597->69598 69599 14007f151 69597->69599 69655 14005fdb0 69598->69655 69684 140089b70 17 API calls 2 library calls 69599->69684 69604 14007f7d6 69692 14002cdc0 24 API calls 69604->69692 69606 14007f163 69685 140089d30 31 API calls 7 library calls 69606->69685 69610 14007f174 69613 14007f187 69610->69613 69614 14007f25c GetFileSize 69610->69614 69611 140048560 24 API calls 69617 14007f597 69611->69617 69612 14005fdb0 24 API calls 69618 14007f5aa 69612->69618 69613->69604 69619 14007f1ce ISource 69613->69619 69616 14007f29d 69614->69616 69621 14007f278 __scrt_get_show_window_mode 69614->69621 69615 14007f800 Concurrency::cancel_current_task 69616->69621 69625 140048e80 24 API calls 69616->69625 69617->69612 69670 14008d640 69618->69670 69686 1400412f0 24 API calls 69619->69686 69620 14007f302 SetFilePointer 69626 14007f349 _fread_nolock 69620->69626 69621->69620 69624 14007f21f 69624->69595 69625->69620 69634 14007f351 69626->69634 69636 14007f462 69626->69636 69627 14007f60d 69627->69604 69678 140043620 69627->69678 69630 14007f66d 69689 1400412f0 24 API calls 69630->69689 69632 14007f4b7 ISource 69688 1400412f0 24 API calls 69632->69688 69633 14007f3d4 ISource 69687 1400412f0 24 API calls 69633->69687 69634->69604 69634->69633 69636->69604 69636->69632 69638 14007f76c 69690 14002cdc0 24 API calls 69638->69690 69641 140044ab0 32 API calls 69640->69641 69642 14004a9c7 69641->69642 69693 14004c3b0 69642->69693 69647 14004aa1f 69704 140043520 23 API calls _Strcoll 69647->69704 69648 14004aaa8 69654 14004aa58 69648->69654 69706 14002cdc0 24 API calls 69648->69706 69650 14004aa31 69705 1400478a0 28 API calls 4 library calls 69650->69705 69652 14004ab12 Concurrency::cancel_current_task 69654->69597 69656 14005fe0d 69655->69656 69658 14005fef3 69655->69658 69884 140060bd0 69656->69884 69925 14002cdc0 24 API calls 69658->69925 69659 14005fe32 69662 14005fe69 Concurrency::cancel_current_task 69659->69662 69917 1400408a0 69659->69917 69661 14005fec0 69666 14005fcd0 69661->69666 69662->69661 69926 14002cdc0 24 API calls 69662->69926 69664 14005ff8e Concurrency::cancel_current_task 69667 14005fd00 69666->69667 69668 140060bd0 24 API calls 69667->69668 69669 14005fd0f 69668->69669 69669->69611 69669->69617 69671 14008d69d 69670->69671 69674 14008d6b7 69670->69674 69671->69674 69677 140040ca0 24 API calls 69671->69677 69672 14008d75a 69675 140044600 24 API calls 69672->69675 69676 14008d765 ISource _Strcoll 69672->69676 69674->69672 70001 14008f150 69674->70001 69675->69676 69676->69627 69677->69674 69679 14004368a 69678->69679 69680 14004363a 69678->69680 69679->69630 69679->69638 69681 140043430 23 API calls 69680->69681 69682 140043674 69681->69682 69683 140093818 24 API calls 69682->69683 69683->69679 69684->69606 69685->69610 69686->69624 69687->69624 69688->69624 69689->69595 69690->69592 69692->69615 69694 140044500 26 API calls 69693->69694 69695 14004a9f4 69694->69695 69695->69648 69696 1400bcb28 69695->69696 69697 1400bcb6e 69696->69697 69700 14004aa16 69697->69700 69707 1400be200 69697->69707 69700->69647 69700->69648 69702 1400bcbbc 69702->69700 69727 140093818 69702->69727 69704->69650 69705->69654 69706->69652 69708 1400be12c 69707->69708 69709 1400be152 69708->69709 69712 1400be185 69708->69712 69747 140094e68 7 API calls _set_fmode 69709->69747 69711 1400be157 69748 140098234 23 API calls _invalid_parameter_noinfo 69711->69748 69714 1400be18b 69712->69714 69715 1400be198 69712->69715 69749 140094e68 7 API calls _set_fmode 69714->69749 69735 14009d6a8 69715->69735 69716 1400bcba1 69716->69700 69726 140097e14 23 API calls ProcessCodePage 69716->69726 69726->69702 69728 140093848 69727->69728 69870 1400936f4 69728->69870 69730 140093861 69731 140093886 69730->69731 69880 14008f864 23 API calls 4 library calls 69730->69880 69733 14009389b 69731->69733 69881 14008f864 23 API calls 4 library calls 69731->69881 69733->69700 69752 14009c3bc EnterCriticalSection 69735->69752 69747->69711 69748->69716 69749->69716 69871 14009373d 69870->69871 69872 14009370f 69870->69872 69879 14009372f 69871->69879 69882 140094934 EnterCriticalSection 69871->69882 69883 140098168 23 API calls 2 library calls 69872->69883 69879->69730 69880->69731 69881->69733 69883->69879 69885 140060c10 69884->69885 69889 140060bed 69884->69889 69887 140060c1e 69885->69887 69927 14004af10 24 API calls 2 library calls 69885->69927 69886 140060c0a 69886->69659 69887->69659 69889->69886 69928 14002cdc0 24 API calls 69889->69928 69891 140060de5 69891->69659 69893 140060fcc 69931 14005f640 24 API calls BuildCatchObjectHelperInternal 69893->69931 69896 140060fef 69932 140054dd0 24 API calls _Strcoll 69896->69932 69897 140060f99 69897->69893 69899 140061152 69897->69899 69930 140054dd0 24 API calls _Strcoll 69897->69930 69898 140060c73 ISource Concurrency::cancel_current_task 69898->69891 69929 14005f640 24 API calls BuildCatchObjectHelperInternal 69898->69929 69901 14006117d 69899->69901 69936 14005f4d0 24 API calls 2 library calls 69899->69936 69911 1400611a6 ISource _Strcoll 69901->69911 69937 14005f050 24 API calls 2 library calls 69901->69937 69904 1400611b3 69907 1400611eb 69904->69907 69938 14005f4d0 24 API calls 2 library calls 69904->69938 69905 14006103d 69915 140061069 69905->69915 69934 14005f050 24 API calls 2 library calls 69905->69934 69906 140061006 69906->69905 69906->69911 69906->69915 69933 14005f4d0 24 API calls 2 library calls 69906->69933 69907->69911 69939 14005f050 24 API calls 2 library calls 69907->69939 69911->69659 69913 140054dd0 24 API calls 69913->69915 69914 14005f4d0 24 API calls 69914->69915 69915->69904 69915->69911 69915->69913 69915->69914 69935 14005f050 24 API calls 2 library calls 69915->69935 69918 1400408d3 69917->69918 69921 14004092b _Strcoll 69918->69921 69940 140043430 69918->69940 69920 1400408f6 69920->69921 69922 140040916 69920->69922 69944 140097d7c 69920->69944 69921->69662 69922->69921 69952 140097374 69922->69952 69925->69662 69926->69664 69927->69887 69928->69898 69929->69897 69930->69897 69931->69896 69932->69906 69933->69905 69934->69915 69935->69915 69936->69901 69937->69911 69938->69907 69939->69911 69941 140043453 69940->69941 69942 1400434a1 _Strcoll 69940->69942 69941->69942 69961 140094cf0 23 API calls ProcessCodePage 69941->69961 69942->69920 69945 140097dac 69944->69945 69962 140097b0c 69945->69962 69948 140097dea 69950 140097dff 69948->69950 69974 14008f864 23 API calls 4 library calls 69948->69974 69950->69922 69953 14009739d 69952->69953 69954 140097388 69952->69954 69953->69954 69955 1400973a2 69953->69955 69985 140094e68 7 API calls _set_fmode 69954->69985 69977 1400a0274 69955->69977 69958 14009738d 69986 140098234 23 API calls _invalid_parameter_noinfo 69958->69986 69960 140097398 69960->69921 69961->69942 69963 140097b76 69962->69963 69964 140097b36 69962->69964 69963->69964 69966 140097b82 69963->69966 69976 140098168 23 API calls 2 library calls 69964->69976 69975 140094934 EnterCriticalSection 69966->69975 69967 140097b5d 69967->69948 69973 14008f864 23 API calls 4 library calls 69967->69973 69973->69948 69974->69950 69976->69967 69978 1400a02a4 69977->69978 69987 14009fd80 69978->69987 69981 1400a02e3 69983 1400a02f8 69981->69983 69998 14008f864 23 API calls 4 library calls 69981->69998 69983->69960 69985->69958 69986->69960 69988 14009fdca 69987->69988 69989 14009fd9b 69987->69989 69999 140094934 EnterCriticalSection 69988->69999 70000 140098168 23 API calls 2 library calls 69989->70000 69993 14009fdbb 69993->69981 69997 14008f864 23 API calls 4 library calls 69993->69997 69997->69981 69998->69983 70000->69993 70012 14008f080 70001->70012 70003 14008f362 70003->69672 70005 14008f39f 70017 14002b820 24 API calls 2 library calls 70005->70017 70006 1400ae888 24 API calls std::_Facet_Register 70011 14008f18c ISource BuildCatchObjectHelperInternal 70006->70011 70008 14008f080 24 API calls 70008->70011 70009 14008f3a5 70010 14008f394 70016 14002b8e0 24 API calls 70010->70016 70011->70003 70011->70005 70011->70006 70011->70008 70011->70010 70013 14008f096 70012->70013 70014 14008f0b3 70012->70014 70013->70014 70015 140040ca0 24 API calls 70013->70015 70014->70011 70015->70014 70017->70009 70018->69578 70019 14004c8de 70022 14004d4b0 70019->70022 70021 14004c8e6 _Strcoll 70023 14004d4d6 70022->70023 70024 14004d502 70023->70024 70025 140059fb0 24 API calls 70023->70025 70026 14004e200 24 API calls 70024->70026 70025->70024 70027 14004d567 70026->70027 70027->70021 70028 1400a4e91 70040 1400abf24 70028->70040 70041 140099eec _Getcoll 23 API calls 70040->70041 70043 1400abf2d __crtLCMapStringW 70041->70043 70045 1400998b4 23 API calls BuildCatchObjectHelperInternal 70043->70045 70046 14006a41b 70048 14006a433 ISource 70046->70048 70047 14006a515 ISource _Strcoll 70048->70047 70103 140080040 70048->70103 70050 14006a93f __scrt_get_show_window_mode 70051 14006a97e GetModuleFileNameW 70050->70051 70052 14006a9c0 70051->70052 70052->70052 70053 140036940 24 API calls 70052->70053 70054 14006a9dd 70053->70054 70055 140036940 24 API calls 70054->70055 70056 14006abfe 70055->70056 70158 140036bd0 70056->70158 70058 14006ac0c 70170 140045fd0 24 API calls 70058->70170 70060 14006ac26 70061 140036940 24 API calls 70060->70061 70062 14006ae9d 70061->70062 70063 140036bd0 24 API calls 70062->70063 70064 14006aeab 70063->70064 70171 140045fd0 24 API calls 70064->70171 70066 14006aec6 70067 140036940 24 API calls 70066->70067 70068 14006b13e 70067->70068 70172 14002d4a0 24 API calls 70068->70172 70070 14006b15a 70173 140045fd0 24 API calls 70070->70173 70072 14006b16f 70073 140036940 24 API calls 70072->70073 70074 14006b61d 70073->70074 70075 140036bd0 24 API calls 70074->70075 70076 14006b62e 70075->70076 70174 140045fd0 24 API calls 70076->70174 70078 14006b64c 70079 140036940 24 API calls 70078->70079 70080 14006b8dd 70079->70080 70081 140036bd0 24 API calls 70080->70081 70082 14006b8ee 70081->70082 70175 140045fd0 24 API calls 70082->70175 70084 14006b90c 70085 140036940 24 API calls 70084->70085 70086 14006bb90 70085->70086 70087 140036bd0 24 API calls 70086->70087 70088 14006bba1 70087->70088 70176 140045fd0 24 API calls 70088->70176 70090 14006bbbf 70091 140036940 24 API calls 70090->70091 70092 14006bdaa 70091->70092 70093 140036bd0 24 API calls 70092->70093 70094 14006bdbb 70093->70094 70177 140045fd0 24 API calls 70094->70177 70096 14006bdd9 70097 140036940 24 API calls 70096->70097 70098 14006c0ef 70097->70098 70099 140036bd0 24 API calls 70098->70099 70100 14006c100 70099->70100 70178 140045fd0 24 API calls 70100->70178 70102 14006c11e 70104 1400800d3 70103->70104 70179 14002d810 70104->70179 70106 1400800f8 ISource 70107 14002eaf0 29 API calls 70106->70107 70119 1400801a6 70106->70119 70108 140080164 __scrt_get_show_window_mode 70107->70108 70110 14004a910 41 API calls 70108->70110 70108->70119 70111 140080289 70110->70111 70112 140080539 70111->70112 70113 1400802cd 70111->70113 70205 1400412f0 24 API calls 70112->70205 70188 1400456a0 70113->70188 70114 14008066f 70207 14002cdc0 24 API calls 70114->70207 70118 140080302 70120 14008031f 70118->70120 70121 1400803a2 70118->70121 70137 140080207 ISource _Strcoll 70119->70137 70206 14002e240 24 API calls Concurrency::cancel_current_task 70119->70206 70120->70114 70124 140080351 70120->70124 70197 14008c0b0 24 API calls Concurrency::cancel_current_task 70121->70197 70122 140080696 Concurrency::cancel_current_task 70208 14002cdc0 24 API calls 70122->70208 70195 1400413a0 25 API calls Concurrency::cancel_current_task 70124->70195 70126 1400803b6 70130 1400803cd 70126->70130 70131 140080450 70126->70131 70128 14008035e 70129 140043ff0 24 API calls 70128->70129 70132 14008037e 70129->70132 70130->70122 70136 1400803ff 70130->70136 70200 14008c0b0 24 API calls Concurrency::cancel_current_task 70131->70200 70196 140034ac0 24 API calls 70132->70196 70134 1400806d0 Concurrency::cancel_current_task 70209 14002cdc0 24 API calls 70134->70209 70198 1400413a0 25 API calls Concurrency::cancel_current_task 70136->70198 70137->70050 70138 140080464 70201 14008c0b0 24 API calls Concurrency::cancel_current_task 70138->70201 70141 14008040c 70144 140043ff0 24 API calls 70141->70144 70143 140080473 70202 1400457c0 24 API calls Concurrency::cancel_current_task 70143->70202 70147 14008042c 70144->70147 70145 14008070e Concurrency::cancel_current_task 70199 140034ac0 24 API calls 70147->70199 70148 140080483 70148->70134 70150 1400804b6 70148->70150 70203 1400413a0 25 API calls Concurrency::cancel_current_task 70150->70203 70152 1400804c3 70153 1400429b0 24 API calls 70152->70153 70154 1400804d3 70153->70154 70155 140043ff0 24 API calls 70154->70155 70156 140080502 70155->70156 70204 140034ac0 24 API calls 70156->70204 70161 140036bfe 70158->70161 70163 140036c1a BuildCatchObjectHelperInternal 70161->70163 70164 140036cb4 70161->70164 70165 140036c8d 70161->70165 70166 140036cf3 70161->70166 70169 140036c9e 70161->70169 70163->70058 70167 1400ae888 std::_Facet_Register 24 API calls 70164->70167 70168 1400ae888 std::_Facet_Register 24 API calls 70165->70168 70165->70169 70347 14002b8e0 24 API calls 70166->70347 70167->70163 70168->70169 70169->70163 70346 14002b820 24 API calls 2 library calls 70169->70346 70170->70060 70171->70066 70172->70070 70173->70072 70174->70078 70175->70084 70176->70090 70177->70096 70178->70102 70180 14002d850 70179->70180 70181 14002d97a 70180->70181 70186 14002d896 70180->70186 70182 140036bd0 24 API calls 70181->70182 70183 14002d982 70182->70183 70211 14002d140 70183->70211 70185 14002d8fa BuildCatchObjectHelperInternal 70185->70106 70186->70185 70210 14004ec90 24 API calls 4 library calls 70186->70210 70189 1400437f0 24 API calls 70188->70189 70190 1400456d6 70189->70190 70229 14004ee00 70190->70229 70192 140045739 70237 140049f80 70192->70237 70194 140045745 70194->70118 70195->70128 70196->70137 70197->70126 70198->70141 70199->70137 70200->70138 70201->70143 70202->70148 70203->70152 70204->70137 70205->70119 70207->70122 70208->70134 70209->70145 70210->70185 70212 14002d15f 70211->70212 70213 14002d26b 70212->70213 70223 14002d24a 70212->70223 70214 14002d297 70213->70214 70219 14002d2c0 70213->70219 70215 14002d2a7 70214->70215 70216 14002d35e 70214->70216 70227 1400425d0 24 API calls BuildCatchObjectHelperInternal 70215->70227 70228 1400445e0 24 API calls 70216->70228 70219->70215 70226 140047fd0 24 API calls 4 library calls 70219->70226 70220 14002d255 70220->70185 70225 14002d9c0 24 API calls BuildCatchObjectHelperInternal 70223->70225 70225->70220 70226->70215 70227->70220 70231 14004ee54 70229->70231 70230 14009494c 23 API calls 70232 14004ef3a 70230->70232 70231->70230 70233 14004c600 24 API calls 70232->70233 70234 14004ef61 70233->70234 70289 14002f1f0 70234->70289 70236 14004ef94 _Strcoll 70236->70192 70238 14004a291 70237->70238 70242 140049fcb __scrt_get_show_window_mode 70237->70242 70295 140051e10 70238->70295 70240 14004a2c4 70241 14004c600 24 API calls 70240->70241 70249 14004a2d0 70241->70249 70330 14004b5b0 24 API calls 70242->70330 70244 14004a01b 70331 140050c20 24 API calls 2 library calls 70244->70331 70246 14004a3d8 ISource 70248 1400437f0 24 API calls 70246->70248 70283 14004a5b7 Concurrency::cancel_current_task 70246->70283 70286 14004a4c6 70246->70286 70247 14004a02b 70250 14004c600 24 API calls 70247->70250 70251 14004a48c 70248->70251 70249->70246 70252 14004b780 24 API calls 70249->70252 70253 14004a037 70250->70253 70254 140043ff0 24 API calls 70251->70254 70255 14004a31d 70252->70255 70266 14004b780 24 API calls 70253->70266 70287 14004a1c4 ISource 70253->70287 70254->70286 70257 140051af0 24 API calls 70255->70257 70256 14004a28c ISource _Strcoll 70256->70194 70259 14004a343 70257->70259 70258 14004a1dd 70260 1400437f0 24 API calls 70258->70260 70263 14004bd00 24 API calls 70259->70263 70264 14004a1f8 70260->70264 70261 14004a27f 70332 14004b3d0 24 API calls ISource 70261->70332 70262 14004a225 70262->70261 70265 1400437f0 24 API calls 70262->70265 70273 14004a352 ISource 70263->70273 70272 140043ff0 24 API calls 70264->70272 70265->70264 70269 14004a083 70266->70269 70271 140051af0 24 API calls 70269->70271 70275 14004a0a9 70271->70275 70272->70261 70274 1400b07d0 __std_exception_destroy 8 API calls 70273->70274 70273->70283 70284 14004a588 Concurrency::cancel_current_task 70273->70284 70276 14004a3ca 70274->70276 70277 14004bd00 24 API calls 70275->70277 70278 1400b07d0 __std_exception_destroy 8 API calls 70276->70278 70279 14004a0b9 70277->70279 70278->70246 70280 14004a0ce ISource 70279->70280 70279->70286 70281 1400b07d0 __std_exception_destroy 8 API calls 70280->70281 70280->70284 70282 14004a139 70281->70282 70285 1400b07d0 __std_exception_destroy 8 API calls 70282->70285 70283->70194 70334 140043e90 24 API calls 70284->70334 70288 14004a147 ISource 70285->70288 70286->70256 70333 140043e90 24 API calls 70286->70333 70287->70258 70287->70262 70288->70284 70288->70287 70290 14002f227 70289->70290 70291 14002f1fe 70289->70291 70290->70236 70291->70290 70294 14002cdc0 24 API calls 70291->70294 70293 14002f25e Concurrency::cancel_current_task 70294->70293 70296 140051e8d 70295->70296 70297 140052a5c 70295->70297 70298 14004b780 24 API calls 70297->70298 70299 140052a9c 70298->70299 70300 140051af0 24 API calls 70299->70300 70301 140052ac2 70300->70301 70302 14004bd00 24 API calls 70301->70302 70303 140052ad2 70302->70303 70304 140052b3d 70303->70304 70305 140052add 70303->70305 70335 140043e90 24 API calls 70304->70335 70308 14002eec0 8 API calls 70305->70308 70307 140052b49 Concurrency::cancel_current_task 70336 140043e90 24 API calls 70307->70336 70314 140052af1 _Strcoll 70308->70314 70310 140052b66 Concurrency::cancel_current_task 70337 140043e90 24 API calls 70310->70337 70312 140052b83 Concurrency::cancel_current_task 70338 140054430 24 API calls 70312->70338 70314->70240 70315 140052ba0 Concurrency::cancel_current_task 70339 140043e90 24 API calls 70315->70339 70317 140052bbd Concurrency::cancel_current_task 70340 140043e90 24 API calls 70317->70340 70319 140052bda Concurrency::cancel_current_task 70341 140043e90 24 API calls 70319->70341 70321 140052bf7 Concurrency::cancel_current_task 70342 140043e90 24 API calls 70321->70342 70323 140052c14 Concurrency::cancel_current_task 70343 140043e90 24 API calls 70323->70343 70325 140052c31 Concurrency::cancel_current_task 70344 140043e90 24 API calls 70325->70344 70327 140052c4e Concurrency::cancel_current_task 70345 140043e90 24 API calls 70327->70345 70329 140052c6b Concurrency::cancel_current_task 70330->70244 70331->70247 70332->70256 70333->70284 70334->70283 70335->70307 70336->70310 70337->70312 70338->70315 70339->70317 70340->70319 70341->70321 70342->70323 70343->70325 70344->70327 70345->70329 70346->70166 70348 14008cb57 70349 14008cb61 70348->70349 70350 14008d050 24 API calls 70349->70350 70351 14008cb70 _Strcoll 70350->70351

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Object$DeleteMetricsSystem$CreateSelectStream_$CapsCompatibleCriticalDeviceReleaseSection$BitmapEnterLeaveReadResetSizeStream
                                    • String ID:
                                    • API String ID: 3214587331-3916222277
                                    • Opcode ID: 7880575e5be1866883f8c11694f0fa3bcd234d90e74b5da47c063ed087dc07b9
                                    • Instruction ID: 29d90ec41e240c3377c711dae59ac155e8499d0f3b0558b6758983a8074ab864
                                    • Opcode Fuzzy Hash: 7880575e5be1866883f8c11694f0fa3bcd234d90e74b5da47c063ed087dc07b9
                                    • Instruction Fuzzy Hash: A2B12E32208BC086E761DB22E8543DEB7A5FB8DBC1F408515EB8A43B69DF38C1858B40

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 40 1400bb5b0-1400bb5f0 41 1400bb5f2-1400bb5f9 40->41 42 1400bb605-1400bb60e 40->42 41->42 43 1400bb5fb-1400bb600 41->43 44 1400bb62a-1400bb62c 42->44 45 1400bb610-1400bb613 42->45 46 1400bb884-1400bb8aa call 1400ae860 43->46 48 1400bb882 44->48 49 1400bb632-1400bb636 44->49 45->44 47 1400bb615-1400bb61d 45->47 50 1400bb61f-1400bb621 47->50 51 1400bb623-1400bb626 47->51 48->46 52 1400bb63c-1400bb63f 49->52 53 1400bb70d-1400bb734 call 1400bb984 49->53 50->44 50->51 51->44 55 1400bb653-1400bb665 GetFileAttributesExW 52->55 56 1400bb641-1400bb649 52->56 64 1400bb756-1400bb75f 53->64 65 1400bb736-1400bb73f 53->65 59 1400bb6b8-1400bb6c7 55->59 60 1400bb667-1400bb670 call 1400d5168 55->60 56->55 62 1400bb64b-1400bb64d 56->62 66 1400bb6cb-1400bb6cd 59->66 60->46 74 1400bb676-1400bb688 FindFirstFileW 60->74 62->53 62->55 70 1400bb813-1400bb81c 64->70 71 1400bb765-1400bb77d GetFileInformationByHandleEx 64->71 68 1400bb74f-1400bb751 65->68 69 1400bb741-1400bb749 call 1400d5140 65->69 72 1400bb6d9-1400bb707 66->72 73 1400bb6cf-1400bb6d7 66->73 68->46 69->68 94 1400bb8c5-1400bb8ca call 1400998b4 69->94 78 1400bb86b-1400bb86d 70->78 79 1400bb81e-1400bb832 GetFileInformationByHandleEx 70->79 76 1400bb77f-1400bb78b call 1400d5168 71->76 77 1400bb7a5-1400bb7be 71->77 72->48 72->53 73->53 73->72 81 1400bb68a-1400bb690 call 1400d5168 74->81 82 1400bb695-1400bb6b6 call 1400d5110 74->82 108 1400bb79e-1400bb7a0 76->108 109 1400bb78d-1400bb798 call 1400d5140 76->109 77->70 80 1400bb7c0-1400bb7c4 77->80 84 1400bb8ab-1400bb8af 78->84 85 1400bb86f-1400bb873 78->85 87 1400bb834-1400bb840 call 1400d5168 79->87 88 1400bb858-1400bb868 79->88 91 1400bb80c 80->91 92 1400bb7c6-1400bb7e0 GetFileInformationByHandleEx 80->92 81->46 82->66 89 1400bb8be-1400bb8c3 84->89 90 1400bb8b1-1400bb8bc call 1400d5140 84->90 85->48 96 1400bb875-1400bb880 call 1400d5140 85->96 87->108 110 1400bb846-1400bb851 call 1400d5140 87->110 88->78 89->46 90->89 90->94 107 1400bb810 91->107 101 1400bb803-1400bb80a 92->101 102 1400bb7e2-1400bb7ee call 1400d5168 92->102 118 1400bb8cb-1400bb8d0 call 1400998b4 94->118 96->48 96->94 101->107 102->108 121 1400bb7f0-1400bb7fb call 1400d5140 102->121 107->70 108->46 109->108 123 1400bb8d7-1400bb8df call 1400998b4 109->123 124 1400bb853 110->124 125 1400bb8d1-1400bb8d6 call 1400998b4 110->125 118->125 121->118 132 1400bb801 121->132 124->108 125->123 132->108
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Close$ErrorFileFindHandleLast$AttributesFirst__std_fs_open_handle
                                    • String ID:
                                    • API String ID: 2398595512-0
                                    • Opcode ID: ae06ef96b620ec177ea6819a3a1ac38214177ad565b87e13f1ccf53398ca1eb7
                                    • Instruction ID: fde7f6f548f3d5d2f6b779677d4d0ac92ef93c0439d4cbf494ca9037cd0bf826
                                    • Opcode Fuzzy Hash: ae06ef96b620ec177ea6819a3a1ac38214177ad565b87e13f1ccf53398ca1eb7
                                    • Instruction Fuzzy Hash: 50918E32204E0147E6769FA7A8047AA23A4AB8D7F5F584714FBB6476F4DFB8CA05C740
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Name$DevicesDisplayEnum$ComputerCurrentFileGlobalMemoryModuleProfileStatusUserValuewcsftime
                                    • String ID: %d-%m-%Y, %H:%M:%S$computer_name$cpu$gpu$ram$system$time$timezone$user_name
                                    • API String ID: 2509368203-1182675529
                                    • Opcode ID: 286886150a149220558eda05bb1874823fa911463f34d60d30cc8f1aee4a1d55
                                    • Instruction ID: d620e18de0984a8e39bfa124ec3d4ddc85dfef93ce126abce4a28bff5dd582f2
                                    • Opcode Fuzzy Hash: 286886150a149220558eda05bb1874823fa911463f34d60d30cc8f1aee4a1d55
                                    • Instruction Fuzzy Hash: EDF25A33614BC085EB22DB26E8903DD77A1F799798F419616FB9D47BA9DB38C284C700

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 629 14003d570-14003d66f LoadLibraryA 630 14003d675-14003da30 call 1400d5150 * 6 629->630 631 14003e530-14003e53a 629->631 630->631 652 14003da36-14003da39 630->652 632 14003e53c-14003e53e 631->632 633 14003e549-14003e54c 631->633 632->633 635 14003e557-14003e586 call 1400ae860 633->635 636 14003e54e-14003e551 call 1400d5160 633->636 636->635 652->631 653 14003da3f-14003da42 652->653 653->631 654 14003da48-14003da4b 653->654 654->631 655 14003da51-14003da54 654->655 655->631 656 14003da5a-14003da5d 655->656 656->631 657 14003da63-14003da71 656->657 658 14003da75-14003da77 657->658 658->631 659 14003da7d-14003da89 658->659 659->631 660 14003da8f-14003da98 659->660 661 14003daa0-14003dabb 660->661 663 14003dac1-14003dadf 661->663 664 14003e517-14003e523 661->664 663->664 667 14003dae5-14003daf7 663->667 664->661 665 14003e529 664->665 665->631 668 14003e503-14003e512 667->668 669 14003dafd 667->669 668->664 670 14003db02-14003db53 call 1400ae888 669->670 675 14003ddd2 670->675 676 14003db59-14003db60 670->676 678 14003ddd4-14003dddb 675->678 676->675 677 14003db66-14003dc5f call 1400778f0 call 140045310 call 1400455e0 676->677 703 14003dc60-14003dc68 677->703 680 14003e051-14003e08d 678->680 681 14003dde1-14003dde8 678->681 689 14003e093-14003e0a1 680->689 690 14003e327-14003e329 680->690 681->680 683 14003ddee-14003dedb call 1400778f0 call 140045310 call 1400455e0 681->683 715 14003dee2-14003deea 683->715 693 14003e0a7-14003e0ae 689->693 694 14003e320-14003e323 689->694 695 14003e4d5-14003e4eb call 1400400f0 690->695 696 14003e32f-14003e458 call 1400486b0 call 140041900 call 1400486b0 call 140041900 call 140043ff0 call 1400ae888 call 1400651b0 690->696 693->694 701 14003e0b4-14003e1a8 call 1400778f0 call 140045310 call 1400455e0 693->701 694->690 699 14003e325 694->699 710 14003e4f1-14003e4fc 695->710 711 14003db00 695->711 788 14003e464-14003e477 call 1400437f0 696->788 789 14003e45a-14003e45c 696->789 699->690 733 14003e1b0-14003e1b7 701->733 703->703 708 14003dc6a-14003dcc4 call 1400486b0 call 140046bc0 call 140043ff0 703->708 741 14003dcf7-14003dd21 708->741 742 14003dcc6-14003dcd7 708->742 710->668 711->670 715->715 719 14003deec-14003df45 call 1400486b0 call 140046bc0 call 140043ff0 715->719 752 14003df78-14003dfa2 719->752 753 14003df47-14003df58 719->753 733->733 734 14003e1b9-14003e212 call 1400486b0 call 140046bc0 call 140043ff0 733->734 798 14003e214-14003e225 734->798 799 14003e245-14003e26e 734->799 747 14003dd23-14003dd37 741->747 748 14003dd59-14003dd7f 741->748 743 14003dcf2 call 1400ae880 742->743 744 14003dcd9-14003dcec 742->744 743->741 744->743 750 14003e5e1-14003e5e6 call 140098254 744->750 755 14003dd52-14003dd57 call 1400ae880 747->755 756 14003dd39-14003dd4c 747->756 758 14003dd81-14003dd95 748->758 759 14003ddb7-14003ddd0 748->759 763 14003e5e7-14003e5ec call 140098254 750->763 764 14003dfa4-14003dfb8 752->764 765 14003dfda-14003e000 752->765 760 14003df73 call 1400ae880 753->760 761 14003df5a-14003df6d 753->761 755->748 756->755 756->763 769 14003dd97-14003ddaa 758->769 770 14003ddb0-14003ddb5 call 1400ae880 758->770 759->678 760->752 761->760 771 14003e5f3-14003e5f8 call 140098254 761->771 779 14003e5ed-14003e5f2 call 140098254 763->779 774 14003dfd3-14003dfd8 call 1400ae880 764->774 775 14003dfba-14003dfcd 764->775 780 14003e002-14003e016 765->780 781 14003e038-14003e04a 765->781 769->770 769->779 770->759 787 14003e5f9-14003e5fe call 140098254 771->787 774->765 775->774 775->787 779->771 791 14003e031-14003e036 call 1400ae880 780->791 792 14003e018-14003e02b 780->792 781->680 805 14003e5ff-14003e604 call 140098254 787->805 810 14003e47b-14003e487 788->810 801 14003e462 789->801 802 14003e58d-14003e5da call 1400439b0 call 1400479f0 call 140047ac0 call 1400b0e88 789->802 791->781 792->791 792->805 806 14003e227-14003e23a 798->806 807 14003e240 call 1400ae880 798->807 811 14003e2a4-14003e2ca 799->811 812 14003e270-14003e284 799->812 801->810 836 14003e5db-14003e5e0 call 140098254 802->836 819 14003e605-14003e60a call 140098254 805->819 806->807 806->819 807->799 824 14003e489-14003e4ac 810->824 825 14003e4ae-14003e4b8 call 140050610 810->825 817 14003e2cc-14003e2e0 811->817 818 14003e300-14003e319 811->818 822 14003e286-14003e299 812->822 823 14003e29f call 1400ae880 812->823 832 14003e2e2-14003e2f5 817->832 833 14003e2fb call 1400ae880 817->833 818->694 822->823 827 14003e587-14003e58c call 140098254 822->827 823->811 829 14003e4bd-14003e4ce call 140043ff0 824->829 825->829 827->802 829->695 832->833 832->836 833->818 836->750
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$Library$FreeLoad
                                    • String ID: cannot use push_back() with $system$vault
                                    • API String ID: 2449869053-1741236777
                                    • Opcode ID: c000e3d45510e42f7568d5470ac037552d3d6c9599d3bb9b565b5fb69ffb7507
                                    • Instruction ID: 696e51854e3c29299793d402c575ee2136e7098d30157e86c4ca4cc0287c11fa
                                    • Opcode Fuzzy Hash: c000e3d45510e42f7568d5470ac037552d3d6c9599d3bb9b565b5fb69ffb7507
                                    • Instruction Fuzzy Hash: E0924C72205BC489DB628F26E8843DE77B4F749798F504216EB9D4BBA9EF74C684C700

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 849 140065970-1400659b0 850 1400659b6-1400659c0 849->850 851 140065aaf-140065ab8 849->851 854 140065aa6-140065aac 850->854 855 1400659c6-1400659ce 850->855 852 140065b02-140065b14 call 1400bb4c0 851->852 853 140065aba-140065ac6 851->853 866 140065b56-140065b5a 852->866 867 140065b16-140065b1a 852->867 856 140065ac8-140065ad8 853->856 857 140065ada-140065ae1 call 140072660 853->857 854->851 858 1400659d0-1400659d5 855->858 859 1400659db-1400659df 855->859 861 140065ae6-140065b00 call 14002e2a0 856->861 857->861 858->854 858->859 863 140065a38-140065a3a 859->863 864 1400659e1-1400659ea 859->864 874 140065b5e-140065b64 861->874 863->851 869 140065a3c-140065a6c 863->869 870 1400659ef-140065a06 call 1400bb5b0 864->870 871 1400659ec 864->871 866->874 872 140065b20-140065b26 867->872 876 140065a9f-140065aa1 869->876 877 140065a6e-140065a80 869->877 887 140065a08-140065a12 870->887 888 140065a14-140065a17 870->888 871->870 878 140065b28-140065b30 872->878 879 140065b54 872->879 882 140065cb3-140065cc0 call 14002e4f0 874->882 883 140065b6a-140065b6c 874->883 881 140065cc2-140065cf2 call 1400ae860 876->881 877->876 884 140065a82-140065a94 877->884 885 140065b32-140065b36 878->885 886 140065b3f-140065b50 call 1400bb4c0 878->886 879->866 882->881 891 140065b70-140065b73 883->891 884->876 901 140065a96-140065a99 884->901 885->879 893 140065b38-140065b3d 885->893 886->872 910 140065b52 886->910 887->863 894 140065a36 888->894 895 140065a19-140065a1c 888->895 899 140065cf5-140065d29 891->899 900 140065b79-140065b81 891->900 893->879 893->886 894->863 895->894 902 140065a1e-140065a21 895->902 904 140065d55-140065d57 899->904 905 140065d2b-140065d36 899->905 906 140065b87-140065bba call 1400bb4e0 * 2 900->906 907 140065cf3 900->907 901->876 902->894 909 140065a23-140065a26 902->909 904->881 905->904 911 140065d38-140065d4a 905->911 919 140065bbf-140065bd2 call 14002d020 906->919 920 140065bbc 906->920 907->899 909->894 913 140065a28-140065a2b 909->913 910->866 911->904 917 140065d4c-140065d4f 911->917 913->863 916 140065a2d-140065a34 913->916 916->863 916->894 917->904 923 140065bd4-140065bdb 919->923 924 140065c2d-140065c37 919->924 920->919 927 140065be3 923->927 928 140065bdd-140065be1 923->928 925 140065c3d-140065c49 924->925 926 140065d5c-140065d61 call 1400445e0 924->926 930 140065c4e-140065c64 call 1400bb4c0 925->930 931 140065c4b 925->931 932 140065be7-140065bea 927->932 928->927 928->932 930->891 938 140065c6a-140065c6e 930->938 931->930 932->924 935 140065bec 932->935 937 140065bf0-140065bfc 935->937 939 140065bfe-140065c02 937->939 940 140065c0c-140065c0f 937->940 942 140065c70-140065c76 938->942 939->940 943 140065c04-140065c0a 939->943 940->924 941 140065c11-140065c1d 940->941 944 140065c25-140065c2b 941->944 945 140065c1f-140065c23 941->945 946 140065ca7-140065ca9 942->946 947 140065c78-140065c80 942->947 943->937 943->940 944->924 944->941 945->924 945->944 948 140065cab-140065cad 946->948 949 140065c82-140065c86 947->949 950 140065c90-140065ca1 call 1400bb4c0 947->950 948->882 948->891 949->946 952 140065c88-140065c8e 949->952 950->942 954 140065ca3-140065ca5 950->954 952->946 952->950 954->948
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: .$@$@$cannot use push_back() with $chrome_key$content$directory_iterator::directory_iterator$exists$filename$key$prefs.js$recursive_directory_iterator::operator++$recursive_directory_iterator::recursive_directory_iterator$status
                                    • API String ID: 0-4287193513
                                    • Opcode ID: d85864b6336acd62be5f7280330fa91da0aadc80efc30bd9caf6eb99ab158536
                                    • Instruction ID: 76d522da9c60edd065d321252c96f4a617312223c2e0a99c55d01cc88780bd8f
                                    • Opcode Fuzzy Hash: d85864b6336acd62be5f7280330fa91da0aadc80efc30bd9caf6eb99ab158536
                                    • Instruction Fuzzy Hash: 40C18232200B8586EB62EF26D8843ED63A2F76C7D5F644A11FB9D437A5DB78C941C740

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$Exit$MutexOpenToken$CloseCreateCurrentFileHandleInformationInitializeModuleName
                                    • String ID: SeDebugPrivilege$SeImpersonatePrivilege
                                    • API String ID: 4279366119-3768118664
                                    • Opcode ID: 06ac85763f9a18a1cc96000ce891c6a5429a7b4bc90ff6d88ec2da73067e368e
                                    • Instruction ID: 3ae122bd098ee7b8381494ed92cbdbbf6973114b6c4fbea328cfc20ec3a2cbb6
                                    • Opcode Fuzzy Hash: 06ac85763f9a18a1cc96000ce891c6a5429a7b4bc90ff6d88ec2da73067e368e
                                    • Instruction Fuzzy Hash: 34619F32618A8481FA62AB66E4523EE63A0FB8D7C0F505615FB8D476F6DF3CC1418B11
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseOpenQueryValue
                                    • String ID: content$directory_iterator::directory_iterator$exists$filename$status
                                    • API String ID: 3677997916-3429737954
                                    • Opcode ID: 035a063e41ede83a0fd5412019dce75b81cb3214d819aa95f3ac2bc1dd272a41
                                    • Instruction ID: 7b7ad4ccabc59f41d35c00ebb4a54e0cc5e1f704924bbbbd3f86ce4379df2c1a
                                    • Opcode Fuzzy Hash: 035a063e41ede83a0fd5412019dce75b81cb3214d819aa95f3ac2bc1dd272a41
                                    • Instruction Fuzzy Hash: F7E24B72615BC08AEB729F36D8803DD73A5F789798F505216EB9C4BAA9DF74C684C300

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1542 140032ca0-140032d72 1543 140032d75-140032d7c 1542->1543 1543->1543 1544 140032d7e-140032efe call 1400486b0 1543->1544 1547 140032f01-140032f09 1544->1547 1547->1547 1548 140032f0b-140032f93 call 1400486b0 1547->1548 1551 140032f96-140032f9e 1548->1551 1551->1551 1552 140032fa0-14003302a call 1400486b0 RegOpenKeyExA 1551->1552 1555 140033030-140033072 RegQueryValueExA 1552->1555 1556 1400330ee-1400330f5 1552->1556 1555->1556 1557 140033074-1400330b2 call 1400486b0 call 1400428e0 1555->1557 1558 1400330f7 RegCloseKey 1556->1558 1559 1400330fd-140033168 call 140055c20 1556->1559 1575 1400330b4-1400330c5 1557->1575 1576 1400330e5-1400330ea 1557->1576 1558->1559 1564 14003319c-1400331af 1559->1564 1565 14003316a-14003317c 1559->1565 1569 1400331b5-1400331f5 call 14002eaf0 1564->1569 1570 14003382b-140033836 1564->1570 1567 140033197 call 1400ae880 1565->1567 1568 14003317e-140033191 1565->1568 1567->1564 1568->1567 1572 1400339d1-1400339d6 call 140098254 1568->1572 1594 1400339a7-1400339a9 1569->1594 1595 1400331fb-1400331fe 1569->1595 1577 140033838-14003384e 1570->1577 1578 14003386e-140033890 1570->1578 1598 1400339d7-1400339e9 call 14002e1d0 1572->1598 1583 1400330c7-1400330da 1575->1583 1584 1400330e0 call 1400ae880 1575->1584 1576->1556 1585 140033869 call 1400ae880 1577->1585 1586 140033850-140033863 1577->1586 1580 140033892-1400338a6 1578->1580 1581 1400338c6-1400338e0 1578->1581 1590 1400338c1 call 1400ae880 1580->1590 1591 1400338a8-1400338bb 1580->1591 1592 1400338e2-1400338f6 1581->1592 1593 140033916-140033930 1581->1593 1583->1584 1596 1400339cb-1400339d0 call 140098254 1583->1596 1584->1576 1585->1578 1586->1585 1587 1400339f0-1400339f5 call 140098254 1586->1587 1625 1400339f6-140033a05 call 14002e1d0 1587->1625 1590->1581 1591->1590 1599 140033a1e-140033a23 call 140098254 1591->1599 1604 140033911 call 1400ae880 1592->1604 1605 1400338f8-14003390b 1592->1605 1607 140033962-1400339a6 call 1400ae860 1593->1607 1608 140033932-140033946 1593->1608 1600 1400339b6-1400339ca call 14002e240 1594->1600 1601 1400339ab 1594->1601 1595->1570 1606 140033204-14003322b call 14002d020 1595->1606 1596->1572 1630 1400339ea-1400339ef call 140098254 1598->1630 1614 140033a24-140033a29 call 140098254 1599->1614 1600->1596 1601->1570 1604->1593 1605->1604 1605->1614 1633 14003329c-140033305 call 140036940 call 140045140 1606->1633 1634 14003322d 1606->1634 1618 140033948-14003395b 1608->1618 1619 14003395d call 1400ae880 1608->1619 1618->1619 1629 1400339b0-1400339b5 call 140098254 1618->1629 1619->1607 1644 140033a06-140033a0b call 140098254 1625->1644 1629->1600 1630->1587 1633->1598 1653 14003330b-14003331a 1633->1653 1640 140033230-140033237 1634->1640 1641 140033239-14003323d 1640->1641 1642 14003323f-140033246 1640->1642 1641->1642 1647 140033248-14003324b 1641->1647 1642->1640 1642->1647 1652 140033a0c-140033a11 call 140098254 1644->1652 1647->1633 1651 14003324d 1647->1651 1654 140033250-14003325c 1651->1654 1667 140033a12-140033a17 call 140098254 1652->1667 1656 140033352-140033382 1653->1656 1657 14003331c-140033332 1653->1657 1658 14003326e-140033271 1654->1658 1659 14003325e-140033262 1654->1659 1664 140033384-140033388 1656->1664 1665 14003338c-1400333cb call 14002e8c0 1656->1665 1661 140033334-140033347 1657->1661 1662 14003334d call 1400ae880 1657->1662 1658->1633 1666 140033273-140033277 1658->1666 1659->1658 1663 140033264-14003326a 1659->1663 1661->1630 1661->1662 1662->1656 1663->1654 1669 14003326c 1663->1669 1664->1665 1677 1400333da-140033404 call 14002e9a0 1665->1677 1678 1400333cd-1400333d6 1665->1678 1671 140033280-14003328c 1666->1671 1679 140033a18-140033a1d call 14002cf70 1667->1679 1669->1633 1674 140033294-14003329a 1671->1674 1675 14003328e-140033292 1671->1675 1674->1633 1674->1671 1675->1633 1675->1674 1683 14003340a 1677->1683 1684 140033789-140033793 1677->1684 1678->1677 1679->1599 1686 140033410-140033431 call 14002eaf0 1683->1686 1687 140033795-14003379f 1684->1687 1688 1400337bf-1400337c9 1684->1688 1696 140033433-14003343b 1686->1696 1697 140033441-140033444 1686->1697 1687->1688 1690 1400337a1-1400337b3 1687->1690 1691 1400337f5-1400337fc 1688->1691 1692 1400337cb-1400337d5 1688->1692 1690->1688 1703 1400337b5-1400337be 1690->1703 1691->1570 1694 1400337fe-140033808 1691->1694 1692->1691 1695 1400337d7-1400337e9 1692->1695 1694->1570 1698 14003380a-14003381e 1694->1698 1695->1691 1704 1400337eb-1400337f4 1695->1704 1696->1625 1696->1697 1701 14003344a-140033461 call 14007f8f0 1697->1701 1702 140033769-140033783 call 14002e7b0 1697->1702 1698->1570 1710 140033820-14003382a 1698->1710 1713 140033467-1400334b0 call 140043a40 call 14002d4e0 call 14002d370 1701->1713 1714 14003375d-140033764 call 14002f380 1701->1714 1702->1684 1702->1686 1703->1688 1704->1691 1710->1570 1723 1400334b2 1713->1723 1724 1400334b5-140033554 call 140045310 call 1400455e0 call 1400486b0 call 140041900 call 140043ff0 1713->1724 1714->1702 1723->1724 1735 140033587-14003359f 1724->1735 1736 140033556-140033567 1724->1736 1737 1400335d2-1400335ea 1735->1737 1738 1400335a1-1400335b2 1735->1738 1739 140033582 call 1400ae880 1736->1739 1740 140033569-14003357c 1736->1740 1743 140033622-140033643 1737->1743 1744 1400335ec-140033602 1737->1744 1741 1400335b4-1400335c7 1738->1741 1742 1400335cd call 1400ae880 1738->1742 1739->1735 1740->1644 1740->1739 1741->1652 1741->1742 1742->1737 1743->1679 1749 140033649-14003375c call 14005d590 call 1400486b0 call 140041900 call 140043ff0 call 1400429b0 call 140041900 call 1400429b0 call 140041900 call 1400417a0 call 140043ff0 1743->1749 1747 140033604-140033617 1744->1747 1748 14003361d call 1400ae880 1744->1748 1747->1667 1747->1748 1748->1743 1749->1714
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseOpenQueryValue
                                    • String ID: content$directory_iterator::directory_iterator$exists$filename$status
                                    • API String ID: 3677997916-3429737954
                                    • Opcode ID: a866973bd759222d398105693641a06b5bd7560993289929aca12bb0f0a5aea5
                                    • Instruction ID: 47e475a853bf6280244d8020a7fc99c2c981a6738fa49efe3c1ad0c059e6ac7a
                                    • Opcode Fuzzy Hash: a866973bd759222d398105693641a06b5bd7560993289929aca12bb0f0a5aea5
                                    • Instruction Fuzzy Hash: 7C824A72611BC48AEB628F3AD8803DE73A1F789798F505216EB9D57BA9DF34C584C340

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1771 1400a2e3c-1400a2e77 call 1400a24d8 call 1400a24e0 call 1400a2548 1778 1400a2e7d-1400a2e88 call 1400a24e8 1771->1778 1779 1400a30a1-1400a30ed call 140098284 call 1400a24d8 call 1400a24e0 call 1400a2548 1771->1779 1778->1779 1784 1400a2e8e-1400a2e98 1778->1784 1805 1400a322b-1400a3299 call 140098284 call 1400aba84 1779->1805 1806 1400a30f3-1400a30fe call 1400a24e8 1779->1806 1786 1400a2eba-1400a2ebe 1784->1786 1787 1400a2e9a-1400a2e9d 1784->1787 1791 1400a2ec1-1400a2ec9 1786->1791 1790 1400a2ea0-1400a2eab 1787->1790 1793 1400a2ead-1400a2eb4 1790->1793 1794 1400a2eb6-1400a2eb8 1790->1794 1791->1791 1795 1400a2ecb-1400a2ede call 14009e8bc 1791->1795 1793->1790 1793->1794 1794->1786 1797 1400a2ee7-1400a2ef5 1794->1797 1802 1400a2ee0-1400a2ee2 call 14009d3c8 1795->1802 1803 1400a2ef6-1400a2f02 call 14009d3c8 1795->1803 1802->1797 1811 1400a2f09-1400a2f11 1803->1811 1823 1400a329b-1400a32a2 1805->1823 1824 1400a32a7-1400a32aa 1805->1824 1806->1805 1815 1400a3104-1400a310f call 1400a2518 1806->1815 1811->1811 1814 1400a2f13-1400a2f24 call 1400a7fd8 1811->1814 1814->1779 1825 1400a2f2a-1400a2f80 call 1400c1650 * 4 call 1400a2d58 1814->1825 1815->1805 1826 1400a3115-1400a311c call 14009d3c8 1815->1826 1827 1400a3337-1400a333a 1823->1827 1828 1400a32ac 1824->1828 1829 1400a32e1-1400a32f4 call 14009e8bc 1824->1829 1882 1400a2f82-1400a2f86 1825->1882 1836 1400a3121-1400a312f call 1400d5260 1826->1836 1832 1400a32af 1827->1832 1833 1400a3340-1400a3348 call 1400a2e3c 1827->1833 1828->1832 1846 1400a32ff-1400a331a call 1400aba84 1829->1846 1847 1400a32f6 1829->1847 1837 1400a32b4-1400a32e0 call 14009d3c8 call 1400ae860 1832->1837 1838 1400a32af call 1400a30b8 1832->1838 1833->1837 1848 1400a3135-1400a3138 1836->1848 1838->1837 1865 1400a331c-1400a331f 1846->1865 1866 1400a3321-1400a3333 call 14009d3c8 1846->1866 1854 1400a32f8-1400a32fd call 14009d3c8 1847->1854 1849 1400a3200-1400a322a call 1400a24d0 call 1400a24c0 call 1400a24c8 1848->1849 1850 1400a313e-1400a315f 1848->1850 1855 1400a316a-1400a3171 1850->1855 1856 1400a3161-1400a3167 1850->1856 1854->1828 1863 1400a3173-1400a317b 1855->1863 1864 1400a3185 1855->1864 1856->1855 1863->1864 1871 1400a317d-1400a3183 1863->1871 1870 1400a3187-1400a31fb call 1400c1650 * 4 call 1400a69a4 call 1400a3350 * 2 1864->1870 1865->1854 1866->1827 1870->1849 1871->1870 1885 1400a2f8c-1400a2f90 1882->1885 1886 1400a2f88 1882->1886 1885->1882 1888 1400a2f92-1400a2fb7 call 140094550 1885->1888 1886->1885 1894 1400a2fba-1400a2fbe 1888->1894 1896 1400a2fc0-1400a2fcb 1894->1896 1897 1400a2fcd-1400a2fd1 1894->1897 1896->1897 1899 1400a2fd3-1400a2fd7 1896->1899 1897->1894 1902 1400a2fd9-1400a3001 call 140094550 1899->1902 1903 1400a3058-1400a305c 1899->1903 1914 1400a301f-1400a3023 1902->1914 1915 1400a3003 1902->1915 1905 1400a305e-1400a3060 1903->1905 1906 1400a3063-1400a3070 1903->1906 1905->1906 1909 1400a308b-1400a309a call 1400a24d0 call 1400a24c0 1906->1909 1910 1400a3072-1400a3088 call 1400a2d58 1906->1910 1909->1779 1910->1909 1914->1903 1918 1400a3025-1400a3043 call 140094550 1914->1918 1916 1400a3006-1400a300d 1915->1916 1916->1914 1920 1400a300f-1400a301d 1916->1920 1925 1400a304f-1400a3056 1918->1925 1920->1914 1920->1916 1925->1903 1926 1400a3045-1400a3049 1925->1926 1926->1903 1927 1400a304b 1926->1927 1927->1925
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _get_daylight$_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                    • String ID: Eastern Standard Time$Eastern Summer Time
                                    • API String ID: 355007559-239921721
                                    • Opcode ID: d27e707e32a7a668b79f18f39980f86f66c1361dc0c94ac41fd5faca01788e5a
                                    • Instruction ID: 33c1b94af872691e134a774f96405fbf90e61f0c3ac2d4846b7876194704bd86
                                    • Opcode Fuzzy Hash: d27e707e32a7a668b79f18f39980f86f66c1361dc0c94ac41fd5faca01788e5a
                                    • Instruction Fuzzy Hash: 93D1A03271024086EB26EF37D8517E967A1F7ACBD4F448236FF5947AA6DB38C4818B40

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1928 140085240-1400853de 1929 1400853e0-1400853e7 1928->1929 1929->1929 1930 1400853e9-14008541c call 1400486b0 InternetOpenA 1929->1930 1933 140085422-140085438 1930->1933 1934 1400854b5-1400854cc 1930->1934 1935 140085440-140085448 1933->1935 1936 1400854ce 1934->1936 1937 1400854d1-1400854f8 InternetOpenUrlA 1934->1937 1938 14008544a-14008545b 1935->1938 1939 14008547b-1400854b4 call 1400ae860 1935->1939 1936->1937 1940 140085529-140085554 HttpQueryInfoW 1937->1940 1941 1400854fa-140085524 1937->1941 1944 14008545d-140085470 1938->1944 1945 140085476 call 1400ae880 1938->1945 1942 14008558f-1400855ea HttpQueryInfoW 1940->1942 1943 140085556-14008558a 1940->1943 1941->1935 1950 1400855ec-140085602 call 140094550 1942->1950 1951 140085618-14008562e InternetQueryDataAvailable 1942->1951 1943->1942 1944->1945 1948 1400858b5-1400858ba call 140098254 1944->1948 1945->1939 1961 1400858bb-1400858c0 call 14002b820 1948->1961 1950->1951 1965 140085604-140085613 call 140048560 1950->1965 1954 140085813-140085866 InternetCloseHandle 1951->1954 1955 140085634-140085639 1951->1955 1964 14008586f-140085878 1954->1964 1959 140085640-140085646 1955->1959 1959->1954 1962 14008564c-140085666 1959->1962 1967 1400856d9-1400856f1 InternetReadFile 1962->1967 1968 140085668-14008566e 1962->1968 1964->1939 1969 14008587e-14008588f 1964->1969 1965->1951 1976 1400857cd-1400857d4 1967->1976 1977 1400856f7-1400856fc 1967->1977 1972 14008569c-14008569f call 1400ae888 1968->1972 1973 140085670-140085677 1968->1973 1969->1945 1974 140085895-1400858a8 1969->1974 1988 1400856a4-1400856d4 call 1400c1650 1972->1988 1973->1961 1980 14008567d-140085688 call 1400ae888 1973->1980 1974->1948 1982 1400858aa 1974->1982 1976->1954 1979 1400857d6-1400857e7 1976->1979 1977->1976 1978 140085702-14008570d 1977->1978 1983 14008573f-140085759 call 140049030 1978->1983 1984 14008570f-14008573d call 1400c0fb0 1978->1984 1985 1400857e9-1400857fc 1979->1985 1986 140085802-14008580f call 1400ae880 1979->1986 1990 1400858af-1400858b4 call 140098254 1980->1990 1998 14008568e-14008569a 1980->1998 1982->1945 2001 14008575a-140085761 1983->2001 1984->2001 1985->1986 1985->1990 1986->1954 1988->1967 1990->1948 1998->1988 2003 140085763-140085774 2001->2003 2004 1400857a4 2001->2004 2005 14008578f-1400857a2 call 1400ae880 2003->2005 2006 140085776-140085789 2003->2006 2007 1400857a6-1400857bc InternetQueryDataAvailable 2004->2007 2005->2007 2006->1990 2006->2005 2007->1954 2009 1400857be-1400857c8 2007->2009 2009->1959
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Internet$Query$AvailableDataHttpInfoOpen$CloseConcurrency::cancel_current_taskFileHandleRead
                                    • String ID:
                                    • API String ID: 1475545111-0
                                    • Opcode ID: a1bf36862956553251bf516f1b99f75e72d1c813fc2b51caefe99fe4a895b67f
                                    • Instruction ID: fd1ac0142f7f91e5f8ef5dc0f4e92bc1219fc87fbcb7f59bf81abb0586ba325b
                                    • Opcode Fuzzy Hash: a1bf36862956553251bf516f1b99f75e72d1c813fc2b51caefe99fe4a895b67f
                                    • Instruction Fuzzy Hash: F8025A33A14B9486EB11DB6AE84039E77A5F7997D8F204215EF9857BA8DF78C181C700

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2011 1400c0658-1400c06cb call 1400c023c 2014 1400c06cd-1400c06d6 call 140094e48 2011->2014 2015 1400c06e5-1400c06ef call 1400a566c 2011->2015 2022 1400c06d9-1400c06e0 call 140094e68 2014->2022 2020 1400c070a-1400c0773 CreateFileW 2015->2020 2021 1400c06f1-1400c0708 call 140094e48 call 140094e68 2015->2021 2024 1400c07f0-1400c07fb GetFileType 2020->2024 2025 1400c0775-1400c077b 2020->2025 2021->2022 2033 1400c0a26-1400c0a46 2022->2033 2028 1400c07fd-1400c0838 call 1400d5168 call 140094ddc call 1400d5140 2024->2028 2029 1400c084e-1400c0855 2024->2029 2031 1400c07bd-1400c07eb call 1400d5168 call 140094ddc 2025->2031 2032 1400c077d-1400c0781 2025->2032 2028->2022 2058 1400c083e-1400c0849 call 140094e68 2028->2058 2037 1400c085d-1400c0860 2029->2037 2038 1400c0857-1400c085b 2029->2038 2031->2022 2032->2031 2036 1400c0783-1400c07bb CreateFileW 2032->2036 2036->2024 2036->2031 2040 1400c0866-1400c08bb call 1400a5584 2037->2040 2041 1400c0862 2037->2041 2038->2040 2051 1400c08bd-1400c08c9 call 1400c0444 2040->2051 2052 1400c08da-1400c090b call 1400bffbc 2040->2052 2041->2040 2051->2052 2060 1400c08cb 2051->2060 2062 1400c090d-1400c090f 2052->2062 2063 1400c0911-1400c0953 2052->2063 2058->2022 2066 1400c08cd-1400c08d5 call 14009d540 2060->2066 2062->2066 2064 1400c0975-1400c0980 2063->2064 2065 1400c0955-1400c0959 2063->2065 2069 1400c0986-1400c098a 2064->2069 2070 1400c0a24 2064->2070 2065->2064 2068 1400c095b-1400c0970 2065->2068 2066->2033 2068->2064 2069->2070 2072 1400c0990-1400c09d5 call 1400d5140 CreateFileW 2069->2072 2070->2033 2076 1400c0a0a-1400c0a1f 2072->2076 2077 1400c09d7-1400c0a05 call 1400d5168 call 140094ddc call 1400a57ac 2072->2077 2076->2070 2077->2076
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                    • String ID:
                                    • API String ID: 1617910340-0
                                    • Opcode ID: 9219a76bbf5b0a68fd8075754a2c2160bfaa822f6e476498c8a23ea95eed312f
                                    • Instruction ID: 83644b67ebb14751364ddfbcc329ed2d9831cfd477b754813198fa2ff24e4f8c
                                    • Opcode Fuzzy Hash: 9219a76bbf5b0a68fd8075754a2c2160bfaa822f6e476498c8a23ea95eed312f
                                    • Instruction Fuzzy Hash: FBC19B36724B448AEB15DFAAC4907AD3761F78DBE8F015215EF2A9B7A5CB38C056C340

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2084 140066350-1400669ee call 14002d4e0 call 14002d370 2092 1400669f0-1400669f7 2084->2092 2092->2092 2093 1400669f9-14006a9b7 call 140055c20 call 14002d810 call 14002eaf0 call 14002e240 call 140098254 * 3 call 14002e1d0 call 140098254 call 1400439b0 call 1400479f0 call 140047ac0 call 1400b0e88 call 140098254 * 2 call 14002cf70 call 14002e0c0 call 14002e1d0 call 14002e240 call 140098254 call 14002e1d0 * 2 call 140098254 call 1400439b0 call 1400479f0 call 140047ac0 call 1400b0e88 call 140098254 call 14002e0c0 call 14002cf70 call 140098254 call 14002e240 call 140098254 * 3 call 14002e1d0 call 140098254 call 1400439b0 call 1400479f0 call 140047ac0 call 1400b0e88 call 140098254 * 2 call 14002cf70 call 14002e0c0 call 14002e1d0 call 14002e240 call 14002e1d0 * 4 call 14002cf70 call 14002e1d0 * 3 call 14002cf70 call 140098254 * 3 call 140080040 call 1400c1650 GetModuleFileNameW 2092->2093 2223 14006a9c0-14006a9c9 2093->2223 2223->2223 2224 14006a9cb-14006abde call 140036940 2223->2224 2227 14006abe1-14006abea 2224->2227 2227->2227 2228 14006abec-14006ae7d call 140036940 call 140036bd0 call 140045fd0 2227->2228 2238 14006ae80-14006ae89 2228->2238 2238->2238 2239 14006ae8b-14006b11e call 140036940 call 140036bd0 call 140045fd0 2238->2239 2249 14006b121-14006b12a 2239->2249 2249->2249 2250 14006b12c-14006b600 call 140036940 call 14002d4a0 call 140045fd0 2249->2250 2263 14006b603-14006b60c 2250->2263 2263->2263 2264 14006b60e-14006b8bd call 140036940 call 140036bd0 call 140045fd0 2263->2264 2274 14006b8c0-14006b8c9 2264->2274 2274->2274 2275 14006b8cb-14006bb70 call 140036940 call 140036bd0 call 140045fd0 2274->2275 2285 14006bb73-14006bb7c 2275->2285 2285->2285 2286 14006bb7e-14006bd8b call 140036940 call 140036bd0 call 140045fd0 2285->2286 2296 14006bd90-14006bd99 2286->2296 2296->2296 2297 14006bd9b-14006c0c7 call 140036940 call 140036bd0 call 140045fd0 2296->2297 2307 14006c0d0-14006c0d8 2297->2307 2307->2307 2308 14006c0da-14006c326 call 140036940 call 140036bd0 call 140045fd0 call 14002cf70 call 140065d70 2307->2308
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __std_fs_convert_wide_to_narrow$__std_fs_code_page
                                    • String ID: cannot use push_back() with $directory_iterator::directory_iterator$exists$recursive_directory_iterator::operator++$recursive_directory_iterator::recursive_directory_iterator$status
                                    • API String ID: 3645842244-1862120484
                                    • Opcode ID: b85098497e29e174e5e0d125e38a865b4444aacdb133920c5e87522b3c1c6480
                                    • Instruction ID: bba8860d3aa9c0501a6704626c2c7e4aee42dfacbccf4a7121c085916f1dd74c
                                    • Opcode Fuzzy Hash: b85098497e29e174e5e0d125e38a865b4444aacdb133920c5e87522b3c1c6480
                                    • Instruction Fuzzy Hash: 1BD21272519BC886D6718B1AE88139BB3A1F7DC784F505625EBCC53B69EB7CC294CB00

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2322 1400320b0-140032182 2323 140032185-14003218c 2322->2323 2323->2323 2324 14003218e-1400322ea call 1400486b0 2323->2324 2327 1400322f0-1400322f8 2324->2327 2327->2327 2328 1400322fa-140032378 call 1400486b0 2327->2328 2331 140032380-140032388 2328->2331 2331->2331 2332 14003238a-140032411 call 1400486b0 RegOpenKeyExA 2331->2332 2335 140032417-140032456 RegQueryValueExA 2332->2335 2336 1400324ee-1400324f5 2332->2336 2335->2336 2339 14003245c-1400324a9 call 1400486b0 call 1400428e0 2335->2339 2337 1400324f7 RegCloseKey 2336->2337 2338 1400324fd-14003256e call 140055c20 2336->2338 2337->2338 2344 1400325a2-1400325b5 2338->2344 2345 140032570-140032582 2338->2345 2357 1400324ab-1400324bf 2339->2357 2358 1400324df-1400324e7 2339->2358 2349 140032aa3-140032aae 2344->2349 2350 1400325bb-140032601 call 14002eaf0 2344->2350 2347 140032584-140032597 2345->2347 2348 14003259d call 1400ae880 2345->2348 2347->2348 2354 140032c55-140032c5a call 140098254 2347->2354 2348->2344 2352 140032ae9-140032b0e 2349->2352 2353 140032ab0-140032ac9 2349->2353 2374 140032607-14003260a 2350->2374 2375 140032c25-140032c27 2350->2375 2362 140032b44-140032b5e 2352->2362 2363 140032b10-140032b24 2352->2363 2359 140032ae4 call 1400ae880 2353->2359 2360 140032acb-140032ade 2353->2360 2381 140032c5b-140032c70 call 14002e1d0 2354->2381 2365 1400324c1-1400324d4 2357->2365 2366 1400324da call 1400ae880 2357->2366 2358->2336 2359->2352 2360->2359 2367 140032c71-140032c76 call 140098254 2360->2367 2372 140032b94-140032bae 2362->2372 2373 140032b60-140032b74 2362->2373 2370 140032b26-140032b39 2363->2370 2371 140032b3f call 1400ae880 2363->2371 2365->2366 2376 140032c4f-140032c54 call 140098254 2365->2376 2366->2358 2408 140032c77-140032c7c call 140098254 2367->2408 2370->2371 2382 140032c8f-140032c94 call 140098254 2370->2382 2371->2362 2378 140032be0-140032c24 call 1400ae860 2372->2378 2379 140032bb0-140032bc4 2372->2379 2387 140032b76-140032b89 2373->2387 2388 140032b8f call 1400ae880 2373->2388 2374->2349 2389 140032610-14003262d call 140045140 2374->2389 2383 140032c34-140032c4e call 14002e240 2375->2383 2384 140032c29 2375->2384 2376->2354 2391 140032bc6-140032bd9 2379->2391 2392 140032bdb call 1400ae880 2379->2392 2381->2367 2399 140032c95-140032c9a call 140098254 2382->2399 2383->2376 2384->2349 2387->2388 2387->2399 2388->2372 2389->2381 2410 140032633-14003264e 2389->2410 2391->2392 2403 140032c2e-140032c33 call 140098254 2391->2403 2392->2378 2403->2383 2418 140032c7d-140032c82 call 140098254 2408->2418 2414 140032658-14003268e call 14002e8c0 2410->2414 2415 140032650-140032654 2410->2415 2423 140032690-140032699 2414->2423 2424 14003269d-1400326be call 14002e9a0 2414->2424 2415->2414 2425 140032c83-140032c88 call 140098254 2418->2425 2423->2424 2430 1400326c4-1400326c8 2424->2430 2431 140032a01-140032a0b 2424->2431 2432 140032c89-140032c8e call 14002cf70 2425->2432 2433 1400326d0-1400326e5 call 14007f8f0 2430->2433 2434 140032a37-140032a41 2431->2434 2435 140032a0d-140032a17 2431->2435 2432->2382 2446 1400326eb-140032737 call 140043a40 call 14002d4e0 call 14002d370 2433->2446 2447 1400329de-1400329fb call 14002f380 call 14002e7b0 2433->2447 2436 140032a43-140032a4d 2434->2436 2437 140032a6d-140032a74 2434->2437 2435->2434 2440 140032a19-140032a2b 2435->2440 2436->2437 2441 140032a4f-140032a61 2436->2441 2437->2349 2443 140032a76-140032a80 2437->2443 2440->2434 2452 140032a2d-140032a36 2440->2452 2441->2437 2454 140032a63-140032a6c 2441->2454 2443->2349 2445 140032a82-140032a96 2443->2445 2445->2349 2460 140032a98-140032aa2 2445->2460 2467 14003273c-1400327db call 140045310 call 1400455e0 call 1400486b0 call 140041900 call 140043ff0 2446->2467 2468 140032739 2446->2468 2447->2431 2447->2433 2452->2434 2454->2437 2460->2349 2479 14003280e-140032826 2467->2479 2480 1400327dd-1400327ee 2467->2480 2468->2467 2483 140032828-140032839 2479->2483 2484 140032859-140032871 2479->2484 2481 140032809 call 1400ae880 2480->2481 2482 1400327f0-140032803 2480->2482 2481->2479 2482->2408 2482->2481 2486 140032854 call 1400ae880 2483->2486 2487 14003283b-14003284e 2483->2487 2488 140032873-140032889 2484->2488 2489 1400328a9-1400328c7 2484->2489 2486->2484 2487->2418 2487->2486 2492 1400328a4 call 1400ae880 2488->2492 2493 14003288b-14003289e 2488->2493 2489->2432 2490 1400328cd-1400329dd call 14005d590 call 1400486b0 call 140041900 call 140043ff0 call 1400429b0 call 140041900 call 1400429b0 call 140041900 call 1400417a0 call 140043ff0 2489->2490 2490->2447 2492->2489 2493->2425 2493->2492
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseOpenQueryValue
                                    • String ID: content$directory_iterator::directory_iterator$exists$filename
                                    • API String ID: 3677997916-1400943384
                                    • Opcode ID: c196d407989b81333d886e25abeafa7d94654d4dc94241b5b3d364c7fe9aab29
                                    • Instruction ID: b2277efa446f2c05384135a9c60ce1ef2baabbbcc2b81f88aec781cb829a3c55
                                    • Opcode Fuzzy Hash: c196d407989b81333d886e25abeafa7d94654d4dc94241b5b3d364c7fe9aab29
                                    • Instruction Fuzzy Hash: 46723A72611BC48AEB228F36D8803DD77A0F789798F509215EB9D5BBA9DF34C685C340

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2515 14007f020-14007f0a5 call 14002eaf0 2518 14007f0a7-14007f0a9 2515->2518 2519 14007f0b1-14007f0b4 2515->2519 2520 14007f7c0-14007f7d6 call 14002e240 2518->2520 2521 14007f0af 2518->2521 2522 14007f0c7-14007f0e0 call 1400c1650 2519->2522 2523 14007f0b6-14007f0c2 2519->2523 2530 14007f7d7-14007f7dc call 140098254 2520->2530 2521->2523 2532 14007f0e5-14007f14b call 14004a910 2522->2532 2533 14007f0e2 2522->2533 2525 14007f73f-14007f76b call 1400ae860 2523->2525 2540 14007f7dd-14007f811 call 14002bbd0 call 14002cdc0 call 1400b0e88 2530->2540 2538 14007f545-14007f57f call 14005fdb0 call 14005fcd0 2532->2538 2539 14007f151-14007f159 2532->2539 2533->2532 2554 14007f581-14007f592 call 140048560 2538->2554 2555 14007f59e-14007f62c call 14005fdb0 call 14008d640 2538->2555 2542 14007f15e-14007f181 call 140089b70 call 140089d30 2539->2542 2543 14007f15b 2539->2543 2560 14007f187-14007f19d 2542->2560 2561 14007f25c-14007f276 GetFileSize 2542->2561 2543->2542 2565 14007f597 2554->2565 2555->2540 2585 14007f632-14007f636 call 140043620 2555->2585 2567 14007f1d3-14007f257 call 1400412f0 2560->2567 2568 14007f19f-14007f1b3 2560->2568 2563 14007f278-14007f29b 2561->2563 2564 14007f29d-14007f2b3 2561->2564 2569 14007f302-14007f34b SetFilePointer call 1400d5190 2563->2569 2570 14007f2e5-14007f2fd call 140048e80 2564->2570 2571 14007f2b5-14007f2e3 call 1400c1650 2564->2571 2565->2555 2582 14007f72b-14007f73a call 1400bc92c 2567->2582 2573 14007f1b5-14007f1c8 2568->2573 2574 14007f1ce call 1400ae880 2568->2574 2587 14007f462-14007f486 2569->2587 2588 14007f351-14007f3a3 2569->2588 2570->2569 2571->2569 2573->2530 2573->2574 2574->2567 2582->2525 2590 14007f63b-14007f63e 2585->2590 2597 14007f488-14007f49c 2587->2597 2598 14007f4bc-14007f540 call 1400412f0 2587->2598 2599 14007f3a5-14007f3b9 2588->2599 2600 14007f3d9-14007f45d call 1400412f0 2588->2600 2591 14007f640-14007f667 2590->2591 2592 14007f66d-14007f727 call 1400412f0 2590->2592 2591->2592 2595 14007f76c-14007f76f 2591->2595 2592->2582 2605 14007f771-14007f778 2595->2605 2606 14007f77a-14007f78b 2595->2606 2607 14007f4b7 call 1400ae880 2597->2607 2608 14007f49e-14007f4b1 2597->2608 2598->2582 2601 14007f3d4 call 1400ae880 2599->2601 2602 14007f3bb-14007f3ce 2599->2602 2600->2582 2601->2600 2602->2530 2602->2601 2612 14007f78f-14007f7bf call 14002bbd0 call 14002cdc0 call 1400b0e88 2605->2612 2606->2612 2607->2598 2608->2530 2608->2607 2612->2520
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$PointerReadSize
                                    • String ID: exists$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                    • API String ID: 404940565-15404121
                                    • Opcode ID: d909d95e84f980d109caea5088e6d2dfa24c646e34c152c1621861f1e02e4fac
                                    • Instruction ID: 5edcf1363d10bf31a9295209213c7a3ef359e081411608d1d95c6d83a7e8165e
                                    • Opcode Fuzzy Hash: d909d95e84f980d109caea5088e6d2dfa24c646e34c152c1621861f1e02e4fac
                                    • Instruction Fuzzy Hash: 76321632614BC489EB21CF35D8807ED37A1F789B88F548226EB4D5BBA9EB74C645D700
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                    • String ID: Eastern Standard Time$Eastern Summer Time
                                    • API String ID: 3458911817-239921721
                                    • Opcode ID: a0b2f147c5ed72e73a9ba99eccd64d774068bd057930b9dd808764ab5dc4e304
                                    • Instruction ID: db0e2232302c0215c246f8571b916b6a2febf07c2da0425627d7512260a1f4b0
                                    • Opcode Fuzzy Hash: a0b2f147c5ed72e73a9ba99eccd64d774068bd057930b9dd808764ab5dc4e304
                                    • Instruction Fuzzy Hash: 68514D3261064086F722EF37E8917D96761F79CBC4F44922AFB4D47AB6DB38C5818B40
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _get_daylight$_isindst$_invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 1405656091-0
                                    • Opcode ID: cd6fea744430340711cd49b3e9bdbfdb1b852b0eb5a7692198664b91c055b650
                                    • Instruction ID: af26a4f8801793d3ce11611fdac42a3e64f2a46bd35c7c59f6a568dcc363727b
                                    • Opcode Fuzzy Hash: cd6fea744430340711cd49b3e9bdbfdb1b852b0eb5a7692198664b91c055b650
                                    • Instruction Fuzzy Hash: D681C7B27003454BEB598F6AC9417E873A5F75CBC8F449129FB098B7A9EB38D541CB40
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __std_exception_destroy
                                    • String ID: value
                                    • API String ID: 2453523683-494360628
                                    • Opcode ID: 28c4b3bc701e466bd5711a0ceea654ecdee2709dad8495dceb75c89a78f1cb91
                                    • Instruction ID: c134aa0dda924bc4b970d5ee2dd0dc65a73e33e1cb439c775f43115319f3d1dd
                                    • Opcode Fuzzy Hash: 28c4b3bc701e466bd5711a0ceea654ecdee2709dad8495dceb75c89a78f1cb91
                                    • Instruction Fuzzy Hash: 90028C72A14BC085EB12DB7AD4803ED6761E78A7E4F515222FB9D03AEADF78C185C700
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                    • String ID: [PID:
                                    • API String ID: 420147892-2210602247
                                    • Opcode ID: 5c646c2d2df9c617ccf451bf1d1df64f478098079caff3c2746eb4228344e502
                                    • Instruction ID: 45f4196ded283f1e18013c362ac568805eef84480359320777d6e4bf442c09c4
                                    • Opcode Fuzzy Hash: 5c646c2d2df9c617ccf451bf1d1df64f478098079caff3c2746eb4228344e502
                                    • Instruction Fuzzy Hash: 0AE16E72614BC085EB22DB26E8943DE67A5F7897E8F504215FB9D07BA9DF38C284C700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ProcessToken$AdjustCloseCurrentHandleLookupOpenPrivilegePrivilegesValue
                                    • String ID:
                                    • API String ID: 3038321057-0
                                    • Opcode ID: d2de06470b4ed8e39d37734a47601b9eff7cf65b32299141bc4bcc42cf026e17
                                    • Instruction ID: 8e4f8d06d2c4ddfc7e806934d087d01799faa900bb6cc1b317aeea0d8f8b28af
                                    • Opcode Fuzzy Hash: d2de06470b4ed8e39d37734a47601b9eff7cf65b32299141bc4bcc42cf026e17
                                    • Instruction Fuzzy Hash: CC214832218B8086E761DB22F45439AB7A4FB8CB90F958125FB8947B68DF7DC5458B40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: cannot use push_back() with $directory_iterator::directory_iterator$exists$prefs.js$status
                                    • API String ID: 0-2713369562
                                    • Opcode ID: 1f751f410187eb2bf2fc780715a3c0ec628b43c1dfaf6962dcb179a5cab95473
                                    • Instruction ID: b3fbb8dc4d3b89ba37a16b28408050db1824bf19221a002499ec192a306ffaa8
                                    • Opcode Fuzzy Hash: 1f751f410187eb2bf2fc780715a3c0ec628b43c1dfaf6962dcb179a5cab95473
                                    • Instruction Fuzzy Hash: 35522732509FC485E6B29B16E8813DAB3A5F7C9784F505626EBCC43B69EF78C594CB00
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Cred$EnumerateFree
                                    • String ID: cannot use push_back() with
                                    • API String ID: 3403564193-4122110429
                                    • Opcode ID: a6f83ea36ffb6469ba2f6bf6e30f276aa89bc0932f97559575f5da80fd1756ef
                                    • Instruction ID: 2c83be45eaec0f7e1f6fdbb8577fcf9ca2a588b67551cccb8e55b4ba6c2ec1dd
                                    • Opcode Fuzzy Hash: a6f83ea36ffb6469ba2f6bf6e30f276aa89bc0932f97559575f5da80fd1756ef
                                    • Instruction Fuzzy Hash: 1F625D72614BC489EB22CF26E8803DD7761F789798F505316EBAD57BA9DB38C294C700
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: array$object$object key$object separator
                                    • API String ID: 0-2277530871
                                    • Opcode ID: 6012d09d474b2333cd91f5f681015ede13b4298f3621dc023fd4363f35e55689
                                    • Instruction ID: 10886125acb42317efe394ce9d9c91d2a19ed0983e554a2ccb1fded512390b1f
                                    • Opcode Fuzzy Hash: 6012d09d474b2333cd91f5f681015ede13b4298f3621dc023fd4363f35e55689
                                    • Instruction Fuzzy Hash: 4102D572625A8496EB12DF76D8403ED2321FB9A7C8F816212FB4D57ABADF74C244C304
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InformationTimeZone
                                    • String ID: [UTC
                                    • API String ID: 565725191-1715286942
                                    • Opcode ID: ff8f9ba26bcffe8c05b90d1ef0870ef0f10df0f0925d13163bcd4731c4f8a772
                                    • Instruction ID: 6538b487e3ff0e772b9f649e36bcf6dd55672f6dc7371b4f2e2c26f31a93ba50
                                    • Opcode Fuzzy Hash: ff8f9ba26bcffe8c05b90d1ef0870ef0f10df0f0925d13163bcd4731c4f8a772
                                    • Instruction Fuzzy Hash: 44B12B32614BC88AD7718F2AE84139AB7A4F79D788F105315EBCC57B69EB78C250CB44
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CryptDataFreeLocalUnprotect
                                    • String ID:
                                    • API String ID: 1561624719-0
                                    • Opcode ID: 3f0d2640eba4d0f7871c2ec703edcb503dbe0d7ea7d03094cd3af9045bbe76bf
                                    • Instruction ID: 4296086251868e59c58a0d25c4c96546d3d1b8368fdcc8e5a20c42b548a3eb4e
                                    • Opcode Fuzzy Hash: 3f0d2640eba4d0f7871c2ec703edcb503dbe0d7ea7d03094cd3af9045bbe76bf
                                    • Instruction Fuzzy Hash: 8D414232614B80CAE3229F35E4407ED37A4F75978CF484229BB8C07E9ADB79C6A4C754
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DriveLogicalStrings
                                    • String ID:
                                    • API String ID: 2022863570-0
                                    • Opcode ID: a2c0b518ff976965a78bb2ac48e525d95efc5b07f2ad389012d5fbfb45ca8168
                                    • Instruction ID: f2cab6ee8911013723ff3d4b8f532fa1eef750fceda41a605a97ef7ce25926e1
                                    • Opcode Fuzzy Hash: a2c0b518ff976965a78bb2ac48e525d95efc5b07f2ad389012d5fbfb45ca8168
                                    • Instruction Fuzzy Hash: E1519C33A18B8082E711CF2AE48039EB7B5F789798F505215EB9C13AB9DB78D591DB40
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: NameUser
                                    • String ID:
                                    • API String ID: 2645101109-0
                                    • Opcode ID: abf913a544c6f9fdd308559da787f240108ca61f3614bb29fccc85bbbd2848d6
                                    • Instruction ID: 6386a9c63b89e62e1e7c53e5db0f7fdfe8938b55c0afa06648929fea26598edc
                                    • Opcode Fuzzy Hash: abf913a544c6f9fdd308559da787f240108ca61f3614bb29fccc85bbbd2848d6
                                    • Instruction Fuzzy Hash: 67011E3251878086EB62DF26E85539AA3A4F79C788F541215FB8D43659DBBCC1948B40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: cores
                                    • API String ID: 0-2370456839
                                    • Opcode ID: 1c40f6ad5bdc51a9c1b0c674cd2da14632dd5b60f373a0aefe37a6fc72cd6771
                                    • Instruction ID: ab4aa3aeeaa4015b19261fa9ad63172245a6ad4ae734fbbfc8efca39b2fda2a7
                                    • Opcode Fuzzy Hash: 1c40f6ad5bdc51a9c1b0c674cd2da14632dd5b60f373a0aefe37a6fc72cd6771
                                    • Instruction Fuzzy Hash: 5CC1DC73E14B808AFB11CB7AD4403ED7761F3997A8F105715EBA817AAADB78C285C344
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: \u%04x
                                    • API String ID: 0-2916071157
                                    • Opcode ID: b2b871009dddb1a89fd49cebdd6041a976c6c630323626df0c68259fe89b00fc
                                    • Instruction ID: b071fa8c3cc924bcfca147f78a4ec5d1de903bcd583fa06fe28e0671e0746f18
                                    • Opcode Fuzzy Hash: b2b871009dddb1a89fd49cebdd6041a976c6c630323626df0c68259fe89b00fc
                                    • Instruction Fuzzy Hash: 3981FF33204A9492EA56DB66E554BEE7760F789BC0F848622EF4A43BA5DF38C615C300
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: ":
                                    • API String ID: 0-3662656813
                                    • Opcode ID: 44d721b99f2493e28cbbaba1f3a7e6a84bc52b14feb101429c6fd78baff2fb3e
                                    • Instruction ID: 028190e1dd898fe98b913e6efbb6f356ab67162368aeb52ca58740fe67f46a41
                                    • Opcode Fuzzy Hash: 44d721b99f2493e28cbbaba1f3a7e6a84bc52b14feb101429c6fd78baff2fb3e
                                    • Instruction Fuzzy Hash: 2091F276314A8582DB209F2AE194B9E77B1F789FC8F459002DB9E0BB65CF39C559CB00
                                    Strings
                                    • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/, xrefs: 0000000140045399
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
                                    • API String ID: 0-1713319389
                                    • Opcode ID: a7242879f608aa47813c865fc74e262a7c273f84777ad565790803f492419e94
                                    • Instruction ID: 014310bfbc4a3b67612d0ff5db8dcfc52a4721cd440e8a7597f65d7e1b9a6290
                                    • Opcode Fuzzy Hash: a7242879f608aa47813c865fc74e262a7c273f84777ad565790803f492419e94
                                    • Instruction Fuzzy Hash: 0041B2736196E04AD702CB3A84113BD7FB2E36AB89F1D8162E7D48B757D62DC216CB10
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c91f39c6efebc377b76e34f356a85ea52b44a23e4a0e22303bc0d3bcec94c178
                                    • Instruction ID: 556bcc8ed2f7d60abd17131f05911de347896ff4eb0ddc75f3b6a310c9ffcf8e
                                    • Opcode Fuzzy Hash: c91f39c6efebc377b76e34f356a85ea52b44a23e4a0e22303bc0d3bcec94c178
                                    • Instruction Fuzzy Hash: 64722A72615BC489EB228B6AE8803DE73A1F78D798F504315EF9C57BA9DB78C244C704
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fd73655a0c81fc9314b118eddbb9b1d4c53b5500ac22bbce3de83d419bd80632
                                    • Instruction ID: 03daaffc5176fd34d6a237ea16f9a65ad3a006eedbab0854a5589905b6fbd824
                                    • Opcode Fuzzy Hash: fd73655a0c81fc9314b118eddbb9b1d4c53b5500ac22bbce3de83d419bd80632
                                    • Instruction Fuzzy Hash: E4F15F72A15B888AEB218B6AE44139D77A0F78C7D8F104315FFDC57B99EB78C1908B44
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4011a34db5286b4b69f2cfab335337d5f2f6ce234c6a964d4ce4cd86b9fb1119
                                    • Instruction ID: d70d8380272f1e84909289ee9d254a953fcbb73b845ed7599bc871076c2ed8be
                                    • Opcode Fuzzy Hash: 4011a34db5286b4b69f2cfab335337d5f2f6ce234c6a964d4ce4cd86b9fb1119
                                    • Instruction Fuzzy Hash: 9CF14F72A05F888AEB218B69E44139E77A4F78C798F104315EFDC57B99EF38C1908744
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b272e4576cf18dbc449fc0bdcdae423230c3b19c1bc01ebe469c71b41ecfb90c
                                    • Instruction ID: e195251967ede27e933614341cb3951eab469dfc4d3952c9acab197e11283930
                                    • Opcode Fuzzy Hash: b272e4576cf18dbc449fc0bdcdae423230c3b19c1bc01ebe469c71b41ecfb90c
                                    • Instruction Fuzzy Hash: F7F15E72A05F848AEB618B6AE44139E77A4F38C798F104315FFDC57B99EB78C1908B44
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 88234163e079f4f2b54b1430b154383b426ed80cca2f8c579d4e4444d8e579f2
                                    • Instruction ID: 5a828c8658ee2566b42684f6f63458d35a1f44f6e631e7672213f541f063fe8d
                                    • Opcode Fuzzy Hash: 88234163e079f4f2b54b1430b154383b426ed80cca2f8c579d4e4444d8e579f2
                                    • Instruction Fuzzy Hash: 64D16932B14B8089F712CBB5D4403ED37B2E79D78CF015619AF8C27AAADB749595C384

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 134 14007ebf0-14007ec2b call 14007e970 137 14007ec2d-14007ec3c EnterCriticalSection 134->137 138 14007ec6c 134->138 139 14007ec90-14007ecaa LeaveCriticalSection GdipGetImageEncodersSize 137->139 140 14007ec3e-14007ec60 GdiplusStartup 137->140 141 14007ec71-14007ec8f call 1400ae860 138->141 139->138 144 14007ecac-14007ecbf 139->144 140->139 142 14007ec62-14007ec66 LeaveCriticalSection 140->142 142->138 146 14007ecc1-14007ecca call 14007e700 144->146 147 14007ecfb-14007ed09 call 1400983d8 144->147 154 14007ecf8 146->154 155 14007eccc-14007ecd6 146->155 152 14007ed10-14007ed1a 147->152 153 14007ed0b-14007ed0e 147->153 156 14007ed1e 152->156 153->156 154->147 157 14007ecd8 155->157 158 14007ece2-14007ecf6 call 1400af520 155->158 159 14007ed21-14007ed24 156->159 157->158 158->159 161 14007ed26-14007ed2b 159->161 162 14007ed30-14007ed3e GdipGetImageEncoders 159->162 164 14007ee9e-14007eea1 161->164 165 14007ed44-14007ed4d 162->165 166 14007ee89-14007ee8e 162->166 169 14007eec4-14007eec6 164->169 170 14007eea3-14007eea7 164->170 167 14007ed7f 165->167 168 14007ed4f-14007ed5d 165->168 166->164 171 14007ed86-14007ed96 167->171 172 14007ed60-14007ed6b 168->172 169->141 173 14007eeb0-14007eec2 call 140097620 170->173 174 14007ed98-14007eda9 171->174 175 14007edaf-14007edcb 171->175 176 14007ed78-14007ed7d 172->176 177 14007ed6d-14007ed72 172->177 173->169 174->166 174->175 180 14007ee38-14007ee77 GdipCreateBitmapFromHBITMAP GdipSaveImageToStream 175->180 181 14007edcd-14007ee26 GdipCreateBitmapFromScan0 GdipSaveImageToStream 175->181 176->167 176->172 177->176 182 14007ee2d-14007ee31 177->182 185 14007ee90-14007ee9d GdipDisposeImage 180->185 186 14007ee79 180->186 183 14007ee28-14007ee2b 181->183 184 14007ee36 181->184 182->171 187 14007ee7c-14007ee83 GdipDisposeImage 183->187 184->185 185->164 186->187 187->166
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Gdip$Image$CriticalSection$DisposeEncodersLeave$BitmapCreateEnterErrorFromGdiplusInitializeLastSaveScan0SizeStartupStream
                                    • String ID: &
                                    • API String ID: 1703174404-3042966939
                                    • Opcode ID: bf0236f101f8e21e317088f3cb88ff4920e04948ae26449d129670ccf4dc63a8
                                    • Instruction ID: 2933ea3cba5f62bacf30a145d024c6610061d140e98bafc5b8ee222a0d569d1d
                                    • Opcode Fuzzy Hash: bf0236f101f8e21e317088f3cb88ff4920e04948ae26449d129670ccf4dc63a8
                                    • Instruction Fuzzy Hash: B8916D32201B809AEB22DF22E8407D9B7A4F75DBD8F558615FF0947BA4DB38C996C340

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 955 14007fca0-14007fdc6 call 1400858d0 call 14005d590 call 1400486b0 call 140041900 call 1400486b0 call 140041900 call 140043ff0 WSAStartup 970 14007fe87 955->970 971 14007fdcc-14007fdec socket 955->971 972 14007fe89-14007fe91 970->972 973 14007fdf2-14007fe1e htons 971->973 974 14007fe81 WSACleanup 971->974 977 14007fec4-14007ff05 call 1400ae860 972->977 978 14007fe93-14007fea4 972->978 975 14007fe24-14007fe34 call 14008d830 973->975 976 14007ff29-14007ff5a call 14007eed0 call 1400426d0 973->976 974->970 989 14007fe36 975->989 990 14007fe39-14007fe65 inet_pton connect 975->990 1000 14007ff92-14007ffaf call 14007eed0 976->1000 1001 14007ff5c-14007ff72 976->1001 981 14007fea6-14007feb9 978->981 982 14007febf call 1400ae880 978->982 981->982 987 14008002b-140080030 call 140098254 981->987 982->977 997 140080031-140080036 call 140098254 987->997 989->990 994 14007ff06-14007ff10 990->994 995 14007fe6b-14007fe72 990->995 994->976 998 14007ff12-14007ff1b 994->998 995->975 999 14007fe74-14007fe7b closesocket 995->999 1004 14007ff20-14007ff28 call 140044600 998->1004 1005 14007ff1d 998->1005 999->974 1008 14007ffb4-14007ffd8 call 1400426d0 1000->1008 1006 14007ff74-14007ff87 1001->1006 1007 14007ff8d call 1400ae880 1001->1007 1004->976 1005->1004 1006->997 1006->1007 1007->1000 1015 140080014-140080020 1008->1015 1016 14007ffda-14007fff0 1008->1016 1015->972 1017 14007fff2-140080005 1016->1017 1018 140080007-14008000c call 1400ae880 1016->1018 1017->1018 1019 140080025-14008002a call 140098254 1017->1019 1018->1015 1019->987
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Info$CleanupStartupUserclosesocketconnecthtonsinet_ptonsocket
                                    • String ID: geo$system
                                    • API String ID: 213021568-2364779556
                                    • Opcode ID: 9fc8b1dc3755d2dd2f71b7bebfedc2c2060b7ea47fe900d8aba93de43415e169
                                    • Instruction ID: 5e39d1486933869d33645940fa38852fb8bad04618512b41e1a6983fc6e90819
                                    • Opcode Fuzzy Hash: 9fc8b1dc3755d2dd2f71b7bebfedc2c2060b7ea47fe900d8aba93de43415e169
                                    • Instruction Fuzzy Hash: 30B16B72B11A4089FB02DB76D4503EC33B2AB9DBE8F415626EB59176F9DE38C54AC340

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2621 1400a092c-1400a0952 2622 1400a096d-1400a0971 2621->2622 2623 1400a0954-1400a0968 call 140094e48 call 140094e68 2621->2623 2625 1400a0d47-1400a0d53 call 140094e48 call 140094e68 2622->2625 2626 1400a0977-1400a097e 2622->2626 2641 1400a0d5e 2623->2641 2645 1400a0d59 call 140098234 2625->2645 2626->2625 2629 1400a0984-1400a09b2 2626->2629 2629->2625 2632 1400a09b8-1400a09bf 2629->2632 2635 1400a09c1-1400a09d3 call 140094e48 call 140094e68 2632->2635 2636 1400a09d8-1400a09db 2632->2636 2635->2645 2638 1400a0d43-1400a0d45 2636->2638 2639 1400a09e1-1400a09e7 2636->2639 2643 1400a0d61-1400a0d78 2638->2643 2639->2638 2644 1400a09ed-1400a09f0 2639->2644 2641->2643 2644->2635 2647 1400a09f2-1400a0a17 2644->2647 2645->2641 2650 1400a0a19-1400a0a1b 2647->2650 2651 1400a0a4a-1400a0a51 2647->2651 2654 1400a0a1d-1400a0a24 2650->2654 2655 1400a0a42-1400a0a48 2650->2655 2652 1400a0a53-1400a0a7b call 14009e8bc call 14009d3c8 * 2 2651->2652 2653 1400a0a26-1400a0a3d call 140094e48 call 140094e68 call 140098234 2651->2653 2685 1400a0a7d-1400a0a93 call 140094e68 call 140094e48 2652->2685 2686 1400a0a98-1400a0ac3 call 1400a0fec 2652->2686 2682 1400a0bd0 2653->2682 2654->2653 2654->2655 2656 1400a0ac8-1400a0adf 2655->2656 2659 1400a0b5a-1400a0b64 call 1400a996c 2656->2659 2660 1400a0ae1-1400a0ae9 2656->2660 2673 1400a0b6a-1400a0b7f 2659->2673 2674 1400a0bee 2659->2674 2660->2659 2663 1400a0aeb-1400a0aed 2660->2663 2663->2659 2667 1400a0aef-1400a0b05 2663->2667 2667->2659 2671 1400a0b07-1400a0b13 2667->2671 2671->2659 2679 1400a0b15-1400a0b17 2671->2679 2673->2674 2676 1400a0b81-1400a0b93 call 1400d5340 2673->2676 2678 1400a0bf3-1400a0c0b call 1400d5190 2674->2678 2676->2674 2694 1400a0b95-1400a0b9d 2676->2694 2689 1400a0c11-1400a0c13 2678->2689 2679->2659 2684 1400a0b19-1400a0b31 2679->2684 2692 1400a0bd3-1400a0bdd call 14009d3c8 2682->2692 2684->2659 2690 1400a0b33-1400a0b3f 2684->2690 2685->2682 2686->2656 2695 1400a0c19-1400a0c21 2689->2695 2696 1400a0d0d-1400a0d16 call 1400d5168 2689->2696 2690->2659 2697 1400a0b41-1400a0b43 2690->2697 2692->2643 2694->2678 2700 1400a0b9f-1400a0bc1 call 1400d53c0 2694->2700 2695->2696 2701 1400a0c27 2695->2701 2712 1400a0d33-1400a0d36 2696->2712 2713 1400a0d18-1400a0d2e call 140094e68 call 140094e48 2696->2713 2697->2659 2702 1400a0b45-1400a0b55 2697->2702 2716 1400a0bc3 call 1400d5168 2700->2716 2717 1400a0be2-1400a0bec 2700->2717 2707 1400a0c2e-1400a0c43 2701->2707 2702->2659 2707->2692 2711 1400a0c45-1400a0c50 2707->2711 2718 1400a0c52-1400a0c6b call 1400a0544 2711->2718 2719 1400a0c77-1400a0c7f 2711->2719 2714 1400a0d3c-1400a0d3e 2712->2714 2715 1400a0bc9-1400a0bcb call 140094ddc 2712->2715 2713->2682 2714->2692 2715->2682 2716->2715 2717->2707 2729 1400a0c70-1400a0c72 2718->2729 2725 1400a0cfb-1400a0d08 call 1400a0384 2719->2725 2726 1400a0c81-1400a0c93 2719->2726 2725->2729 2730 1400a0cee-1400a0cf6 2726->2730 2731 1400a0c95 2726->2731 2729->2692 2730->2692 2734 1400a0c9a-1400a0ca1 2731->2734 2735 1400a0cdd-1400a0ce8 2734->2735 2736 1400a0ca3-1400a0ca7 2734->2736 2735->2730 2737 1400a0ca9-1400a0cb0 2736->2737 2738 1400a0cc3 2736->2738 2737->2738 2739 1400a0cb2-1400a0cb6 2737->2739 2740 1400a0cc9-1400a0cd9 2738->2740 2739->2738 2741 1400a0cb8-1400a0cc1 2739->2741 2740->2734 2742 1400a0cdb 2740->2742 2741->2740 2742->2730
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 3215553584-0
                                    • Opcode ID: f3fc50aa6c1617f97820c214b6f357f8593fa625a947542fe4ec2dfdbb2d532b
                                    • Instruction ID: 1587d5abd9b319571573c48e8f8a5ca4e906ccd50f109f1cac320b02b794b413
                                    • Opcode Fuzzy Hash: f3fc50aa6c1617f97820c214b6f357f8593fa625a947542fe4ec2dfdbb2d532b
                                    • Instruction Fuzzy Hash: A1C1F03221478982F7639B1794403EE7BA4F7A9BD4F564211FB4A077B2CB79C885CB11
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$DeleteGdiplusObjectShutdown
                                    • String ID:
                                    • API String ID: 4268643673-0
                                    • Opcode ID: 46c865431367d1bada0cd35fb3685f35713bfb53898f18d72c1e296ca1b3c958
                                    • Instruction ID: dcfb53e97d05e3396d4aa64d1b67aeea8fd7a19c85708699b0c64b346d41ba89
                                    • Opcode Fuzzy Hash: 46c865431367d1bada0cd35fb3685f35713bfb53898f18d72c1e296ca1b3c958
                                    • Instruction Fuzzy Hash: A411E932112B5091EB119F26E85439D7364FB4CFA9F684615AB59076B4DF38C897C350
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: recv$Cleanupclosesocket
                                    • String ID:
                                    • API String ID: 146070474-0
                                    • Opcode ID: 07e8817331f4b7f7d2307bbab4c7b93adc3b1d2574686ccc64d097425d429bbe
                                    • Instruction ID: b946d2c26836d9b1051e74beb1b184431b09a1050fca472289d527709f65e4e4
                                    • Opcode Fuzzy Hash: 07e8817331f4b7f7d2307bbab4c7b93adc3b1d2574686ccc64d097425d429bbe
                                    • Instruction Fuzzy Hash: E8126E73618BC081EA229B16E4543DEA761F79D7E0F504612FBAD47AEADF78C584CB00
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                    • String ID:
                                    • API String ID: 215268677-0
                                    • Opcode ID: 1c225c442ed3ae12c114120d81f2afce391d37106ff629cfd40a7a8c2f449ed4
                                    • Instruction ID: 4ac3f93d2f4e81bd50ee8aef4ea7470c81fa649bc502074349a2660f854164c1
                                    • Opcode Fuzzy Hash: 1c225c442ed3ae12c114120d81f2afce391d37106ff629cfd40a7a8c2f449ed4
                                    • Instruction Fuzzy Hash: 8911FB32618B8082E7519F16F85039AB7A0FB89B81F549125FB9987B68CF3CC455CB40
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Value
                                    • String ID: ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                    • API String ID: 3702945584-1787575317
                                    • Opcode ID: 4adfbbe0f3484cc7a5acaefcbce83f0c94fb9759dd9dfdb56e9eff7cc340b344
                                    • Instruction ID: 0a7fd6b673f61970bf2da1044729ec967914b747b3f2b276bd9284bd5dc68a64
                                    • Opcode Fuzzy Hash: 4adfbbe0f3484cc7a5acaefcbce83f0c94fb9759dd9dfdb56e9eff7cc340b344
                                    • Instruction Fuzzy Hash: 71115B32208B8082EB22CF22F45139AB3B4F79DB88F514215EB9847B69DFBCC155CB40
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Cleanupclosesocketrecv
                                    • String ID:
                                    • API String ID: 3447645871-0
                                    • Opcode ID: 3cfb61bbb7f42aecc48a81a155c639fa34dc00802dd39597d14376df0ee440c9
                                    • Instruction ID: f1a95010fa3eeab52f1984fc64572a1107dc8f99f3060c579d6027e39eb340be
                                    • Opcode Fuzzy Hash: 3cfb61bbb7f42aecc48a81a155c639fa34dc00802dd39597d14376df0ee440c9
                                    • Instruction Fuzzy Hash: 80917E73A14BC081EA229B26E4543DE6761F79A7E1F505311EBAD07AFADF78C5808740
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseEnumOpen
                                    • String ID:
                                    • API String ID: 1332880857-0
                                    • Opcode ID: 14ce9f3599971ef2d804a2baaaa07d37dcc18f1f1a4c232d1080b1493289a220
                                    • Instruction ID: 4eb1fa3da8fed86ec807e8835bf4fdbc3ecb00f2d9d20f4819ab5aef128a13a5
                                    • Opcode Fuzzy Hash: 14ce9f3599971ef2d804a2baaaa07d37dcc18f1f1a4c232d1080b1493289a220
                                    • Instruction Fuzzy Hash: 75717A73A04B8486EB21CB66E48479E6760F7897E8F204215FFAD17AE9DB78C1C1D700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: EnumOpen
                                    • String ID:
                                    • API String ID: 3231578192-0
                                    • Opcode ID: 69580b2b5a3aab25ec6d1d344f29727ed6fdfb6e770ce3ab2c6c0fb9dc78db39
                                    • Instruction ID: b10b6130942ee25d8504e7b0700fe5892cfaace6609e80b330833a4265116e58
                                    • Opcode Fuzzy Hash: 69580b2b5a3aab25ec6d1d344f29727ed6fdfb6e770ce3ab2c6c0fb9dc78db39
                                    • Instruction Fuzzy Hash: 37318D32610B8486FB21CFA6E854B9E77A4F7887D8F204215EF9917B68DF78C596C700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseOpenQueryValue
                                    • String ID:
                                    • API String ID: 3677997916-0
                                    • Opcode ID: ce7efc3fb5e817364906e3e123d1b6842e8b95f0194340855c4c668cc93a66f3
                                    • Instruction ID: 177ab1ecef40ef2106ab0c510ad3af320b8a7d9225c3425d0499ead86d1d285a
                                    • Opcode Fuzzy Hash: ce7efc3fb5e817364906e3e123d1b6842e8b95f0194340855c4c668cc93a66f3
                                    • Instruction Fuzzy Hash: BE218073614B8481EA619B26F49139EA760FBD97D4F505226FB8D43AA9DF3CC184CB40
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Info$User
                                    • String ID:
                                    • API String ID: 2017065092-0
                                    • Opcode ID: 877c1b4e073b3a87c3d7ac6068cbd316133fc0437c9f32c249d117db553f0db1
                                    • Instruction ID: 0d4333e7acfcd10664b751b764566d9c33a0389198715772ff2fcd180fd2e377
                                    • Opcode Fuzzy Hash: 877c1b4e073b3a87c3d7ac6068cbd316133fc0437c9f32c249d117db553f0db1
                                    • Instruction Fuzzy Hash: 36119D3261878182D7119F62E41075EB3A2FB84BC8F455125EF8503B69DF7CD5908B44
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CurrentExitTerminate
                                    • String ID:
                                    • API String ID: 1703294689-0
                                    • Opcode ID: 3909df8ddc6717e2b276abcc8b7868d121cee5230461283d2778d4ce90183b93
                                    • Instruction ID: e805d3ee5994ab50d8ddfbed6d232eb1317883b916c6c6f4e9f617acb090b269
                                    • Opcode Fuzzy Hash: 3909df8ddc6717e2b276abcc8b7868d121cee5230461283d2778d4ce90183b93
                                    • Instruction Fuzzy Hash: CBD06C383007049AEB1A7B7258953AC12656BAD782F902938AA02077A3CD39C88A4A50
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-3916222277
                                    • Opcode ID: 97cec123c8346849d4184d8998ea2100f4717973dead3215a377ca64f46489bd
                                    • Instruction ID: 41a150dcf48049a776dd81e3d5e3e1f932dfb0020c84a720df1c1764346652b8
                                    • Opcode Fuzzy Hash: 97cec123c8346849d4184d8998ea2100f4717973dead3215a377ca64f46489bd
                                    • Instruction Fuzzy Hash: BD516772304B4496EB168F2AD49439C73A0F788BD4F954622EF5D43BA5CF79D4A6C304
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CurrentProfile
                                    • String ID: Unknown
                                    • API String ID: 2104809126-1654365787
                                    • Opcode ID: 06a2002a681cff94550a8657f83e2f7043b557fe8d82a80efd137201800bb89d
                                    • Instruction ID: b6cc9aea20a80e93beb496bcb72e8d94e9cb8475d7b391023006ee514db896da
                                    • Opcode Fuzzy Hash: 06a2002a681cff94550a8657f83e2f7043b557fe8d82a80efd137201800bb89d
                                    • Instruction Fuzzy Hash: 2131AD33628BC086E712CF22E5507DAA760F799B84F546215FBC907A6ADB7CC695CB00
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: 0cbc12d84685bf8e214339f5dbce44343e83f3b68aedd7f3af7637bb9f21f461
                                    • Instruction ID: e93fd745ff60857ba182d59ca98009fa74ac710b246677c65970d569aa4b7534
                                    • Opcode Fuzzy Hash: 0cbc12d84685bf8e214339f5dbce44343e83f3b68aedd7f3af7637bb9f21f461
                                    • Instruction Fuzzy Hash: BB51A472305B8485FE76AB13A5043DD6255A70CBE4F594A35FF6D0BBE6DE38C4928304
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FolderFreeKnownPathTask
                                    • String ID:
                                    • API String ID: 969438705-0
                                    • Opcode ID: 333fc223f9b054ba6e049bbb425f8fab9b3b69f3c61af62c074ad23a6e04584a
                                    • Instruction ID: f3a443ffc45d68b8a04bfef255194bc9535a02ef0ceabe897b21db104d40ac75
                                    • Opcode Fuzzy Hash: 333fc223f9b054ba6e049bbb425f8fab9b3b69f3c61af62c074ad23a6e04584a
                                    • Instruction Fuzzy Hash: E8313272A14B8481E621CF26E44135EB761F79D7F4F645316FBAC03AA5DB7CC1818B40
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 3215553584-0
                                    • Opcode ID: 77ff38050bbf038ec147631c291faae903e00292372ea36fba1d268a897535c6
                                    • Instruction ID: 32101a8edefa4219d4514f40ed930cbc4104b78895ab28f0dc7b75847b3e3112
                                    • Opcode Fuzzy Hash: 77ff38050bbf038ec147631c291faae903e00292372ea36fba1d268a897535c6
                                    • Instruction Fuzzy Hash: 3431BD72215A4882EF62DB56E450BE963A1A79EBD4F960111F74A473F2EB38C101C700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseOpen
                                    • String ID:
                                    • API String ID: 47109696-0
                                    • Opcode ID: f1dca321947a1367f0d55f51290a78f41f5e328790fa86022a41bb21031095aa
                                    • Instruction ID: 743a173df9f0781bb695bac75db67ed2816ca8ec26105740734809d53537134b
                                    • Opcode Fuzzy Hash: f1dca321947a1367f0d55f51290a78f41f5e328790fa86022a41bb21031095aa
                                    • Instruction Fuzzy Hash: EB21A132714A8486FE519B27E8507DAB760EB9CBD8F585222FB4D47BA9DE3CC481C700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateCredEnumerateFirstHandleMutexProcess32ReleaseSnapshotToolhelp32recv
                                    • String ID:
                                    • API String ID: 420082584-0
                                    • Opcode ID: 2717296065379288539656974ed68afdf34ee7c6f5dd5d5dbc0f70cd0f16b3b5
                                    • Instruction ID: 403e803b9b323844cf0a0617732988bee78891b9a5a501bf0cd230f62815154a
                                    • Opcode Fuzzy Hash: 2717296065379288539656974ed68afdf34ee7c6f5dd5d5dbc0f70cd0f16b3b5
                                    • Instruction Fuzzy Hash: 7221BF3262468041FAA3B7B7A4177EE6340AF8D7D0F145A15FB9A076F39E3CC0819623
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandleMutexReleaserecv
                                    • String ID:
                                    • API String ID: 2659716615-0
                                    • Opcode ID: d3635f6417aa2acf95da66740d6acfca195d23c3850ed3244a80d30dad7b3eb8
                                    • Instruction ID: 5b403d4752e08caa1fd44bd5fe61bc700b12f65057323a6ab7abb2728d133e11
                                    • Opcode Fuzzy Hash: d3635f6417aa2acf95da66740d6acfca195d23c3850ed3244a80d30dad7b3eb8
                                    • Instruction Fuzzy Hash: B411C432A146C042FAA3B777A4167EE5350AF8D7D0F045615FB99076F79F3CC0819612
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorFileLastPointer
                                    • String ID:
                                    • API String ID: 2976181284-0
                                    • Opcode ID: 85342b8448b5f83962e520861b5040a532baca975cc467821ece28218af4e603
                                    • Instruction ID: 5e2eb42aa467ccbe49ae57b1676c20c6150fa8cb973f64d98be1cd83441f6eb1
                                    • Opcode Fuzzy Hash: 85342b8448b5f83962e520861b5040a532baca975cc467821ece28218af4e603
                                    • Instruction Fuzzy Hash: 61119E72214B8482DA21DB26A404399A3A1E758BF4F584321FF791BBE9CF78C4918B40
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                    • String ID:
                                    • API String ID: 1173176844-0
                                    • Opcode ID: ad7fb39d7d0572768195cdb96d88edf57c93c5d00d8eaa663e4c704e5b7bea2c
                                    • Instruction ID: 69ec061bac81c01873d89cb0c3132a81b38bc9c219e0f41160fcd813fe823014
                                    • Opcode Fuzzy Hash: ad7fb39d7d0572768195cdb96d88edf57c93c5d00d8eaa663e4c704e5b7bea2c
                                    • Instruction Fuzzy Hash: 97E04260A1228959FD6A26A715163F911840B6D7F0F2C1B24BF794B2E3AE3889D58A50
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 485612231-0
                                    • Opcode ID: b7253a55b1276d1b57d670979138b52c86c30a15e8b70f9b8b054cc625f4c6ce
                                    • Instruction ID: 4fb8939859dd21c30d764fca774206093a9adc15e80cf677a28c9fe662fd02f8
                                    • Opcode Fuzzy Hash: b7253a55b1276d1b57d670979138b52c86c30a15e8b70f9b8b054cc625f4c6ce
                                    • Instruction Fuzzy Hash: 34E01275B0260492FF1A67F398453E922916F9C7C2F4484246B05932B2ED3485958210
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: 9f69786d5a460bd10a7ebb6aefb8860d3e8c2c6fdcd2507370922641760e25d3
                                    • Instruction ID: 13db419113c6498c631838fdc6ddb0dd70937527e49e167ce5f06a1b8afcd3c4
                                    • Opcode Fuzzy Hash: 9f69786d5a460bd10a7ebb6aefb8860d3e8c2c6fdcd2507370922641760e25d3
                                    • Instruction Fuzzy Hash: F8618977300A8485EA169E26D1543BD27A1F318FD8F548611EF6E0B7E9DB38CA96E300
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __std_fs_directory_iterator_open
                                    • String ID:
                                    • API String ID: 4007087469-0
                                    • Opcode ID: 62a6befd59e95e6be22f98e3a4ebfeb412ed4c535db2cb07cb418f979dd58634
                                    • Instruction ID: 6d6699e32af5188d03e7646770fb91dd7afc69d8a0446cbf3df081f31a3d3197
                                    • Opcode Fuzzy Hash: 62a6befd59e95e6be22f98e3a4ebfeb412ed4c535db2cb07cb418f979dd58634
                                    • Instruction Fuzzy Hash: 7761A472B50A8086FB12DF6AD4903ED23A1E75C7E8F404629FF1957BE5EE34C9958340
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: 0258579371ac84c030b687d8f3e9e53793be201047a4711ff45b69c63e3a0462
                                    • Instruction ID: 0e68d78e60faff21098140196ff033a2ffaaea4e00a4f5682bb80e4d4b41ae0d
                                    • Opcode Fuzzy Hash: 0258579371ac84c030b687d8f3e9e53793be201047a4711ff45b69c63e3a0462
                                    • Instruction Fuzzy Hash: 9841AC72304B8485EA229F12A1043DEA262B74DBD4F580A35FFAD0B7AADE39C4858304
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: 475dc834707bf9b69a2ed6ca5fbd2d93d1c4a33ad04622696f275e0343da7bf5
                                    • Instruction ID: 8ad1302b10b5acce4aa3e19f4b665ff3ecb338c093a195a91599cca128cde541
                                    • Opcode Fuzzy Hash: 475dc834707bf9b69a2ed6ca5fbd2d93d1c4a33ad04622696f275e0343da7bf5
                                    • Instruction Fuzzy Hash: 09418E76215B8481DA2ACB66E5443AEB3A1F74DBD0F548625BFAD03BA5DF3DC081C700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: b06bf60d8942ac0ae74babd23b73743ac7a4ad5b3f4cb2543b6c0d650ae8d781
                                    • Instruction ID: 2922c6a58d100b8567e20699b5a529503332b7a2c0142c3a3a15086411293361
                                    • Opcode Fuzzy Hash: b06bf60d8942ac0ae74babd23b73743ac7a4ad5b3f4cb2543b6c0d650ae8d781
                                    • Instruction Fuzzy Hash: AF41C27230578585EE26EB17A5083D9A251A34CBD4F544635BF6D0BBEADE38C582C308
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: 4ce40286f8a82187cbf7b249125b8b0654a91aa63af007f30e70285513720961
                                    • Instruction ID: 5efaee97d33e2a13fb32646ab95501abf4c72ec9c3bcc73401235e526073e405
                                    • Opcode Fuzzy Hash: 4ce40286f8a82187cbf7b249125b8b0654a91aa63af007f30e70285513720961
                                    • Instruction Fuzzy Hash: 9931E172701A9444FF16AB17E5403E92281A70AFE9F564631AF2D07BE6EE78C4828348
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 3215553584-0
                                    • Opcode ID: 506399ceb7efd258d9ee9312528a7fb0108d3bcc24f039aa6e7519c78468f3b6
                                    • Instruction ID: 970956ea101780b6a44bc08ac7971c10be475c9fcb23d85d0426192894f7542c
                                    • Opcode Fuzzy Hash: 506399ceb7efd258d9ee9312528a7fb0108d3bcc24f039aa6e7519c78468f3b6
                                    • Instruction Fuzzy Hash: 4D41AE3224474487EB76DB1EE5413EA73A0E76ABD4F140206EB9A876A1DB39D402CB91
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: 5181ff7c5b0a20993f7b1f1c64d4329c6f17784107f59b165e945c5c85f77bf9
                                    • Instruction ID: 2fe0f6833032918ed672ed661f9a947b9c0af5482e27d8a0f5cd47c8c693ff77
                                    • Opcode Fuzzy Hash: 5181ff7c5b0a20993f7b1f1c64d4329c6f17784107f59b165e945c5c85f77bf9
                                    • Instruction Fuzzy Hash: A331D27270578095EE269B27A5443DDA395E718BD4F590A35BF6D0BBE6DE38C081C304
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InformationVolume
                                    • String ID:
                                    • API String ID: 2039140958-0
                                    • Opcode ID: 8839ae8f2d204f0763335732def2ff357d2a61c9c8b2f45dea9007f0933f9e1b
                                    • Instruction ID: dffcfb9f37b1a82ad039c49107d9a5130808b69e0a0edaedede7712015ce3c59
                                    • Opcode Fuzzy Hash: 8839ae8f2d204f0763335732def2ff357d2a61c9c8b2f45dea9007f0933f9e1b
                                    • Instruction Fuzzy Hash: F7517C33A14B808AE712CF79D4403DE77A0F799788F505612EB8C53AA9DF78C684CB40
                                    APIs
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 0000000140042AB8
                                      • Part of subcall function 000000014002B820: __std_exception_copy.LIBVCRUNTIME ref: 000000014002B868
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task__std_exception_copy
                                    • String ID:
                                    • API String ID: 317858897-0
                                    • Opcode ID: 6049d514389b2d53e4139fc56efaf05ab899489269bfb5c352801ce2b5228899
                                    • Instruction ID: e0c424e73107c798dbe20568d75892bd8762e32d7f1318d59332ad997fcd64de
                                    • Opcode Fuzzy Hash: 6049d514389b2d53e4139fc56efaf05ab899489269bfb5c352801ce2b5228899
                                    • Instruction Fuzzy Hash: 3D21D732701B4042EE2AEB16E5403E96290E758BE4F654731AF7C07BE5EE78C4E2C345
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 3215553584-0
                                    • Opcode ID: a24f7c79d48368e33d7deb9d4eeecb52ce7ec7a6106812cc151fd4020b53ad0d
                                    • Instruction ID: eadfb93546a9950693f2aa7559f4ccf8f1f0c25cf7c605596cfe9b5c909f97bf
                                    • Opcode Fuzzy Hash: a24f7c79d48368e33d7deb9d4eeecb52ce7ec7a6106812cc151fd4020b53ad0d
                                    • Instruction Fuzzy Hash: D1316B3261065886F753AB6798413ED2B90B7ACFE5F920305BB99073F2DB7CC4818B55
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: HandleModule$AddressFreeLibraryProc
                                    • String ID:
                                    • API String ID: 3947729631-0
                                    • Opcode ID: 9e03c0276b42d0bae273c9ceb8b8abd1e24865752fa8da44abca3c0ffcb1668a
                                    • Instruction ID: 0e4b959f2545b9961c939cfac364bfd3be1b5b2320958e1345833199399ed5d7
                                    • Opcode Fuzzy Hash: 9e03c0276b42d0bae273c9ceb8b8abd1e24865752fa8da44abca3c0ffcb1668a
                                    • Instruction Fuzzy Hash: BD217A36A006408EEB268F65C4403EC37A0E3D875DF54173AE72947EEAEB34C485CB40
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 3215553584-0
                                    • Opcode ID: 277766cc613ac521deff1262cc5973a4c6dda0ce244441028124d0478fb53980
                                    • Instruction ID: 824ad48f941a611458d9d107f1ba3892ee12638fd4db84a9ea3f894c29f76267
                                    • Opcode Fuzzy Hash: 277766cc613ac521deff1262cc5973a4c6dda0ce244441028124d0478fb53980
                                    • Instruction Fuzzy Hash: 03116632215A8081EB629F97D4003EEA3B4B79DFC4F554821FB895B7B6DB7CC9418740
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 3215553584-0
                                    • Opcode ID: 4bdd7c7df9abbb715da046ae302baf4d590079e7e30464498c50f0bf6b7ea38d
                                    • Instruction ID: 608a15f6eaf0ef5a496612af3e2485e25ca9acab7b6d14a4bfcd21ba336913f7
                                    • Opcode Fuzzy Hash: 4bdd7c7df9abbb715da046ae302baf4d590079e7e30464498c50f0bf6b7ea38d
                                    • Instruction Fuzzy Hash: 0A21A532214A8187EB629F6AD4407B977B0FBD9BD4F544224FB5D476EADB38C400CB00
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 3215553584-0
                                    • Opcode ID: 42dcc955d4fd3197300f6b05653cf2d2f457e7ff6d65b15765544b4f1739082b
                                    • Instruction ID: fd783d6a1e17b455ac1502cd21968fac34f3ce32d3c1f1488e06dd847f71ef0d
                                    • Opcode Fuzzy Hash: 42dcc955d4fd3197300f6b05653cf2d2f457e7ff6d65b15765544b4f1739082b
                                    • Instruction Fuzzy Hash: AE11A072525A40C2F312AB26E4507DDB3A2F79CBC5F450625FB96477B2CB38C8908F00
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: send
                                    • String ID:
                                    • API String ID: 2809346765-0
                                    • Opcode ID: 10723b900c3d3fb221c2729e0f2ab508e71a113b43aaaf7fd55bda6ca2804ccb
                                    • Instruction ID: 324eafc6b56467617a0271dfae881c0dd6149dee2f0a2b88ad16501ffcdce3d5
                                    • Opcode Fuzzy Hash: 10723b900c3d3fb221c2729e0f2ab508e71a113b43aaaf7fd55bda6ca2804ccb
                                    • Instruction Fuzzy Hash: 1D01AD32714A8486EB518F1BF94075AA7A0F78CFD4F485230EF5D43B68DB38C9818700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileFindNext
                                    • String ID:
                                    • API String ID: 2029273394-0
                                    • Opcode ID: 752fe5805e453647425062ce64daa4e53c54a82ad0d646f83825288564bb7983
                                    • Instruction ID: 198944faf61d7ec3d1a427db0a2f838cdd5696eaf073c2c50a60053681fd637d
                                    • Opcode Fuzzy Hash: 752fe5805e453647425062ce64daa4e53c54a82ad0d646f83825288564bb7983
                                    • Instruction Fuzzy Hash: 5701FB36218AC081EA72DB57F49579BA364F78CBD4F444026EF8D43B69DE39C886CB00
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 3215553584-0
                                    • Opcode ID: 68ea0e6e30933e9dd76abf56f21314c638998a57c534cc3687c594a1fb5b02e7
                                    • Instruction ID: 10117cc0a24eac238d1afa44782b5dd388175b2725dd5008568661bd113a274c
                                    • Opcode Fuzzy Hash: 68ea0e6e30933e9dd76abf56f21314c638998a57c534cc3687c594a1fb5b02e7
                                    • Instruction Fuzzy Hash: 2BE0D832215B4481EF666BBB91417EC71506B5CBF4F548321BF38033E6DB3484905711
                                    APIs
                                    • __scrt_dllmain_crt_thread_attach.LIBCMT ref: 00000001400AE9E4
                                      • Part of subcall function 00000001400B0E6C: __vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00000001400B0E74
                                      • Part of subcall function 00000001400B0E6C: __vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00000001400B0E79
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __scrt_dllmain_crt_thread_attach__vcrt_uninitialize_locks__vcrt_uninitialize_ptd
                                    • String ID:
                                    • API String ID: 1208906642-0
                                    • Opcode ID: 552cadb944fbfa7d273d14e6333c601f02b0659bfbb50ac822d976667c4bc77c
                                    • Instruction ID: bac56e61feae0d415a5fce5064964b513ab6c5bfd6be6e63147963a24a6523ee
                                    • Opcode Fuzzy Hash: 552cadb944fbfa7d273d14e6333c601f02b0659bfbb50ac822d976667c4bc77c
                                    • Instruction Fuzzy Hash: 34E012705057C040FEA77AB315473FE13502B3D3C4F500649BB95431F3963648C61A22
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileFindNext
                                    • String ID:
                                    • API String ID: 2029273394-0
                                    • Opcode ID: 4104833be8186ecfced91f05a1dc286f8d4e1ac7fad94ea37a2bf5d234dce428
                                    • Instruction ID: 55b9ab2d4f23c47d731a4d9c5ea1b4a63ef8b7b9423aaadfc0eff3470f8c37f6
                                    • Opcode Fuzzy Hash: 4104833be8186ecfced91f05a1dc286f8d4e1ac7fad94ea37a2bf5d234dce428
                                    • Instruction Fuzzy Hash: 65C09B39F15941D2E6553F775C823C611E06B5C792F440030DB0481170DE7CC5D78721
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InfoNativeSystem
                                    • String ID:
                                    • API String ID: 1721193555-0
                                    • Opcode ID: ebb3c2d15c06801dfe805b6087078b0f501a5fe9f8c446694f4975735c5f9cad
                                    • Instruction ID: fd872328199e54ae9bef307987e8fd57df0d4d182fee6eb87dab4ff849822d36
                                    • Opcode Fuzzy Hash: ebb3c2d15c06801dfe805b6087078b0f501a5fe9f8c446694f4975735c5f9cad
                                    • Instruction Fuzzy Hash: 0BB09236A148C0C3C612FB04E8422497331FB98B0FFD00000E78E42624CE2CCA2A8E00
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocHeap
                                    • String ID:
                                    • API String ID: 4292702814-0
                                    • Opcode ID: 9ae9f8af891c0b94514e7ea55ed6623f4eb6cc8682cd7ae55c8d48968416ecb5
                                    • Instruction ID: 07a5c3aa508a4e6947d003ddc055f1739cb4df8b9625e4c5651f4d540c93f396
                                    • Opcode Fuzzy Hash: 9ae9f8af891c0b94514e7ea55ed6623f4eb6cc8682cd7ae55c8d48968416ecb5
                                    • Instruction Fuzzy Hash: F6F0547438560585FE5B57A754513E923806B9DBC0F4C95326F0A873F2EE3CC9A08211
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocHeap
                                    • String ID:
                                    • API String ID: 4292702814-0
                                    • Opcode ID: eba47d0c810211a009f984e3ce810decee2d7cb9fb39a7e87e15bbee8ef19542
                                    • Instruction ID: 9f1c80e48db00bc7a01722dd14718bcfc10f7deb6eb96187868d3df548336582
                                    • Opcode Fuzzy Hash: eba47d0c810211a009f984e3ce810decee2d7cb9fb39a7e87e15bbee8ef19542
                                    • Instruction Fuzzy Hash: 97F01C3130128945FE9666B398457EB12806B9DBF5F4947347F2A872E2DA38C8808620
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: memcpy_s$_invalid_parameter_noinfo
                                    • String ID: $
                                    • API String ID: 2880407647-227171996
                                    • Opcode ID: 49a4e64996860ac975e7d62cf44a3f3077f64a100a8fbd3398d3c45755aa41bf
                                    • Instruction ID: a657bb27cda1b9a1f0199fcee91b942ba265a0f8779d78ad39ddf276b9d33eb5
                                    • Opcode Fuzzy Hash: 49a4e64996860ac975e7d62cf44a3f3077f64a100a8fbd3398d3c45755aa41bf
                                    • Instruction Fuzzy Hash: 1503AE727146808BE7768F2AD950BEE77A1F3987C8F405119FB06A7BA8D735DA00CB40
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: lstrcpy$lstrcat$AllocateInitLockMemoryObjectStringUnicodeVirtual$AcquireEnumerateFolderFreeInitializeKnownLoadedModulesPathReleaseTaskUninitialize
                                    • String ID: 0
                                    • API String ID: 1424456515-4108050209
                                    • Opcode ID: 492b338820f99169d463ac70aaee31110251a50e0b91b4a597eba9b31ec53d8b
                                    • Instruction ID: 9810c761cc7ca390209fb3240a0556aa890f9a692ead07930317e79a6d183194
                                    • Opcode Fuzzy Hash: 492b338820f99169d463ac70aaee31110251a50e0b91b4a597eba9b31ec53d8b
                                    • Instruction Fuzzy Hash: EFC2B736626F988AD7908F69E88169DB3B5F788B88F106215FFCD57B18EB38C154C740
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID: BOOTNXT$autorun.inf$boot.ini$boot.sdi$bootfont.bin$bootmgfw.efi$bootmgr$bootsect.bak$bootstat.dat$d3d9caps.dat$desktop.ini$gdipfontcachev1.dat$iconcache.db$indexervolumeguid$mib.bin$ntldr$ntuser.dat$ntuser.dat.log$ntuser.ini$reagent.xml$thumbs.db$winre.wim$winsipolicy.p7b$wpsettings.dat
                                    • API String ID: 118556049-850610325
                                    • Opcode ID: 22dcfd16a23274500c0631d97ecb7b22965bfb45e38d580db89ddce6ecc7947a
                                    • Instruction ID: 9af6f5fb2451f039e3f2e29efcbad565e8741d3969121260d1ea1181c48c6de1
                                    • Opcode Fuzzy Hash: 22dcfd16a23274500c0631d97ecb7b22965bfb45e38d580db89ddce6ecc7947a
                                    • Instruction Fuzzy Hash: 64C14562D60BC985E722DF36D8823E65361F7EE784F50A7067A8866866EF74D3C4C340
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExecuteShell
                                    • String ID: .cmd$.exe$.exe$.ps1$.vbs$abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789+=-&^%$#@!(){}[},.;'$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set$open$runas
                                    • API String ID: 587946157-4093014531
                                    • Opcode ID: cf2e034ccb18eb849afbb46964981302c4c49454c863ee7058ab8314e97cd049
                                    • Instruction ID: 516ac978d7accc54b9b25feff891efd212d5c6658e4279db0455b6b17bdc8b69
                                    • Opcode Fuzzy Hash: cf2e034ccb18eb849afbb46964981302c4c49454c863ee7058ab8314e97cd049
                                    • Instruction Fuzzy Hash: 15228B72A10B8489EB11DF2AE8803DD67A1F788798F509216FB9D47AB9DF78C584C740
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo
                                    • String ID: s$s$W$
                                    • API String ID: 3215553584-4165748295
                                    • Opcode ID: e553887dbc6f87d1f500918ea9ab67fa44c188f06d1d991fe1d00ce5ed50287a
                                    • Instruction ID: c6463bd72b9e455ee8cfff5301bfb85f092cacec8c11eb899980e5bdc04d5d87
                                    • Opcode Fuzzy Hash: e553887dbc6f87d1f500918ea9ab67fa44c188f06d1d991fe1d00ce5ed50287a
                                    • Instruction Fuzzy Hash: CEA2D172B142908BE7768F66D440BED77A1F3697C8F405215EB0A5BAE9D738DA80CF40
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: lstrcatlstrcpy$Object$AcquireAllocateInitializeLockMemoryUninitializeVirtual
                                    • String ID: 0
                                    • API String ID: 3636535045-4108050209
                                    • Opcode ID: 0902a0343fdc6246b23ac9e8b2963860140ecb12f80d28b06803a63a8b2f31ad
                                    • Instruction ID: 94aefb8106585e90225e2d394f927a9f5a122261c2d94df2defa09acd7d2905b
                                    • Opcode Fuzzy Hash: 0902a0343fdc6246b23ac9e8b2963860140ecb12f80d28b06803a63a8b2f31ad
                                    • Instruction Fuzzy Hash: A5B2893662AF988AD7808F69E88165EB3B5F788B84F106215FFCD57B18EB38C1548740
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Crypt$AlgorithmConcurrency::cancel_current_taskGenerateOpenPropertyProviderSymmetric
                                    • String ID: AES$ChainingMode$ChainingModeGCM
                                    • API String ID: 2222192889-1213888626
                                    • Opcode ID: 68eb506387ed3b354d136ad7ba04b3deb02d477db046592322b2241ce0ce9ea8
                                    • Instruction ID: 500f7495ef5fbc7585041441c081a52bd18aa39cbcf2a18a4df241488718b086
                                    • Opcode Fuzzy Hash: 68eb506387ed3b354d136ad7ba04b3deb02d477db046592322b2241ce0ce9ea8
                                    • Instruction Fuzzy Hash: 4461D172700B8486FB269F66E8407D96360E78DBE4F544725BFAC0BBE6DB38C5918700
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLastNameTranslate$CodeInfoLocalePageValidValue
                                    • String ID: utf8
                                    • API String ID: 3069159798-905460609
                                    • Opcode ID: 41343eb44851c0e8f8055f3926715ba520ae6846787d1c3cb08d70e80e5c003e
                                    • Instruction ID: 8349dc3027b5bf838b073474c1dbd6b6b718dd048b030d4317e83b54c1e9017f
                                    • Opcode Fuzzy Hash: 41343eb44851c0e8f8055f3926715ba520ae6846787d1c3cb08d70e80e5c003e
                                    • Instruction Fuzzy Hash: 3B916A3220178186FB76EF63D4513E963A5F7ACBC0F448221AF59477A6EB39C991CB10
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Value$Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
                                    • String ID:
                                    • API String ID: 2591520935-0
                                    • Opcode ID: 35311c5f5cbb088db9cafc063da405a92d1dac0a49a1e36eea51d3b328654a2c
                                    • Instruction ID: 7bd31282f7cea42ea7c1da278a9239bc261f869a6e572b599c6795b1d4aeb46e
                                    • Opcode Fuzzy Hash: 35311c5f5cbb088db9cafc063da405a92d1dac0a49a1e36eea51d3b328654a2c
                                    • Instruction Fuzzy Hash: 98716D327106508AFF52DFA2D8507ED33B4BB5CBC4F444626AF1957AA5EB38C885CB60
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                    • String ID:
                                    • API String ID: 3140674995-0
                                    • Opcode ID: 6458172863af31e20951f5f8dc1d486a5fb90de472876968ccfd77d10a4e7fe6
                                    • Instruction ID: 3eaaca77e3044fe114672d1de19e5a1b13903de1a1951330ac21f52225543186
                                    • Opcode Fuzzy Hash: 6458172863af31e20951f5f8dc1d486a5fb90de472876968ccfd77d10a4e7fe6
                                    • Instruction Fuzzy Hash: 81314376205B8086EB61DFA1E8803ED7374F799785F44412AEB4E47BA9DF38C649CB10
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __std_exception_destroy
                                    • String ID: value
                                    • API String ID: 2453523683-494360628
                                    • Opcode ID: 27440473cca6e6d5e75b1c57fb6d01a9dc46dae54849333bba3045cf441d84ae
                                    • Instruction ID: 8768895c1cc4e385d7258deaecffc048f3fa6b836c36682227525b43f7d5e3f0
                                    • Opcode Fuzzy Hash: 27440473cca6e6d5e75b1c57fb6d01a9dc46dae54849333bba3045cf441d84ae
                                    • Instruction Fuzzy Hash: 26027A72A14BC085EB52CBB6D4803EE6761E7897E4F105312FB9D13AEADE78C185C740
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: 0| $\|
                                    • API String ID: 0-2050777373
                                    • Opcode ID: c652eee9401b0b9c8a72cab74c88663788ec921b090d2d72647ffd252a966668
                                    • Instruction ID: 284daf97a714ec00d6c1b3d7287322477c9a22568bbb2eccfed623d737d0f244
                                    • Opcode Fuzzy Hash: c652eee9401b0b9c8a72cab74c88663788ec921b090d2d72647ffd252a966668
                                    • Instruction Fuzzy Hash: D904D032915FC489D7759F39EC853D977A8F79978CF106219EB8C1AB29EB3483A08305
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Crypt$AlgorithmProvider$CloseGenerateOpenPropertySymmetric
                                    • String ID: content$filename$ios_base::badbit set
                                    • API String ID: 4024084497-879919306
                                    • Opcode ID: a08e05513e9dcbdee50e79aaa7ab7c7ce389d55d6263c953d6c602833b73f9ff
                                    • Instruction ID: cb0e6f9973c86f6bf7250db1a472c77474858e66594b2c0d71a0c6cf541f3bd0
                                    • Opcode Fuzzy Hash: a08e05513e9dcbdee50e79aaa7ab7c7ce389d55d6263c953d6c602833b73f9ff
                                    • Instruction Fuzzy Hash: BC82E132119BC595E6B29B15F8803DAB3A4F7C9780F505226EBCD43BA9EF78C594CB40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: config$content$filename$status$users
                                    • API String ID: 0-2677590375
                                    • Opcode ID: 54d7cf4d1ff26a56666ae58331110585d2532bc34784e0666c6104c6faec9936
                                    • Instruction ID: 70acebbaa29ef06d302118f0e7c5040de1977182f0108b62d4f3236bad520155
                                    • Opcode Fuzzy Hash: 54d7cf4d1ff26a56666ae58331110585d2532bc34784e0666c6104c6faec9936
                                    • Instruction Fuzzy Hash: 57C23B72611BC589DB329F36D8903DD6361F789798F405216EB9D4BAAAEF38C684C340
                                    APIs
                                    Strings
                                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00000001400BD887
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DebugDebuggerErrorLastOutputPresentString
                                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                    • API String ID: 389471666-631824599
                                    • Opcode ID: 9ee4415ca50324c33a3d5a57874f9cc99ad178eb9645fb895110d63af1d9e2c1
                                    • Instruction ID: 156b50a59491b522b95133cc87a66bc9d4c90f318aca79d238700763b05f87d6
                                    • Opcode Fuzzy Hash: 9ee4415ca50324c33a3d5a57874f9cc99ad178eb9645fb895110d63af1d9e2c1
                                    • Instruction Fuzzy Hash: 5F115A32210B40A7F75A9B27E6943E933A1FB4C786F449125EB4983A70EF78D0B8C750
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo
                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN$W$
                                    • API String ID: 3215553584-4287779413
                                    • Opcode ID: e914ef83dae64b72f50003c00f300a4745ddd1fbbdf1c541f482026cce5ebf66
                                    • Instruction ID: 4d4210e12aeee8e9f5e94711e4e8cd733dc4b39c4ec79285a3ee6235da0bb1d1
                                    • Opcode Fuzzy Hash: e914ef83dae64b72f50003c00f300a4745ddd1fbbdf1c541f482026cce5ebf66
                                    • Instruction Fuzzy Hash: 93711172B242414BE7228F3AD4447EDB3A1A7AD3D4F044725BB199BAE5DB3CD9818F00
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Virtual$AllocInfoProtectQuerySystem
                                    • String ID:
                                    • API String ID: 3562403962-0
                                    • Opcode ID: 6131e7ac5c004b666fb02de1823fa69e50ababb2f1d6eff18536aed83fe204ab
                                    • Instruction ID: 2006030ddcdfcd66f6cc748a20a45c9b0152b93ab0e2963e6fa905ca9af8d5f1
                                    • Opcode Fuzzy Hash: 6131e7ac5c004b666fb02de1823fa69e50ababb2f1d6eff18536aed83fe204ab
                                    • Instruction Fuzzy Hash: 84311632310A859EEB21DF36D8547D923A5F74CBC8F944125AA494BB68DF38D646C740
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _get_daylight$_invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 1286766494-0
                                    • Opcode ID: 91154ea289c3556cf103cf6e37fc2ba0624cd5322ab1aec8ddf48183395d8b30
                                    • Instruction ID: 4fad86f6d9d594f3f7bfe3a69b32873ea402f7dc870d61de0be478661a220898
                                    • Opcode Fuzzy Hash: 91154ea289c3556cf103cf6e37fc2ba0624cd5322ab1aec8ddf48183395d8b30
                                    • Instruction Fuzzy Hash: 4D92E03660479087EB668F26D5503EE37A5F7A97C8F548215FB8907FA9DB38C990CB00
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FormatInfoLocaleMessage
                                    • String ID: !x-sys-default-locale
                                    • API String ID: 4235545615-2729719199
                                    • Opcode ID: e9313e5009c165bfc27bb14f9f63cf4f23352891cc12b2974ad7925588fd8796
                                    • Instruction ID: 3c92f31fd4891f13edf4352e9aacb77233aaeb4dc1a43732f9876fdfe1b241ce
                                    • Opcode Fuzzy Hash: e9313e5009c165bfc27bb14f9f63cf4f23352891cc12b2974ad7925588fd8796
                                    • Instruction Fuzzy Hash: 61018C72714B8083EB229F57B8647AA67A2F7887C5F848025EB5547AA8CB7CC606C700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: memcpy_s
                                    • String ID:
                                    • API String ID: 1502251526-0
                                    • Opcode ID: eb07a1fe8bff8429000d82fc6708e1dd14e73367c47fa60bb37c8b50ad77a0f3
                                    • Instruction ID: c4b91031d082ce85d0071a6aadb3f9c9206e35f87d0b51ac34ed733270a5ee20
                                    • Opcode Fuzzy Hash: eb07a1fe8bff8429000d82fc6708e1dd14e73367c47fa60bb37c8b50ad77a0f3
                                    • Instruction Fuzzy Hash: 70C1167231468487EB26CF1AE0447AEB7A1F39CBC4F459125EB5A43BA4DB39E901CF40
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InfoLocale$ErrorLastValue_invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 1791019856-0
                                    • Opcode ID: 8cdfe7f1b5fd9999da327c4f4609675d5690c7bae2d768c40d9912784c01383a
                                    • Instruction ID: 5aa2a0d1c8725bc235ac10c78bb89a9ef32e388b198462fc47fde5f37f4abd7d
                                    • Opcode Fuzzy Hash: 8cdfe7f1b5fd9999da327c4f4609675d5690c7bae2d768c40d9912784c01383a
                                    • Instruction Fuzzy Hash: 3761B2327006419AEB369FA6E5503ED73A1F7AC7C5F408325EB9A936E1DB38D591CB00
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: A+FNdHLOJ1pRh/WVc9ktcAFvacDJVLqxQG8rpGdP8jA=$VODjwXPB9OY=$port
                                    • API String ID: 0-1019441935
                                    • Opcode ID: 8f66b6d62beb6f09d62d7d6dbf9b58db0025d871cf1750c111c3c0708a68f516
                                    • Instruction ID: 4dfb1dc57a1fd22eb353bb1d19b8c791d4ee670b5e9c52e80c94e9e18fc8940c
                                    • Opcode Fuzzy Hash: 8f66b6d62beb6f09d62d7d6dbf9b58db0025d871cf1750c111c3c0708a68f516
                                    • Instruction Fuzzy Hash: 00725CB2629BC481EA61CB25E4803DEB3A5F799784F505216FBCD13B69EF38C195CB04
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: -$e+000$gfff
                                    • API String ID: 0-2620144452
                                    • Opcode ID: c7e19593615f5b016f33edca04d76eabfb088503034d3aa1c419b3a715446e94
                                    • Instruction ID: 5492b00e63e4a759c2255974a7dbe939dc967fd202c0368106c7b13000663624
                                    • Opcode Fuzzy Hash: c7e19593615f5b016f33edca04d76eabfb088503034d3aa1c419b3a715446e94
                                    • Instruction Fuzzy Hash: C45157767147C486E7268F36E9017A9BB91F348BD4F48D222EBA48BBE5CB79C445C700
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __std_exception_copy
                                    • String ID: parse_error
                                    • API String ID: 592178966-3903021949
                                    • Opcode ID: ad87cc4d60bf1839f79d6691cffc511a26045bc40a0068f83915665ea0575411
                                    • Instruction ID: aea208091b2139d5ef5ad6cd72c7aa8334fc7178c06fd11ac6bd6b7309e161d7
                                    • Opcode Fuzzy Hash: ad87cc4d60bf1839f79d6691cffc511a26045bc40a0068f83915665ea0575411
                                    • Instruction Fuzzy Hash: D3A16C72B10B8089EB12CB66E8403ED6361E79D7D8F109711EF9C17AAAEB79C195C340
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InfoLocale
                                    • String ID: GetLocaleInfoEx
                                    • API String ID: 2299586839-2904428671
                                    • Opcode ID: 099550578a3a416ea78b7fa52ed638fc0f733537aeae7f3447c0ea0cdfd8c17a
                                    • Instruction ID: fb935f9c2ab31aa5e90575f03674e7bf2486afca9488b688b185203ea02026ac
                                    • Opcode Fuzzy Hash: 099550578a3a416ea78b7fa52ed638fc0f733537aeae7f3447c0ea0cdfd8c17a
                                    • Instruction Fuzzy Hash: 80016D35704A8086EB569B57F4407DAA761FB9CBC0F984426FF4913BBADE38C9428790
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExecuteFileModuleNameShell
                                    • String ID:
                                    • API String ID: 1703432166-0
                                    • Opcode ID: c6a892adb9f2c7a53ffca73c77edd6de038f5ee25c1187c1e65b41a7611e93fc
                                    • Instruction ID: 80faa615b7083efcf7ead6ba0d22ac00e946de582c303fac3d495860aaca8833
                                    • Opcode Fuzzy Hash: c6a892adb9f2c7a53ffca73c77edd6de038f5ee25c1187c1e65b41a7611e93fc
                                    • Instruction Fuzzy Hash: 41120772625FC48ADB518F2AE88079EB3A5F788794F506215FF9D57B68EB38C150C700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CryptDecrypt
                                    • String ID:
                                    • API String ID: 2620231605-0
                                    • Opcode ID: 26be2a797bee493e3ad2b3ec1d6e55a9b045376b36a316b3c0ef38d451224750
                                    • Instruction ID: f7f5fd7e2185f9db639c3601158b2a71c7d2ea5875eccf7afe32dc6e5bc30884
                                    • Opcode Fuzzy Hash: 26be2a797bee493e3ad2b3ec1d6e55a9b045376b36a316b3c0ef38d451224750
                                    • Instruction Fuzzy Hash: 7FB16A72B48B809AEB61CB66E4503AD37B5F34978CF008216EF4817BA9DB79C599D340
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExceptionRaise_clrfp
                                    • String ID:
                                    • API String ID: 15204871-0
                                    • Opcode ID: 7fa2203b5ce5cf4252278981a869295bf258e597fb1a3e488d01a74adacce12a
                                    • Instruction ID: ce3cffeaddecb57bd5aa004852814d0472f37fd234069d5227336842901e8d70
                                    • Opcode Fuzzy Hash: 7fa2203b5ce5cf4252278981a869295bf258e597fb1a3e488d01a74adacce12a
                                    • Instruction Fuzzy Hash: 82B1FD77610B848BEB56CF2AD44539C7BE0F398B98F198A15EB59877B4CB39C491CB00
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorHeapLast_invalid_parameter_noinfo$AllocFree
                                    • String ID:
                                    • API String ID: 749460637-0
                                    • Opcode ID: d8e1cd86bca52aca31b961dedf47a361c02e0e7b30ea99c9b7b5689b5740aa97
                                    • Instruction ID: a0cc71780de81b772317908ff88ec895ebc3ca39ef53a965ae4e9244de46f0ae
                                    • Opcode Fuzzy Hash: d8e1cd86bca52aca31b961dedf47a361c02e0e7b30ea99c9b7b5689b5740aa97
                                    • Instruction Fuzzy Hash: 92612B3231478142EB669F67A810BEEB3D1B7DCBC0F454626BF49477A5EE38C8818B04
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DevicesDisplayEnum
                                    • String ID:
                                    • API String ID: 2211661463-0
                                    • Opcode ID: be865eeff10d166dc6103f7ebc966a270325f175452e2d6742989484897e37eb
                                    • Instruction ID: c35878f14fd4ace50e34acaeaa391da43f012d67d0405fd52747271c3f58506e
                                    • Opcode Fuzzy Hash: be865eeff10d166dc6103f7ebc966a270325f175452e2d6742989484897e37eb
                                    • Instruction Fuzzy Hash: 7E81AB33A14B8486E721CF26E84479E77A5F388798F515215EF9C17BA9EF78C681CB00
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CryptDataFreeLocalUnprotect
                                    • String ID:
                                    • API String ID: 1561624719-0
                                    • Opcode ID: 3c7e3a5f91e0787d7aef85fb9fbb870f2ddb1716ff9627e8817b466d935b003e
                                    • Instruction ID: 2abf1cfd20ccaa1f4459daf1535a8339dcc2a4d059cef63e2abe5a905cf5929a
                                    • Opcode Fuzzy Hash: 3c7e3a5f91e0787d7aef85fb9fbb870f2ddb1716ff9627e8817b466d935b003e
                                    • Instruction Fuzzy Hash: 39616632B14B809AEB22DF76E4403DD73B1E75978CF008229EB8D17E9ADB78C5948354
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: %$+
                                    • API String ID: 0-2626897407
                                    • Opcode ID: d935b501a86e25e770b94aa30a9c59d0487e3c2e5745dda8bea2a916c409a5b2
                                    • Instruction ID: eab13b880da1562538d920804dc0bc5824c51871a597d9e6891ce7a925efbbfb
                                    • Opcode Fuzzy Hash: d935b501a86e25e770b94aa30a9c59d0487e3c2e5745dda8bea2a916c409a5b2
                                    • Instruction Fuzzy Hash: 87220233B14A848AFB26CB66E8503ED67A2E7597D8F444222EF4917BE9DB3CC445C350
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: a/p$am/pm
                                    • API String ID: 0-3206640213
                                    • Opcode ID: d4351435efb39c397654aac4863534f6b364d586ca34e5132229a126b3ed6b80
                                    • Instruction ID: 282e28f27db02fe1aa2beadafee1f9428e67b57fa7ec56f663f6cb2ab2f17a07
                                    • Opcode Fuzzy Hash: d4351435efb39c397654aac4863534f6b364d586ca34e5132229a126b3ed6b80
                                    • Instruction Fuzzy Hash: A0E1ED3A61468085EB668F2791547FE23A4FBB97C4F654302FB4A07FA4DB38C991CB11
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: dumps$emoji
                                    • API String ID: 0-2873254224
                                    • Opcode ID: 29d82e5be1900c4638639d3fad370a31d01f233272ca9202bccfa1a5ba092702
                                    • Instruction ID: de1d32d498b1603b3283e1e425eee834114ee630492cf4a12f2e42a933c28d9c
                                    • Opcode Fuzzy Hash: 29d82e5be1900c4638639d3fad370a31d01f233272ca9202bccfa1a5ba092702
                                    • Instruction Fuzzy Hash: EEB1FA32929BC486E661CB25E88039AB7A4F79D788F116315FBCD53B59DB38D290CB00
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: 27d41652c40ed87ce4fa114c6ff06a1910c43d14d329ed21a01f6af745dd494c
                                    • Instruction ID: 3ea09d183f0e17230624784c327211b13ac9c21796c8a57e93de2c3ba86a3c65
                                    • Opcode Fuzzy Hash: 27d41652c40ed87ce4fa114c6ff06a1910c43d14d329ed21a01f6af745dd494c
                                    • Instruction Fuzzy Hash: 9F029B72711B8585EB11CFA6D8403EE63A2E748BD8F589622EF9C177A9DF34C495C380
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Info
                                    • String ID:
                                    • API String ID: 1807457897-0
                                    • Opcode ID: c9d984f8c8e7fc2b7c1079dab074fc7b6533c509f4afde3b9d187ac96ae98361
                                    • Instruction ID: a529babc2d6e8ba6f5e828ff2b22bd3019f6cc999c29afac651c8859d6e64573
                                    • Opcode Fuzzy Hash: c9d984f8c8e7fc2b7c1079dab074fc7b6533c509f4afde3b9d187ac96ae98361
                                    • Instruction Fuzzy Hash: 06128A32A08BC486E752CF3994457ED73A4F76D788F459316EB98876A2EB34D2C4CB00
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9691f68b8ced60ea536d3d4fed0bf4637ae7d36b6af0bd6711e03d238c4b0d36
                                    • Instruction ID: bb940daf5543c1f9a79ee97aaadeda5922451d7e61c1cde4f32fc15d938a2440
                                    • Opcode Fuzzy Hash: 9691f68b8ced60ea536d3d4fed0bf4637ae7d36b6af0bd6711e03d238c4b0d36
                                    • Instruction Fuzzy Hash: 4CE15036704B8086E721DB62E4417EE77A4F3A97C8F418626EF8D53B66EB78D245C700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: 1e407e3260cd602129e73a8920fc50dba52ed2419a4ddb5ed1fd5ee7f82e9ea6
                                    • Instruction ID: 3367cc3590d20919b635da020e6a9838ec97f649690dd723de14dcaa02d71857
                                    • Opcode Fuzzy Hash: 1e407e3260cd602129e73a8920fc50dba52ed2419a4ddb5ed1fd5ee7f82e9ea6
                                    • Instruction Fuzzy Hash: 4DA17932715B9889EB02CBAAD4803EC37B0F359B88F548516EF8E57B69DB39C195C350
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: f220bb455e952660eb50b0f3c2abb647a728a01879e9c52efd7d9e7b062f7765
                                    • Instruction ID: e7e758f77b730658fa2183651e0bcda9456a6a66edef94dbe68809bbbcb91688
                                    • Opcode Fuzzy Hash: f220bb455e952660eb50b0f3c2abb647a728a01879e9c52efd7d9e7b062f7765
                                    • Instruction Fuzzy Hash: 4AA18932615B98C9EB01CB6AD4803EC3BB0F359B88F548516EF8D57769DB79D191C310
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: c40fabb987ba8f5d9948d873c2a39370cc1a0d736e79898a84719bcece33613b
                                    • Instruction ID: fa854fabc025c76a206bed3a6f1c0845178dcea3b927583e1f4c4cda74e7147e
                                    • Opcode Fuzzy Hash: c40fabb987ba8f5d9948d873c2a39370cc1a0d736e79898a84719bcece33613b
                                    • Instruction Fuzzy Hash: 0FA18A32A15B98C9EB01CBAAD4803EC77B0F359B88F548516EF8D57B69DB39D095C300
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: a601ca1276c21b47724a3241582a9fe8544e11206b351a3787c5851274bd72f5
                                    • Instruction ID: d35a4813ebe911b3f3d06accd323ebf2fe1b7b1083f9830a8cc86ee30199d110
                                    • Opcode Fuzzy Hash: a601ca1276c21b47724a3241582a9fe8544e11206b351a3787c5851274bd72f5
                                    • Instruction Fuzzy Hash: D2A17832715B98C9EB12CB6AD4803EC67B0F359B88F648416EF8D57BA5EB39D095C300
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task
                                    • String ID:
                                    • API String ID: 118556049-0
                                    • Opcode ID: 0891f831d966b78e4d03c4c0c353bb6b9c219881d799290f37f10cb6bdff4155
                                    • Instruction ID: 854463cf17bdd6b58da1f7546ddcdbe712e6ab292ec46fef6426cf4f233b86a0
                                    • Opcode Fuzzy Hash: 0891f831d966b78e4d03c4c0c353bb6b9c219881d799290f37f10cb6bdff4155
                                    • Instruction Fuzzy Hash: 4FA19C72721B9889EB02CBAAD4907EC37B0F359B88F549416EF8E57B65DB39C191C340
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLastValue$InfoLocale
                                    • String ID:
                                    • API String ID: 673564084-0
                                    • Opcode ID: d3f265d93177da05e9e3079d3dae9c7822de4fa7ba26229b0f968e85ede82faf
                                    • Instruction ID: a4ca8649259d75ba04167a6e259112765b42d28c6b5c3f01e538b8ae298da7d2
                                    • Opcode Fuzzy Hash: d3f265d93177da05e9e3079d3dae9c7822de4fa7ba26229b0f968e85ede82faf
                                    • Instruction Fuzzy Hash: 9431713270468186EF6ADB67E4513DE73A1F79C7C4F408225BB8A876A5DF38D691CB00
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: QN
                                    • API String ID: 0-3349929942
                                    • Opcode ID: 2db597cf25c999939cc3b819fed71c1e326e74b4ad1904394b10da5a057d82d8
                                    • Instruction ID: 4f3d7730723fade62404a711111efc0fb212951dde9af45be0f290200e40d11c
                                    • Opcode Fuzzy Hash: 2db597cf25c999939cc3b819fed71c1e326e74b4ad1904394b10da5a057d82d8
                                    • Instruction Fuzzy Hash: BB02D432915BC489E7628F39E8813D977A4F7AD788F105315EBCC6BB69EB74C2908740
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$InfoLocaleValue
                                    • String ID:
                                    • API String ID: 3796814847-0
                                    • Opcode ID: 8a450860209e15821de9f16c01ed0612a725223f9a4b72f88eafb3edea00904a
                                    • Instruction ID: a262072600bdabd7c0679cf6d9857ba45dbebfe756d1e7f3d1e5b58b444c0772
                                    • Opcode Fuzzy Hash: 8a450860209e15821de9f16c01ed0612a725223f9a4b72f88eafb3edea00904a
                                    • Instruction Fuzzy Hash: B1110A32B1495183E7778777A04179E62A1E76C7E4F548721F766477E4E636C8C18B00
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$EnumLocalesSystemValue
                                    • String ID:
                                    • API String ID: 3029459697-0
                                    • Opcode ID: 0c241287891358d20c5c1590d81d3974ae3e0a48a457f3cbc01ffa927b921278
                                    • Instruction ID: 6ae5d8b3708d6626887a23f7dbcc4907dd0624352dc3dc594ae9d114bdff575e
                                    • Opcode Fuzzy Hash: 0c241287891358d20c5c1590d81d3974ae3e0a48a457f3cbc01ffa927b921278
                                    • Instruction Fuzzy Hash: 4D01D472B042808AEB128FA7E440BD976A1E768BE4F458321E765473E9CB7588C1CB00
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AlgorithmCloseCryptProvider
                                    • String ID:
                                    • API String ID: 3378198380-0
                                    • Opcode ID: 65ba22bee9f219e95710a788156d61738fbf3692be3f1b4b0f6c47b5bcc97fc1
                                    • Instruction ID: 46cd3e4ecf0bf3881bc472a46e152dc7da49fa282612d15e85770da4dfb79c46
                                    • Opcode Fuzzy Hash: 65ba22bee9f219e95710a788156d61738fbf3692be3f1b4b0f6c47b5bcc97fc1
                                    • Instruction Fuzzy Hash: E901AFB2700A8481EF299B22E4583AD2361E748FC9F944410EF4C076A9DFBDC8858380
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: EnumLocalesSystem
                                    • String ID:
                                    • API String ID: 2099609381-0
                                    • Opcode ID: 17140df511fe09419b9fc83be2d2c34c2fb9fdba42dd4bc62a26aeb66c77a399
                                    • Instruction ID: de712f23fd13e8c4d5100720269348e510cf31078cf0cbf84c59e1ff34ea8840
                                    • Opcode Fuzzy Hash: 17140df511fe09419b9fc83be2d2c34c2fb9fdba42dd4bc62a26aeb66c77a399
                                    • Instruction Fuzzy Hash: D8F037B2304B4083E705DB2AF8907D973A2E79DBC0F549126EB4983379CE38C9A1C300
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID: 0-3916222277
                                    • Opcode ID: d56b133698f6429a15668cf33a50c2b0452d3e907794045ce25e286071ddca93
                                    • Instruction ID: 5985c16e8c7ee05d195531540a6d0c9df7fc115bbda66a9a795bdfadb218e8cb
                                    • Opcode Fuzzy Hash: d56b133698f6429a15668cf33a50c2b0452d3e907794045ce25e286071ddca93
                                    • Instruction Fuzzy Hash: CCB16D72204B848AEB66CF3AD0503AD3BB4F34DF88F684116EB8A473A5DB36C951C745
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c60e777daeaea113d67f9bda991af49b1d649395350f0fb3635444d7023d5cec
                                    • Instruction ID: 11b7f8a1af85b3332e8e9ec774ad9aafbdc42df1fa3ac2c6f6e342fe0cafe42d
                                    • Opcode Fuzzy Hash: c60e777daeaea113d67f9bda991af49b1d649395350f0fb3635444d7023d5cec
                                    • Instruction Fuzzy Hash: 6AA27136615FD88AD7418FAAEC8129973B6F748BA8B101619EFCC57F18EBB4C164C740
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5f2ab913b2a9c6339d4f929c5c8b4980086af9248ce40ff222e0927e827d1066
                                    • Instruction ID: beef6051a45bce1b1226442735bbb051317004564f72870a77c8f5785136e9d7
                                    • Opcode Fuzzy Hash: 5f2ab913b2a9c6339d4f929c5c8b4980086af9248ce40ff222e0927e827d1066
                                    • Instruction Fuzzy Hash: B092B432915BC88AD7718F25E8813DAB7A8F79D788F505315EACC16B19EB38D394C704
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ff8ff783da37649173626c7f7158936b22345755ff077d27462f74136c1878ba
                                    • Instruction ID: 1d33147da6fef292ddb6e3dfce7d4f5fb46f2d394935471198070cec947208fe
                                    • Opcode Fuzzy Hash: ff8ff783da37649173626c7f7158936b22345755ff077d27462f74136c1878ba
                                    • Instruction Fuzzy Hash: 23C1D073725A9487EB56CF63D9447A9B762F3D8BE0F55D120EB4A07B98CA38C846C700
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7f1b1de879cd7e42ebf2539f4be516ae56f05d2d23899ff6a7557d8b7da4b024
                                    • Instruction ID: dae7188b58aa12ed6a721d46ece6e361adde1b5e6735e4fc9e27f5ef3900fc0f
                                    • Opcode Fuzzy Hash: 7f1b1de879cd7e42ebf2539f4be516ae56f05d2d23899ff6a7557d8b7da4b024
                                    • Instruction Fuzzy Hash: DD12C532619BC88AE7718F29E84139AB7A4F79D788F505315EBCC57B19EB38C254CB04
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 34fb1097c6f2363caac24c1e5b45ae24c1a6ca50cb597d280e611698873f3a91
                                    • Instruction ID: 447b2b773560c4beaa4e67ccb80f79841d332dbb345d5add23c245d827f16df0
                                    • Opcode Fuzzy Hash: 34fb1097c6f2363caac24c1e5b45ae24c1a6ca50cb597d280e611698873f3a91
                                    • Instruction Fuzzy Hash: 38C1C4B3A146948BE355CF2DD401A5D7BA0F398B84F40A629EB56C3B01E778D9A5CF80
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLastNameTranslate$CodePageValidValue_invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 4023145424-0
                                    • Opcode ID: a2379e98abae736fe33e8b4f9fedcc0141c51f1be06055089ccb01d873b85599
                                    • Instruction ID: 81f69587606c8d6d2920975f800801ad71658ffe686509f5888f9c5868ecb4cc
                                    • Opcode Fuzzy Hash: a2379e98abae736fe33e8b4f9fedcc0141c51f1be06055089ccb01d873b85599
                                    • Instruction Fuzzy Hash: BFC1C27630468086EB629B6799107EA37A1F79ABC8F404115FF8A8BBE5EF3CC545C740
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f0c2dc1868310f7be340402d514fcc5ddbcaaf30b09b4b1a75e66e521b583746
                                    • Instruction ID: 3a803396a737e7e09fc37ffe396adff213b7af43b5bde25c7abf1f4bb1d46515
                                    • Opcode Fuzzy Hash: f0c2dc1868310f7be340402d514fcc5ddbcaaf30b09b4b1a75e66e521b583746
                                    • Instruction Fuzzy Hash: 21C1B832604A4486EB2ACF3BC5507AE37A0E749BCCF248215EF595B7E5DB3AC846D740
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$Value_invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 1500699246-0
                                    • Opcode ID: 468b93f19c7ca54f8d79ce9aecab092ca155e8bca1880fa3cbddf3014db9fedd
                                    • Instruction ID: 219554444d32d0e4537ad1326bba152ffa5b4e92018c9ef7381ea1e0fb4a3fed
                                    • Opcode Fuzzy Hash: 468b93f19c7ca54f8d79ce9aecab092ca155e8bca1880fa3cbddf3014db9fedd
                                    • Instruction Fuzzy Hash: A8B1CE7261468482EB76DF22D4117EA33A0F3A8BC8F544326EF56836E9DF78C595CB40
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8096616a82d0af589e55529d9e21aaaddb0a4067eb04550f42ec58ec897b5e0e
                                    • Instruction ID: b20235c530f76bdce2ee3876d0716f49ee890a7daca5df87e94b1965b3cc0896
                                    • Opcode Fuzzy Hash: 8096616a82d0af589e55529d9e21aaaddb0a4067eb04550f42ec58ec897b5e0e
                                    • Instruction Fuzzy Hash: 8661B172714BC882DB21CB2AE4453EDA3A1F75D7D8F549211EB9D47BA8EB79D280C340
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: afd72482e03d17e0c267891211c2a08fffdf3b2de236a6c27577c882ac387638
                                    • Instruction ID: e2c9dfdefbb9d112d0675f23ad41226c04d3d172fc5c8865881e53bf685bf733
                                    • Opcode Fuzzy Hash: afd72482e03d17e0c267891211c2a08fffdf3b2de236a6c27577c882ac387638
                                    • Instruction Fuzzy Hash: 4B51D87261878086EBB5CB2BA4413BAA690F74E7D4F544225FB9E43BE9DB3CC5409B00
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 193cd117a2ef074e35f90b234510b644fd9885312343ba6f5a452ee1bb2d5318
                                    • Instruction ID: 6900e702a5941c77574d6443b4333d3e101c6be96e986b2f6778fca52dddf91e
                                    • Opcode Fuzzy Hash: 193cd117a2ef074e35f90b234510b644fd9885312343ba6f5a452ee1bb2d5318
                                    • Instruction Fuzzy Hash: D65114A3B0568443DB248B49F842786F7A5FB887C5F00A126EE8D57B68EB3CD5808700
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ac8362b94cbf271fd23ce0d6965fdbbec26e6817efc2dd1af2fcdc0b4ee58872
                                    • Instruction ID: 99ad1355632ae1fd69952ade0b8b880547fb4266a066a210fa678cc3ea636d96
                                    • Opcode Fuzzy Hash: ac8362b94cbf271fd23ce0d6965fdbbec26e6817efc2dd1af2fcdc0b4ee58872
                                    • Instruction Fuzzy Hash: 6D519236624A5086E7669B2BD0543AC3BA1E35CFDEF258111EF89477B5C736C893C740
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 45278502b4de115ed76afef2690a2838d0b28876f14c66dd069eb4612fa83dd3
                                    • Instruction ID: 1a5f552ae487ea52881a4b4007291b9de41d1dc95850a7e92b2562e97dc69483
                                    • Opcode Fuzzy Hash: 45278502b4de115ed76afef2690a2838d0b28876f14c66dd069eb4612fa83dd3
                                    • Instruction Fuzzy Hash: 8B51C136224A50C6E7269B2BE0403A97BA1E34CFD9F684111EF49477B5D732CD43CB80
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c9c3f90e6787dc6e65e60abd648d80575bcfa0207306300bab00d1ff848a11e7
                                    • Instruction ID: bf005c958525c39f9f98a73881a786616db269bc64c82d253bf23c47cd79f0e7
                                    • Opcode Fuzzy Hash: c9c3f90e6787dc6e65e60abd648d80575bcfa0207306300bab00d1ff848a11e7
                                    • Instruction Fuzzy Hash: B3518036624A50C6E7269F2BC0503A93BA1E34DFA9F288111EF89577B4CB36CD43C780
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 485612231-0
                                    • Opcode ID: b072ca8265509c148f4541a461e9c46211a015d1fc6d543edcef350f88236ae8
                                    • Instruction ID: be5b461f7ee288339d9b570e5532cccf87377d3a7bff12cd17e984541771d2f7
                                    • Opcode Fuzzy Hash: b072ca8265509c148f4541a461e9c46211a015d1fc6d543edcef350f88236ae8
                                    • Instruction Fuzzy Hash: 7641B172310A5482EF19CF2BD9647A973A1B35CFD0F59A126EF0D87B68EE38C5818700
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8bc33c3536161bc484423b10eb716127ab9544999afc424961bcb52a57f13683
                                    • Instruction ID: 3c7983b830f6b63e9c4c9675241669f5c13d1c0f71ef5918f77dcbd55cd6ecdd
                                    • Opcode Fuzzy Hash: 8bc33c3536161bc484423b10eb716127ab9544999afc424961bcb52a57f13683
                                    • Instruction Fuzzy Hash: 341196E750DBC04AE3536A764C6638C2FA0EF69B82F5E4047ABC1432E3D41988178771
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0b94530713a913939f12afd49bf3f989c7adb72ec33da958378e54e9ad9fd42b
                                    • Instruction ID: 393e66a248a7458cbd0769797b836fce9b5d88c46e865def206e129f9bba6403
                                    • Opcode Fuzzy Hash: 0b94530713a913939f12afd49bf3f989c7adb72ec33da958378e54e9ad9fd42b
                                    • Instruction Fuzzy Hash: 0FF0F99B40F7C04EE3430A3548B839C6F705B96A05F8E9187D7D1872A3D45D891A8722
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b547731a42b455a57830d377de8a2b20729656713097031710f37aee72577a8f
                                    • Instruction ID: 02345993a42a1f42dcd7f10c3dd684b024d0b45ed66d7960d40f0ea9c6da856b
                                    • Opcode Fuzzy Hash: b547731a42b455a57830d377de8a2b20729656713097031710f37aee72577a8f
                                    • Instruction Fuzzy Hash: 58D05B6760D7C04AF35359711862B9C1F909F97B55F4D404DBB81131D7A446480A8361
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 73f6fcd7a4cb68e4d74a8a051caf1e2187c963a0189974b76a7c08800c8ad9bf
                                    • Instruction ID: 0c38828c7b08ca5da40bb7a2481fa8f8af6693f67d55db55594c42c6799df067
                                    • Opcode Fuzzy Hash: 73f6fcd7a4cb68e4d74a8a051caf1e2187c963a0189974b76a7c08800c8ad9bf
                                    • Instruction Fuzzy Hash: 91D0A7A754AAD01AF25356E518537DC1F50DF9976FF484140BB82030D2545498874632
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4cb15a94e342ea890222ad9b7dd98e0be93d51a9a21dccf1d3e9e7f6fb6c6733
                                    • Instruction ID: 284bb321d2ffc78d06ddc6b5d1304e48de7d8bede21ee8d30e6dfabe55de0752
                                    • Opcode Fuzzy Hash: 4cb15a94e342ea890222ad9b7dd98e0be93d51a9a21dccf1d3e9e7f6fb6c6733
                                    • Instruction Fuzzy Hash: 8FA0228B00CAE00FC302C230382830E2F00A382208F0F808E83C022283E888C80A8300
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7c307f67adb8aff98d3f095286b2b700dfcb55a183617c16c72d4ace8312b7d4
                                    • Instruction ID: 038cc99b61fe1a58f79dc842e8ffe6d2d7c0790616e2838ebdfb41b054369831
                                    • Opcode Fuzzy Hash: 7c307f67adb8aff98d3f095286b2b700dfcb55a183617c16c72d4ace8312b7d4
                                    • Instruction Fuzzy Hash:
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5456c1017e62d8a62d24bd00efd00e1bd566c7298f1a5c9df3ac67b34942d268
                                    • Instruction ID: 1e5fe235f4e7dce37c692c762f7cd0d9374d6e3f00cd63ce27c0307ae74c01e5
                                    • Opcode Fuzzy Hash: 5456c1017e62d8a62d24bd00efd00e1bd566c7298f1a5c9df3ac67b34942d268
                                    • Instruction Fuzzy Hash:
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 14b270ea0598b5b9cae66e2d5e117f87c25acc53f166e4edd8216a18fe85d6d1
                                    • Instruction ID: 92bca372c73bf05736e5418606bf4d9f339bc1d6ec97d0400b5c022073cefb92
                                    • Opcode Fuzzy Hash: 14b270ea0598b5b9cae66e2d5e117f87c25acc53f166e4edd8216a18fe85d6d1
                                    • Instruction Fuzzy Hash:
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 261fe6521d892542d75bab8d3c7c41f58578a8ad23917a021c9647768b8a2587
                                    • Instruction ID: 21f96874aefc6780fb4cc87987608e11b01dfb94e8bba2c9a4a0b173746f94ca
                                    • Opcode Fuzzy Hash: 261fe6521d892542d75bab8d3c7c41f58578a8ad23917a021c9647768b8a2587
                                    • Instruction Fuzzy Hash: 2AA00231144C01E4E606AB82E8513B52330F76D3D3F800111F609434709B38C486D724
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle$Process32Token$InformationNextOpenProcess$ConvertCreateErrorFirstLastSnapshotStringToolhelp32
                                    • String ID:
                                    • API String ID: 3925315391-0
                                    • Opcode ID: b7cdb7a7c6588e50aaab37c0fa57b8db1cd1071ffc72c1321cf755afb8342ce3
                                    • Instruction ID: 68b79e17468d5ffc7bdb11eb9da1f300de3bde19eb7119fa88f07868e24a99b8
                                    • Opcode Fuzzy Hash: b7cdb7a7c6588e50aaab37c0fa57b8db1cd1071ffc72c1321cf755afb8342ce3
                                    • Instruction Fuzzy Hash: E1815636215B8082EB52DB27E8507AEA7A4FB8CBD5F404115EF8947BA8DF7CC506CB00
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: No closed word$key declared, but no value$key opened, but never closed$object is not closed with '}'$quote was opened but not closed.$unexpected '}'$unexpected key without object$word wasnt properly ended
                                    • API String ID: 0-2700065129
                                    • Opcode ID: ad38a0761d6ba5948b7696d48ceb3f0e7c48dfa30fde10419c371ab7bc1f8fca
                                    • Instruction ID: 6fab13cdf4c8ee5aec4ee7cf0a03f33fee243f48159f504b0079cc5bb13959cb
                                    • Opcode Fuzzy Hash: ad38a0761d6ba5948b7696d48ceb3f0e7c48dfa30fde10419c371ab7bc1f8fca
                                    • Instruction Fuzzy Hash: A3B1D972111B8698EB72EF22DC817D83364E758388F809616E74D4B9BAEF74C799C700
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo
                                    • String ID: 0$0$0
                                    • API String ID: 3215553584-3137946472
                                    • Opcode ID: 4b936a4394e80428ad7bf41d875096a3e7add69c0315c25dc0869b4c3066c4ac
                                    • Instruction ID: 3213ef2b50ecd163c7d14e926568a975ace41416199d29b45c1ca283887101a0
                                    • Opcode Fuzzy Hash: 4b936a4394e80428ad7bf41d875096a3e7add69c0315c25dc0869b4c3066c4ac
                                    • Instruction Fuzzy Hash: BDE1D532506A858EF7629F2AC5903ED3BE5E75ABC4F558012FB84477F6C739886AC700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Session$ListProcess$CurrentRegisterResourcesStart
                                    • String ID:
                                    • API String ID: 3299295986-0
                                    • Opcode ID: 4ddc3a5b4f8c6342cd3dcf0c0e78daa6693b2bbe667ef408570da53bc05ca548
                                    • Instruction ID: 4c793500f816d282acb2aabb8fc29ea38f6b32d5493fd496aff2a0b1b3cfbeb8
                                    • Opcode Fuzzy Hash: 4ddc3a5b4f8c6342cd3dcf0c0e78daa6693b2bbe667ef408570da53bc05ca548
                                    • Instruction Fuzzy Hash: 96512A32B10A518AFB11DFA6E4507DD33B1B78C789F54412AEF0A67BA8DE38C906C750
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                    • String ID: csm$csm$csm
                                    • API String ID: 849930591-393685449
                                    • Opcode ID: 93094d183b60bcbe653e0156645cfa8f2fca202be6890cc91cb0939cc453230d
                                    • Instruction ID: 3a13c9879769dac578afa29d7b485a497df9fff387a412afdd0e51ddf3691885
                                    • Opcode Fuzzy Hash: 93094d183b60bcbe653e0156645cfa8f2fca202be6890cc91cb0939cc453230d
                                    • Instruction Fuzzy Hash: 2FD15A32600B408AEB62DFA694803ED77B0F7997D8F504215FF8957BAADB34D491CB40
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressFreeLibraryProc
                                    • String ID: api-ms-$ext-ms-
                                    • API String ID: 3013587201-537541572
                                    • Opcode ID: ca7c09baf792878f96d911292d21648074434898d998409f668d6f16be7d0add
                                    • Instruction ID: f73114aa169cb76ed7bb151e5edde51fcbf1469d6d678e3e652b687f2da571e4
                                    • Opcode Fuzzy Hash: ca7c09baf792878f96d911292d21648074434898d998409f668d6f16be7d0add
                                    • Instruction Fuzzy Hash: 6341AE72351A1182FA27DB27A8147DA33D5BB4DBE1F494626BF0D877A8EE78C446C340
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Internet$CloseFileHandleOpenRead
                                    • String ID: File Downloader
                                    • API String ID: 4038090926-3631955488
                                    • Opcode ID: 08390c31da5b4fc07b5c09408d7811b7848834d5846b825d266ba2205e00005c
                                    • Instruction ID: eb27d1ea62c1c53e703129baddda4c43dac775c7680c307a68408eb1a4e91a40
                                    • Opcode Fuzzy Hash: 08390c31da5b4fc07b5c09408d7811b7848834d5846b825d266ba2205e00005c
                                    • Instruction Fuzzy Hash: F5315B32214B8486EB229F26F85079EB3A1FB89BC4F545116FF8943B68DF7CC5958B00
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo
                                    • String ID: f$p$p
                                    • API String ID: 3215553584-1995029353
                                    • Opcode ID: eea83e675726579202ae46558f478e57f494447b85c4049c91ddb9471f815998
                                    • Instruction ID: 8ef2ce2b4433a5174d3e3dbe1a20b96cbda26b55fe283d1aa6820eb14bd99968
                                    • Opcode Fuzzy Hash: eea83e675726579202ae46558f478e57f494447b85c4049c91ddb9471f815998
                                    • Instruction Fuzzy Hash: 8912E572A0864186FB229B16E0687FA76A1F7887D4FC84115F7D6876F4D738C980CF10
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Library$Load$AddressErrorFreeLastProc
                                    • String ID: api-ms-
                                    • API String ID: 2559590344-2084034818
                                    • Opcode ID: 081807f0f237e99e654a6d52eb3ba83cc0c1c8883019cc9f4ec60aedd52be443
                                    • Instruction ID: d2d2b12301ccee3db6092258b470e539f8c69494279eba12926322fb6e990f4b
                                    • Opcode Fuzzy Hash: 081807f0f237e99e654a6d52eb3ba83cc0c1c8883019cc9f4ec60aedd52be443
                                    • Instruction Fuzzy Hash: C2315831212A9092EF23DF97A8007A963E4BB4CBE5F498625EF191B7A4EF38C5558310
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                    • String ID: CONOUT$
                                    • API String ID: 3230265001-3130406586
                                    • Opcode ID: 53dac6272d403f79ff27e653aa55d51cb6535fcae6368453f164039c5e4e95e8
                                    • Instruction ID: f15e57fd0cbad3ac117247ebeab47ab85c390eb31785d7c6841302a8b2ce117c
                                    • Opcode Fuzzy Hash: 53dac6272d403f79ff27e653aa55d51cb6535fcae6368453f164039c5e4e95e8
                                    • Instruction Fuzzy Hash: A111BC35324B8086F7529B07E85479AA3A4FB9CFE9F040224EF5987BB4CF78C8858740
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharMultiWide$CompareInfoString
                                    • String ID:
                                    • API String ID: 2984826149-0
                                    • Opcode ID: 26eb7e015d5d110b74ff0d84bcaa31491d724dbf353ec7a17117fafe3eaea0ab
                                    • Instruction ID: f3d77999423992fadc64f97f79b2d010f51e5ad261fed549977a36ea05826e58
                                    • Opcode Fuzzy Hash: 26eb7e015d5d110b74ff0d84bcaa31491d724dbf353ec7a17117fafe3eaea0ab
                                    • Instruction Fuzzy Hash: 44A1AD72645F8086EB339FA694507EDB7A1E749BE8F484622FB59077E5FB38C8448700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharMultiStringWide
                                    • String ID:
                                    • API String ID: 2829165498-0
                                    • Opcode ID: 7d9f455a94f84a05f587d57d339c879795f99f0f1217d4298ff39db3fa6ba98e
                                    • Instruction ID: 6204e7013e5cadcd1b8727ff30a8d0596e87d4a89eb5434169e5949405e06915
                                    • Opcode Fuzzy Hash: 7d9f455a94f84a05f587d57d339c879795f99f0f1217d4298ff39db3fa6ba98e
                                    • Instruction Fuzzy Hash: EE81A572200B8086EB629F66E8407DDB3F5FB58BE8F144616FB5947BE9EB38C5418700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 3215553584-0
                                    • Opcode ID: 619b2885e3fd1682f6a864358b33df5452abb606e6c6f730ccce56a3fdc98189
                                    • Instruction ID: 7b56d8f3e7d84661432cdb72d15b1222586d501d367448fe89141b583d9e4598
                                    • Opcode Fuzzy Hash: 619b2885e3fd1682f6a864358b33df5452abb606e6c6f730ccce56a3fdc98189
                                    • Instruction Fuzzy Hash: D0517633605B8489FB639F26D0603ED37A1A75EFC4F998052E7D8473A6CA3D8846C752
                                    APIs
                                    • GetLastError.KERNEL32 ref: 000000014009A073
                                    • FlsSetValue.KERNEL32(?,?,-2723E8D8DEBC5093,0000000140094E71,?,?,?,?,000000014009D3FC), ref: 000000014009A0A9
                                    • FlsSetValue.KERNEL32(?,?,-2723E8D8DEBC5093,0000000140094E71,?,?,?,?,000000014009D3FC), ref: 000000014009A0D6
                                    • FlsSetValue.KERNEL32(?,?,-2723E8D8DEBC5093,0000000140094E71,?,?,?,?,000000014009D3FC), ref: 000000014009A0E7
                                    • FlsSetValue.KERNEL32(?,?,-2723E8D8DEBC5093,0000000140094E71,?,?,?,?,000000014009D3FC), ref: 000000014009A0F8
                                    • SetLastError.KERNEL32 ref: 000000014009A113
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Value$ErrorLast
                                    • String ID:
                                    • API String ID: 2506987500-0
                                    • Opcode ID: 6edccbe99d42b8d8ba81787b9913857dbdf264f8e30533449deede82163d0890
                                    • Instruction ID: eeff4923b96ffbeaac783fc6dd0fa1487e36d7b8cfc170d4ae8f5156a2ba4d41
                                    • Opcode Fuzzy Hash: 6edccbe99d42b8d8ba81787b9913857dbdf264f8e30533449deede82163d0890
                                    • Instruction Fuzzy Hash: 98111C3034568042FA5BA7336A623FD62925B8D7F0F544729BB3B07BF6DE39D4419241
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __std_exception_destroy$ApisFile__std_fs_code_page
                                    • String ID: ", "$: "
                                    • API String ID: 741338541-747220369
                                    • Opcode ID: 2c062e25483d2eca155dcbad927ea592646f55c0d7d00b677cf4262805b9b337
                                    • Instruction ID: a0ebd77add875ad15dad381f545e36b6a5c96292ae31a13c06a59994470402d1
                                    • Opcode Fuzzy Hash: 2c062e25483d2eca155dcbad927ea592646f55c0d7d00b677cf4262805b9b337
                                    • Instruction Fuzzy Hash: 2DB19C72700A8086EB05EF66E4943ED3361E758BC8F508526EF5D17BAADF38C895C384
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AdjustPointer
                                    • String ID:
                                    • API String ID: 1740715915-0
                                    • Opcode ID: 3df3621708c9e1d29be45954cd8076bff015c977087edb3d15e3ad851c434b44
                                    • Instruction ID: 41cb3884d18e3d7aac6dd593d0dde361e415a54a90db4f7c0cd28a3af3c10cc3
                                    • Opcode Fuzzy Hash: 3df3621708c9e1d29be45954cd8076bff015c977087edb3d15e3ad851c434b44
                                    • Instruction Fuzzy Hash: 05B16F32206E8081EA67DF97A5447E967B4EBDCBC4F998525BF4907BADDB34C4428700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _set_statfp
                                    • String ID:
                                    • API String ID: 1156100317-0
                                    • Opcode ID: c9768c6bae9d0a1841153f261c566ca82662720961c70f1a47209fa097809d0f
                                    • Instruction ID: 0afbddc13addd556ac1af8f9b4ec179a3aecd6ac334101865df0461df1719237
                                    • Opcode Fuzzy Hash: c9768c6bae9d0a1841153f261c566ca82662720961c70f1a47209fa097809d0f
                                    • Instruction Fuzzy Hash: 7981B232514A444AF7738B3BB4503EAA6A5AFAE7D8F144301BF96279F5D738C9D18E00
                                    APIs
                                    • FlsGetValue.KERNEL32(?,?,?,0000000140097EF7,?,?,00000000,0000000140098192,?,?,?,?,-2723E8D8DEBC5093,000000014009811E), ref: 000000014009A14B
                                    • FlsSetValue.KERNEL32(?,?,?,0000000140097EF7,?,?,00000000,0000000140098192,?,?,?,?,-2723E8D8DEBC5093,000000014009811E), ref: 000000014009A16A
                                    • FlsSetValue.KERNEL32(?,?,?,0000000140097EF7,?,?,00000000,0000000140098192,?,?,?,?,-2723E8D8DEBC5093,000000014009811E), ref: 000000014009A192
                                    • FlsSetValue.KERNEL32(?,?,?,0000000140097EF7,?,?,00000000,0000000140098192,?,?,?,?,-2723E8D8DEBC5093,000000014009811E), ref: 000000014009A1A3
                                    • FlsSetValue.KERNEL32(?,?,?,0000000140097EF7,?,?,00000000,0000000140098192,?,?,?,?,-2723E8D8DEBC5093,000000014009811E), ref: 000000014009A1B4
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Value
                                    • String ID:
                                    • API String ID: 3702945584-0
                                    • Opcode ID: b771374d0113ee62c52f9551d0bcc9a33419d028b1b5e3e085ec0dffb0dbca1e
                                    • Instruction ID: 0eecc3e7c070fbf0bcafe1dd48680c6a3d0408fcd47933c8e5bef9cf617aa8ce
                                    • Opcode Fuzzy Hash: b771374d0113ee62c52f9551d0bcc9a33419d028b1b5e3e085ec0dffb0dbca1e
                                    • Instruction Fuzzy Hash: 58118F3034524042FA5B93376A623FA62925B8D7F0F444325BB3E47BF6DE3CC4018240
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$GetcollLocinfo::_Locinfo_ctorLockitLockit::_
                                    • String ID: bad locale name
                                    • API String ID: 1287851536-1405518554
                                    • Opcode ID: 78d073a28301f33edaeebb1b7eabe76fb7f7027334c2f86e0179706359c2cb8b
                                    • Instruction ID: 9a2edcff680919b35428e1209fb65e27f44ba661b4d9c7d5374eb54866a69a42
                                    • Opcode Fuzzy Hash: 78d073a28301f33edaeebb1b7eabe76fb7f7027334c2f86e0179706359c2cb8b
                                    • Instruction Fuzzy Hash: 6E917A72B01B808AEB16DFA6E4903DD7362EB48BC8F044535EF5D57AAADF38C4558384
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo
                                    • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                    • API String ID: 3215553584-1196891531
                                    • Opcode ID: a61b9dafeebeef71c778538e02d1dd93d241f4be75a88b4b5df5efb2b9ec5def
                                    • Instruction ID: 8cb6542061ef7d37a80eb2345665ae9640161e3f439a4ea34f0695e2e3c1826a
                                    • Opcode Fuzzy Hash: a61b9dafeebeef71c778538e02d1dd93d241f4be75a88b4b5df5efb2b9ec5def
                                    • Instruction Fuzzy Hash: 02818A7A604A4085FBAB9FABC1503F93BF0E319BC8F958405EB02972B5D339CA41A741
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CallEncodePointerTranslator
                                    • String ID: MOC$RCC
                                    • API String ID: 3544855599-2084237596
                                    • Opcode ID: 9c00d47a1c5516f7bd2be0d164cd20731702100fa42f3d3dd2f3d47e27ffce20
                                    • Instruction ID: 0bca953fdf33b9ad83e23bb3243ae714b6286ddf27e3bb4087caff64ac5815b8
                                    • Opcode Fuzzy Hash: 9c00d47a1c5516f7bd2be0d164cd20731702100fa42f3d3dd2f3d47e27ffce20
                                    • Instruction Fuzzy Hash: 5D916A73604B808AE752DFA6E8803DD7BB0F7497C8F14411AEB8957B69DB38C195CB00
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CallEncodePointerTranslator
                                    • String ID: MOC$RCC
                                    • API String ID: 3544855599-2084237596
                                    • Opcode ID: a60986bc9adbf2c75a94aae45f25198f4bb40c34f31260bb5ef7955aadcba44f
                                    • Instruction ID: f5b259ee515619902a5d128d7cb9eaef2be3e26f63f7a3474eb2bc1e490a6338
                                    • Opcode Fuzzy Hash: a60986bc9adbf2c75a94aae45f25198f4bb40c34f31260bb5ef7955aadcba44f
                                    • Instruction Fuzzy Hash: 9F616932508BC486EB72DF66E4407DAB7A0F799BD8F044215FB9807BA9DB78C190CB00
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                    • String ID: csm$csm
                                    • API String ID: 3896166516-3733052814
                                    • Opcode ID: 1075979170a2e9a18e477d88d2de6d235b634f407b84dd7ceece1c898f0d7b57
                                    • Instruction ID: 54ecd6d1438185d50b972ba826f5ce2af5ba67c0f274a1b1d786e80e0e72cb3f
                                    • Opcode Fuzzy Hash: 1075979170a2e9a18e477d88d2de6d235b634f407b84dd7ceece1c898f0d7b57
                                    • Instruction Fuzzy Hash: 75516D32200B808AEB769FA794443D977B0F759BD5F188226EB9857BE5CB38D461CB01
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$GetctypeLocinfo::_Locinfo_ctorLockitLockit::_
                                    • String ID: bad locale name
                                    • API String ID: 1612978173-1405518554
                                    • Opcode ID: 026e47313af15043398a11391e273b1130a8867416237ca342cef0d4e4808d66
                                    • Instruction ID: 207d3642c3b50f17bf177e439d3fe9f40958c29cbdde464f884d1d612c46b59d
                                    • Opcode Fuzzy Hash: 026e47313af15043398a11391e273b1130a8867416237ca342cef0d4e4808d66
                                    • Instruction Fuzzy Hash: 71516836711B408AEB16DFB2E4917EC33B5EB48788F044429EF8927AA6DF34C526D344
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressHandleModuleProc
                                    • String ID: GetTempPath2W$kernel32.dll
                                    • API String ID: 1646373207-1846531799
                                    • Opcode ID: 85c4015c5df5ee79752990f65a767554006cfd6127e60443cb10f02faa6b2ab0
                                    • Instruction ID: 8948df6339a09da6af2494f7b4aca6647369a72829e4e3643078e2be1e3806b8
                                    • Opcode Fuzzy Hash: 85c4015c5df5ee79752990f65a767554006cfd6127e60443cb10f02faa6b2ab0
                                    • Instruction Fuzzy Hash: 25E01231300A0582EE06AB12F9887AD6321FF8CBC2F985025EF0E07334EE3CC44A8710
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process32$CloseHandleImpersonateLoggedNextOpenProcessUser$CreateFirstRevertSelfSnapshotTokenToolhelp32
                                    • String ID:
                                    • API String ID: 1562318730-0
                                    • Opcode ID: 46975101b5bb912cb8c18d6f0a7b35585e18786a4ae977b998627e5ccdad2a74
                                    • Instruction ID: ad7d59218a4d2420d6ee86cb7ed838c25e870fc05f373488bbf4d43a86272400
                                    • Opcode Fuzzy Hash: 46975101b5bb912cb8c18d6f0a7b35585e18786a4ae977b998627e5ccdad2a74
                                    • Instruction Fuzzy Hash: A5229B72B14B8086FB02AB6AD4443DD2761E7897E8F505615FBAD17AFADFB8C481C700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileWrite$ConsoleErrorLastOutput
                                    • String ID:
                                    • API String ID: 2718003287-0
                                    • Opcode ID: 51ca5d62aa19301a18794717acfbf1a46562df65ce568f5fb7798e040ec77a5b
                                    • Instruction ID: 83f89cefb2d932c64b68d175d5ea0fe2b41a0143d6f3692f9e6e20abd60b4dae
                                    • Opcode Fuzzy Hash: 51ca5d62aa19301a18794717acfbf1a46562df65ce568f5fb7798e040ec77a5b
                                    • Instruction Fuzzy Hash: 4BD1CF72B24A808AE712CF6AD444BDC37B1F758BD8F444216EF9E97BA9DA34C446C740
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: EnvironmentInitStringStringsUnicode$Free
                                    • String ID:
                                    • API String ID: 2488768755-0
                                    • Opcode ID: efafd639e9174d00bc146c1560cf1528ed8c856197ad0565266ce7339dd8c3cd
                                    • Instruction ID: 87069c6435efe869352e4d7ec8a553a9e77cee2d25ee79a4713f5d8602df03e1
                                    • Opcode Fuzzy Hash: efafd639e9174d00bc146c1560cf1528ed8c856197ad0565266ce7339dd8c3cd
                                    • Instruction Fuzzy Hash: EF518C72A18B80C2EB129F1AE44039D7760FB99BD4F589215EB9903BA5DF7CD2E1C704
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$LockitLockit::_$Concurrency::cancel_current_taskFacet_RegisterSetgloballocalestd::locale::_
                                    • String ID:
                                    • API String ID: 3698853521-0
                                    • Opcode ID: 3d7667ad2e0602b66abf42365a29bfb2d0932d23135c08196bf5434fa8e63462
                                    • Instruction ID: be7052521538f46ca31769c5e8ad34a96fa69d07cef5d8ccdfe7c05edfc6c238
                                    • Opcode Fuzzy Hash: 3d7667ad2e0602b66abf42365a29bfb2d0932d23135c08196bf5434fa8e63462
                                    • Instruction Fuzzy Hash: 4E415A32324A8082EA66DF16E4507D973A4F78CBD4F9A5621FB99477B5DF38C482C704
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 3215553584-0
                                    • Opcode ID: f1f9df1a05da3301ed415653e8360f7cb12179a044a2575d07df28b1a0800ec9
                                    • Instruction ID: 9d625922f0084f738925744b6ce75ac3468dc28db60b1638888baded20588c2c
                                    • Opcode Fuzzy Hash: f1f9df1a05da3301ed415653e8360f7cb12179a044a2575d07df28b1a0800ec9
                                    • Instruction Fuzzy Hash: 63417F32509A8489EB63CF66C4203ED7BA0FB4DFD4F4AC042EB88073A6DA39C446C711
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$LockitLockit::_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 1168246061-0
                                    • Opcode ID: fce11bbf2716b712929d21612f2a8f238f427733906def6abb3c40e1e27c6ea6
                                    • Instruction ID: 13c908d1154428c6937b5c3509377b7ccdd79ff15f68ab15f939c0ebe6def4ce
                                    • Opcode Fuzzy Hash: fce11bbf2716b712929d21612f2a8f238f427733906def6abb3c40e1e27c6ea6
                                    • Instruction Fuzzy Hash: 70413932224A4081FA26DF17E850BD96760F78CBE4F591622EB9D477B9DF38D982C704
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$LockitLockit::_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 1168246061-0
                                    • Opcode ID: 73d040060e39de7473f733929aeeb815445ca65359d0c265211a911782271014
                                    • Instruction ID: 74d7fc06fc51955d11541e88f1d53fd6ed53de51744ee963c2a23d3aba2a14c1
                                    • Opcode Fuzzy Hash: 73d040060e39de7473f733929aeeb815445ca65359d0c265211a911782271014
                                    • Instruction Fuzzy Hash: E2415B36214A8096FA27DF27E8507DA67A0F78DBE4F581621BB9D477B5DE3CC4818700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharErrorLastMultiWide
                                    • String ID:
                                    • API String ID: 203985260-0
                                    • Opcode ID: b0c4d9c72fcc6461851340ae7f6c093d4e41e08a8bab11e5154c9cbc0382217d
                                    • Instruction ID: a031f3bea18fd59b085b3d452c6f81a1a71a70fbd363d9f8fa6e03f334feb155
                                    • Opcode Fuzzy Hash: b0c4d9c72fcc6461851340ae7f6c093d4e41e08a8bab11e5154c9cbc0382217d
                                    • Instruction Fuzzy Hash: 0A216D76614B848BE7208F12E44435FBBB4F79DFD5F240128EB8997B65DB38C5028B00
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Handle$AddressAttributesCloseErrorFeatureFileLastModulePresentProcProcessor__std_fs_open_handle
                                    • String ID:
                                    • API String ID: 156590933-0
                                    • Opcode ID: 6a84e7cc61d3f6faa1a02f0b285c9e89f06a54f244136a8e8d2e5cb925bd3053
                                    • Instruction ID: 62e66b62d14fa543578834bf2b4ef4b7e56291556af98af6738b9ddd7679e05d
                                    • Opcode Fuzzy Hash: 6a84e7cc61d3f6faa1a02f0b285c9e89f06a54f244136a8e8d2e5cb925bd3053
                                    • Instruction Fuzzy Hash: 4A11A032218A4087FB625FABA0843BE6371E78C7F0F100614BBB747AF5DAB8C5418B00
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1541836231.00007FF607D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF607D70000, based on PE: true
                                    • Associated: 00000002.00000002.1541809290.00007FF607D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.1541898855.00007FF607DEB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.1541898855.00007FF607E04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.1541898855.00007FF60815F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.1542173612.00007FF608177000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.1542201478.00007FF60817B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.1542201478.00007FF608183000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000002.00000002.1542256674.00007FF608188000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ff607d70000_5LEXIucyEP.jbxd
                                    Similarity
                                    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                    • String ID:
                                    • API String ID: 2933794660-0
                                    • Opcode ID: b7ee5f73d21c22f4c3e3b841111f855bb87ab456a378e60018242c68feb33e76
                                    • Instruction ID: 5e52f6137d7a06b7a951f38158256eaf7ca8628a2c666363cbd48b6253fe6d6f
                                    • Opcode Fuzzy Hash: b7ee5f73d21c22f4c3e3b841111f855bb87ab456a378e60018242c68feb33e76
                                    • Instruction Fuzzy Hash: AE111832B14B028AEB00CB70E8542B833B4FB59758F541E35EAAD867A4DF7CD1A4C380
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                    • String ID:
                                    • API String ID: 2933794660-0
                                    • Opcode ID: 4ffc0ff1ccd2cf120a16052376350404e0c91ed7b37e0d63ec5629fc76b72274
                                    • Instruction ID: b655b697fc6b073ddc816c875066984fbd2aa83c7f17d9a519f4fc4b792de05b
                                    • Opcode Fuzzy Hash: 4ffc0ff1ccd2cf120a16052376350404e0c91ed7b37e0d63ec5629fc76b72274
                                    • Instruction Fuzzy Hash: 1A111532710F008AEB01DB62E8543A833A4F71DB99F441A25EF6D877A4DF78C1A98380
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: [json.exception.
                                    • API String ID: 0-791563284
                                    • Opcode ID: aa9ce472859b39d8d4b89a398f1babea442f6c72f9e4918f49389b3ba7e588c3
                                    • Instruction ID: fb2f653c69449183f086398a4c43b5c45a9310b96e1abbd96b49283a355f216b
                                    • Opcode Fuzzy Hash: aa9ce472859b39d8d4b89a398f1babea442f6c72f9e4918f49389b3ba7e588c3
                                    • Instruction Fuzzy Hash: 9171D172F10B9085FB02CF7AE8413DD67A1E799BD8F245215EF5917BAADB78C4828340
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Unwind__except_validate_context_record
                                    • String ID: csm
                                    • API String ID: 2208346422-1018135373
                                    • Opcode ID: b6b4ec287b03b43af7135d47e4a928fccc53e45a76218f894a62c54d13e92dd1
                                    • Instruction ID: 19c601aaea4a852408da0c01ce0685467ec383445de2fce7942d3b672fa0fc06
                                    • Opcode Fuzzy Hash: b6b4ec287b03b43af7135d47e4a928fccc53e45a76218f894a62c54d13e92dd1
                                    • Instruction Fuzzy Hash: 3551BF32312B008AEB56CF56E454BAC73B1F748BD8F558521FB9A477A9EB78C841C700
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                    • String ID: bad locale name
                                    • API String ID: 3988782225-1405518554
                                    • Opcode ID: 1d48ec966220e33eb46537d50b65b025bdb0597fdae6c4422fb9f30e2bae3d48
                                    • Instruction ID: a70bdc5d483a3a6709f00792b18fb0141f1d3f3c4e5a5c8a55365fd5953b6739
                                    • Opcode Fuzzy Hash: 1d48ec966220e33eb46537d50b65b025bdb0597fdae6c4422fb9f30e2bae3d48
                                    • Instruction Fuzzy Hash: C7514D33702A408AEB56DFB2E4503ED33B4EB58B88F044025FF5967AA6DE38C5168344
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                    • String ID: bad locale name
                                    • API String ID: 3988782225-1405518554
                                    • Opcode ID: 133dae14c956dc43492fc21a5fc6e50363224602403c47e4697dbaa5a0c0d9d7
                                    • Instruction ID: 198352202ef1475b794fd52093b47f8c285fde63b82ab9b5d546a8a9e2019f38
                                    • Opcode Fuzzy Hash: 133dae14c956dc43492fc21a5fc6e50363224602403c47e4697dbaa5a0c0d9d7
                                    • Instruction Fuzzy Hash: 87513A32706A4089EB56DFB2E8907EC33B4EB58788F044535FB4967AA6DF38C525D348
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateFrameInfo__except_validate_context_record
                                    • String ID: csm
                                    • API String ID: 2558813199-1018135373
                                    • Opcode ID: 30dd612b4e4b9212e9166655247be16b5f23695bfc4863c6a6ebc2986465c29c
                                    • Instruction ID: dcb4dcb3da8c4b404caa3ed0d2c3029b21496a08969d053362ec2df929759ba3
                                    • Opcode Fuzzy Hash: 30dd612b4e4b9212e9166655247be16b5f23695bfc4863c6a6ebc2986465c29c
                                    • Instruction Fuzzy Hash: E6510776219B4086E672EF66E4413AE77B4F38DBE0F140125BB8907BA6DB38D461CB01
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1540390648.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_140000000_5LEXIucyEP.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorFileLastWrite
                                    • String ID: U
                                    • API String ID: 442123175-4171548499
                                    • Opcode ID: 136ebf252562798dd94b0934f5b608a87eddbdd1c89cb1577b5bf7720501d192
                                    • Instruction ID: 265af7a89e28bd5e55a3246d438a373a726ea37e60e0b815f1dbf572d141d70c
                                    • Opcode Fuzzy Hash: 136ebf252562798dd94b0934f5b608a87eddbdd1c89cb1577b5bf7720501d192
                                    • Instruction Fuzzy Hash: A4419F72625A8082EB219F26E4447EA67A0F79CBD4F444121EF4D877A8EB3CC441CB40